ChatGPT & Ai Bots
- @Nallin_Bot
- @GPTaskBot
- @AbhikritiBot
- @NeuralRobot
- @JWGPT3_bot
- @AiinfoChatBot
- @GPT_Fast_Bot
- @Ai_modern_bot
- @ChatGPT4_BOT
- @ChatingGPTBot
- @Bardy_Bot
- @OpenAiChat_Bot
- @ChatGPT_BIAbot
- @Chat_GPT_Robot
- @GPT4TelegramBot
- @ChatGPTPublicBot
- @OpenAI_GPTNew_bot
- @Chat_OpenAi_combot
- @Nallin_Bot
- @GPTaskBot
- @AbhikritiBot
- @NeuralRobot
- @JWGPT3_bot
- @AiinfoChatBot
- @GPT_Fast_Bot
- @Ai_modern_bot
- @ChatGPT4_BOT
- @ChatingGPTBot
- @Bardy_Bot
- @OpenAiChat_Bot
- @ChatGPT_BIAbot
- @Chat_GPT_Robot
- @GPT4TelegramBot
- @ChatGPTPublicBot
- @OpenAI_GPTNew_bot
- @Chat_OpenAi_combot
👍2
Временная почта:
https://tempail.com
https://www.mohmal.com
https://temp-mail.org
Блокнот:
https://ghostbin.com
https://hastebin.com
https://pastebin.com
Генерировать личные данные:
www.fakenamegenerator.com
www.datafakegenerator.com
https://randomuser.me
https://4devs.com.br
https://names.igopaygo.com/people/fake-person
https://fakenametool.com/generator/random/en_IN/Индия
https://randomprofile.com
Количество виртуальных телефонов:
https://smsreceivefree.com
https://tempophone.com
https://tempail.com
https://www.mohmal.com
https://temp-mail.org
Блокнот:
https://ghostbin.com
https://hastebin.com
https://pastebin.com
Генерировать личные данные:
www.fakenamegenerator.com
www.datafakegenerator.com
https://randomuser.me
https://4devs.com.br
https://names.igopaygo.com/people/fake-person
https://fakenametool.com/generator/random/en_IN/Индия
https://randomprofile.com
Количество виртуальных телефонов:
https://smsreceivefree.com
https://tempophone.com
If you use android, and consider your "graphic key" to be the crown of your own cleverness, here are the sets of the most frequently used patterns of graphic keys, sorted by complexity.
Well, for the forensicists and inquisitive, this is another reason to check the statistics
Well, for the forensicists and inquisitive, this is another reason to check the statistics
🔥3
StalkPhish
The Phishing kits stalker, harvesting phishing kits for investigations.https://github.com/t4d/StalkPhish
GitHub
GitHub - t4d/StalkPhish: StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations. - t4d/StalkPhish
Exploit development resources
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://crackmes.one
https://www.youtube.com/@pwncollege/videos
https://repo.zenk-security.com/Magazine%20E-book/Hacking-%20The%20Art%20of%20Exploitation%20(2nd%20ed.%202008)%20-%20Erickson.pdf
https://www.phrack.org/issues/49/14.html#article
https://github.com/justinsteven/dostackbufferoverflowgood
https://github.com/FabioBaroni/awesome-exploit-development
https://github.com/CyberSecurityUP/Awesome-Exploit-Development
https://github.com/RPISEC/MBE
https://github.com/hoppersroppers/nightmare
https://github.com/shellphish/how2heap
https://www.youtube.com/watch?v=tMN5N5oid2c
https://dayzerosec.com/blog/2021/02/02/getting-started.html
https://github.com/Tzaoh/pwning
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
RED TEAM RESOURCS
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
https://hackersploit.org/red-team-reconnaissance-techniques/
https://syntricks.com/red-teaming
https://attack.mitre.org/
https://www.cyberwarfare.live/courses/certified-red-team-analyst
https://tryhackme.com/path/outline/redteaming
https://www.youtube.com/watch?v=BWaGnsRirtU
https://www.linode.com/docs/guides/hackersploit-red-team-series
NOTES
https://github.com/bigb0sss/RedTeam-OffensiveSecurity
https://www.ired.team/
C2 SERVERS
USE OPEN SOURCE && FRIENDLY FOR BEGINNERS
https://github.com/cobbr/Covenant/
https://www.kali.org/tools/armitage/
HackerSploit Blog
Red Team Reconnaissance Techniques
Reconnaissance consists of techniques that involve adversaries actively or passively gathering information that can be used to support targeting. Such information may include details of the victim organization, infrastructure, or staff/personnel.
