Buna Byte Cybersecurity
845 subscribers
273 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
πŸ”΄α‰ α‰€αŒ£α‹­ α‹¨αˆαŠ• αˆ˜α…αˆαα‰΅ αŠ₯αŠ“α‰…αˆ­α‰₯αˆŽα‰΅
Anonymous Poll
17%
Cyber security
34%
Programing/coding
38%
Hacking
11%
Networking
πŸ₯°3❀1πŸ‘1πŸ‘¨β€πŸ’»1
🟒Best mobile device / Android hacking books you should read
πŸ”ΉTouch MEπŸ₯°

πŸ‘‰@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ”₯3❀1πŸŽ‰1
πŸŸ’αŠ αˆ‰ α‹¨α‰°α‰£αˆ‰ የ Hacking αˆ˜α…αˆαα‰΅ αŠ₯αŠ“ cheat sheet αŠ₯αŠ•αˆ† πŸ“–πŸ“”πŸ“— ምርαŒ₯ α‹¨αŠ•α‰£α‰₯αŠ“ α‹¨αˆαˆαˆα‹΅ αŒα‹œαŠ• α‰°αˆ˜αŠ˜αŠ• (Here are collection of Hacking Books and cheat sheet !. "Be a part of the solution, not the problem - hack ethically."
Enjoy reading and practising them) πŸ₯³πŸ˜Š Join πŸ‘‰@hacker_habeshaπŸ‡ͺπŸ‡Ή

🟣Part 01 🟣Part 11
🟣Part 02 🟣Part 12
🟣Part 03 🟣Part 13
🟣Part 04 🟣Part 14
🟣Part 05 🟣Part 15
🟣Part 06 🟣Part 16
🟣Part 07
🟣Part 08
🟣Part 09
🟣Part 10
❀3πŸ₯°2πŸ‘1πŸŽ‰1
🟒cyber security career roadmap

πŸ‘‰@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ€“1πŸ†’1
Do u need Networking Books
Anonymous Poll
97%
Yes I do
3%
No I don't
πŸ₯°2❀1
🟒ROADMAP TO BECOME A HACKER (AN ETHICAL HACKER)🟒

πŸ”ΉStep 1 - Get hands on Linux/Unix => LINUX/UNIX is an open-source operating system that provides better security to the computer systems. As a hacker, there is no skipping LINUX because it is one of the most used OS for hacking and provides ample tools for hackers. Some of the common Linux distributions are, Red Hat Linux, Kali Linux, Ubuntu, BackTrack, etc. Kali Linux is one of the most used Linux systems and is specially customized for hacking.

πŸ”ΉStep 2 - Learn simple Programing language => start with learning python or C . Although it's not so important but its comes handy And let you use your brain more .

πŸ”ΉStep 3 - Learn networking concepts => You should have a knowledge of various networks, protocols since it is beneficial in exploiting vulnerabilities. Thus learning various networking concepts and various networking tools such as Wireshark, Nmap, etc will be really beneficial. Trust me, Hacking is all about playing around the Network

πŸ”ΉStep 4 - Learn how to be Anonymous => As a hacker, this is one of the important steps that one should know. As a hacker, you might do a lot of this, some might be legal, some might be without permission. Thus it is necessary to know how to be anonymous and how one can hide their identity online, So that there will be one trace left and no one can backtrace you.

πŸ”ΉStep 5 - Explore the hidden web => The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor, etc to be accessed.
You've no doubt heard talk of the β€œdark web” as a hotbed of criminal activity β€” and it is. But not everything is illegal, the dark web also has a legitimate side. Thus it is necessary to know a bit about what it is and how it works.

πŸ”ΉStep 6 - don't forget about cryptography =>Cryptography, also called the art of secret writing, It is something that as a hacker you should master. Encryption and Decryption are important skills in hacking. Encryption is widely used in several aspects of information security in authentication, confidentiality, and integrity of the data. Information on a network is always encrypted such as passwords, packets sent over the network, etc. Thus, as a hacker, it is necessary to identify the encryption and break it.

πŸ”ΉStep 7 - Dive Deep into Hacking => Once you have good knowledge about the topics discussed thus far, it's time to dive deep. Trying diving deep into hacking concepts and learning topics such as vulnerability assessment, penetration testing, SQL injections, and much more. In the field of hacking, learning is never-ending because security changes every day with new updates in the system.Thus you need to be updated with the latest tools and ways to crack a system or secure a system.

πŸ”ΉStep 8 - Experimenting and Practicing is the Key => After learning some concepts, sit back and nail them. Keep practicing them in various environments and various scenarios. Set up your own lab for experiment purposes. Use these labs to test various tools, attacks, and much more.

πŸ”ΉStep 9 - Keep discussing things with Elite Hackers => join us on discord and telegram that will help you to join discussions with other hackers in the world. This will help in exchange and sharing of knowledge and work as a team.

Last step but most important one => This is not one week or year process there is no limit of learning so keep patient & keep learning

❗️There is very thin line to between Ethical or Unethical actions. With great power comes great responsibility.❗️

🟣ALL THE BEST FOR YOUR JOURNEY 🟣

🟒@hacker_habesha🟒
πŸ‘2πŸ₯°2πŸ™1πŸ‘Œ1
🟒Fileless Malware, an Invisible threat

πŸ“Fileless malware refers to a special type of cyber attack that can infect a system with malware without leaving an executable file on disk.

1. You’re browsing the web
2. You visit a site that happens to be hosting an exploit kit
3. The exploit kit scans your browser for outdated plugins such as Flash, Adobe, Java or Microsoft Silverlight
4. The exploit kit attempts to exploit vulnerabilities in the outdated plugin
5. If successful, the exploit kit starts running the payload in the memory of your browser process.
6. The infection is successful!

🟒@hacker_habeshaπŸ”΄
❀2πŸ‘1πŸ”₯1πŸ₯°1
🟒Awesome GPTs (Agents) for Cybersecurity

πŸ“The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community.

🟒@hacker_habeshaπŸ”΄
πŸ”₯2❀1πŸ₯°1
🟒Collection of the best Networking Books for hackers and cybersecurity enthusiasts.

🟒@hacker_habeshaπŸ”΄
❀2πŸ”₯1πŸ₯°1
🟒Collection of the best Networking Books for hackers and cybersecurity enthusiasts.

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή

πŸ”Ίpart 1N πŸ”Ίpart 7N
πŸ”Ίpart 2N πŸ”Ίpart 8N
πŸ”Ίpart 3N πŸ”Ίpart 9N
πŸ”Ίpart 4N
πŸ”Ίpart 5N
πŸ”Ίpart 6N
πŸ”₯2πŸ‘1πŸ₯°1
🟒You can find the book you want by the link ....wish you all good time "Remember if you push your limits you become part of The Top 1%"πŸ‘ΎπŸ‘Ύ

🟣 Touch Me πŸ‘‡πŸ‘‡
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️
♻️ πŸ”΄Hacking Books 😎 ♻️
♻️ πŸ”΄Networking Books😎 ♻️
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️


🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ‘1
🟒If you want to learn CYBERSECURITY for FREE, this THREAD is for you.

🟒Here are Loads of FREE RESOURCES (Courses, Certifications, Communities, Internship opportunities) to get you STARTED.

1. Cisco CCNA Cyber Ops Associate 200-201 - MEGA
πŸ”—https://mega.nz/folder/B4A0WDZA#zAFQcBE8Fx_Nk5UXW89olg

2. Cybersecurity FULLY LOADED by Simplilearn
πŸ”—https://consent.youtube.com/m?continue=https%3A%2F%2Fm.youtube.com%2Fplaylist%3Flist%3DPLEiEAq2VkUUJfPOj5nRounXvf3n17PCft%26cbrd%3D1&gl=GR&m=1&pc=yt&cm=2&hl=el&src=1

3. Cybersecurity FULL course by EDUREKA
πŸ”—https://consent.youtube.com/m?continue=https%3A%2F%2Fm.youtube.com%2Fplaylist%3Flist%3DPL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_%26cbrd%3D1&gl=GR&m=1&pc=yt&cm=2&hl=el&src=1