Malware development series
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
PART 1 - basics:
https://0xpat.github.io/Malware_development_part_1/
PART 2 - anti dynamic analysis & sandboxes:
https://0xpat.github.io/Malware_development_part_2/
PART 3 - anti-debugging:
https://0xpat.github.io/Malware_development_part_3/
PART 4 - antistatic analysis tricks:
https://0xpat.github.io/Malware_development_part_4/
PART 5 - tips & tricks:
https://0xpat.github.io/Malware_development_part_5/
PART 6 - advanced obfuscation with LLVM and template metaprogramming:
https://0xpat.github.io/Malware_development_part_6/
PART 7 - Secure Desktop:
https://0xpat.github.io/Malware_development_part_7/
PART 8 - COFF injection and in-memory execution:
https://0xpat.github.io/Malware_development_part_8/
PART 9 - hosting CLR and managed code injection:
https://0xpat.github.io/Malware_development_part_9/
0xpat.github.io
Malware development part 1 - basics
Introduction
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist.
Let’s…
❤3
https://ift.tt/2ich1l7
Twitter Limits to Thwart Data Scraping
Twitter Limits to Thwart Data Scraping
Cyberwarzone
Twitter Limits to Thwart Data Scraping
There's been a bit of a shake-up on Twitter. None other than Elon Musk himself has come forward with a new measure aimed at tackling rampant data scraping and system manipulation.
The Musk Maneuver
As it stands, Twitter is facing some pretty intense…
The Musk Maneuver
As it stands, Twitter is facing some pretty intense…
https://github.com/Jasawn/python-instagram-story-visualiser
Instagram Instagram Story Visualizer – Extract location data on Instagram.
The tool reads stories and displays the location data of selected users on an interactive map with a user-friendly interface.
Instagram Instagram Story Visualizer – Extract location data on Instagram.
The tool reads stories and displays the location data of selected users on an interactive map with a user-friendly interface.
Millions of GitHub Repositories Are Vulnerable To RepoJacking
An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution on the internal networks of organizations or on the networks of their customers. This includes the repositories of companies like Google, Lyft, and many others. It has many high-quality targets that are vulnerable to attack. […]
The post Millions of GitHub Repositories Are Vulnerable To RepoJacking appeared first on GBHackers - Latest Cyber Security News | Hacker News....
Continue reading at GBHackers – Latest Cyber Security News | Hacker News
An attack called RepoJacking may potentially affect millions of GitHub repositories. If abused, this vulnerability might result in code execution on the internal networks of organizations or on the networks of their customers. This includes the repositories of companies like Google, Lyft, and many others. It has many high-quality targets that are vulnerable to attack. […]
The post Millions of GitHub Repositories Are Vulnerable To RepoJacking appeared first on GBHackers - Latest Cyber Security News | Hacker News....
Continue reading at GBHackers – Latest Cyber Security News | Hacker News
𝙃4𝙓-𝙏𝙤𝙤𝙡𝙨 🐲
Open source toolkit for scraping, OSINT and more
Link 🔗:-
https://github.com/V1li/H4X-Tools
Open source toolkit for scraping, OSINT and more
Link 🔗:-
https://github.com/V1li/H4X-Tools
GitHub
GitHub - vil/H4X-Tools: A modular, terminal-based toolkit for OSINT, reconnaissance, and scraping - built in Python, runs on Linux…
A modular, terminal-based toolkit for OSINT, reconnaissance, and scraping - built in Python, runs on Linux and Windows. - vil/H4X-Tools
👍2