4. Awesome Cybersecurity University
πŸ”—https://docs.google.com/document/u/0/d/1zKkLwgfUCESexAQrhcvsCM1XDYU50mbMz12OfivTZnE/mobilebasic?pli=1

5. Cybersecurity books for beginners
πŸ”—https://drive.google.com/drive/mobile/folders/1DqvFPxC3ROZgRndVYsfpX7C7Nqx1CnmL?usp=sharing

6. Cybersecurity Documents
πŸ”—https://drive.google.com/drive/mobile/folders/179D_slEOLXWOTeFdmRrMkdV8C4DSLdYT?s=08

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2πŸ₯°2πŸ™1
🟒 WORLD DANGEROUS HACKERS TOOL EXPOSE 🟒 Part 1

πŸ†•  Pish web tool
πŸ”— Link : https://github.com/Cabdulahi/pish

πŸ†• MITM attack tool
πŸ”— Link : https://github.com/websploit/websploit

πŸ†• kill shot pentesting framework
πŸ”— Link :https://github.com/bahaabdelwahed/killshot

❗️ Facebook Tool Links ❗️

πŸ†• Facebook information gathering
πŸ”— Link :  git clone https://github.com/CiKu370/OSIF.git

πŸ†• Facebook Toolkit + bots,  dump private data
πŸ”— Link : https://github.com/warifp/FacebookToolkit

πŸ†• Facebook cracking tool Fcrack.py
πŸ”— Link : https://github.com/INDOnimous/FB-Crack-

πŸ†• Facebook and yahoo account cloner
πŸ”— Link : https://gitlab.com/W1nz0N/fyc.git

πŸ†• Facebook report tool
πŸ”— Link : git clone https://github.com/IlayTamvan/Report

πŸ†• Facebook BruteFoRce Tool
πŸ”— Link : https://github.com/IAmBlackHacker/Facebook-BruteForce

πŸ†• Facebook hacking ASU
πŸ”— Link : git clone https://github.com/LOoLzeC/ASU

πŸ†• Facebook Downloader
πŸ”— Link : https://github.com/barba99/facebook-spotify-youtube-descargar

πŸ†• Hack Facebook MBF
πŸ”— Link : git clone https://github.com/Rizky-ID/autombf

πŸ†• Facebook Repot3
πŸ”— Link : git clone https://github.com/PangeranAlvins/Repot3

πŸ†• Facebook Information Gathering
πŸ”— Link : https://github.com/xHak9x/fbi

πŸ†• Facebook Brute with TOR
πŸ”— Link : https://github.com/thelinuxchoice/facebash


πŸ‘‰πŸŸ’@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ”₯2❀1πŸ‘1🀯1
⚑️SpyScraper: Osint tool to scraper websites⚑️

🍳Scraping skills:

🎯emails
🎯phones numbers
🎯hrefs
🎯author
🎯date of creation/update/expiration
🎯location
🎯servers names

Github : https://github.com/N0rz3/SpyScraper

πŸ‘‰πŸŸ’Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ”₯1
🟒Hacking Tools Cheat Sheet

πŸ”ΉInformation Gathering
πŸ”ΉVulnerability DBs & Exploits
πŸ”ΉCracking
πŸ”ΉMetasploit Framework
πŸ”ΉHTTP Tools
πŸ”ΉSniffing
πŸ”ΉLinux Privilege Escalation
πŸ”ΉWindows Privilege Escalation
πŸ”ΉNetwork Scanning
πŸ”ΉWindows Credentials Gathering
πŸ”ΉShells
πŸ”ΉNTLM Relay
πŸ”ΉActive Directory
πŸ”ΉPass-the-Hash

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯2πŸ‘1
πŸŸ’πŸ“‘Wireless Penetration Testing Tools

πŸ”ΉWIFISpy
πŸ“ WiFiSpy is a tool written to automate powerful wifi / local attacks, with its nice user friendly console and easy-to-use, WiFiSpy can deliver a powerful ability to break in a network or even spy over a network!
πŸ”—https://github.com/DeaDHackS/WiFiSpy

πŸ”ΉAirattackit
πŸ“Automated Wireless Attack Framework
πŸ”—https://github.com/JoyGhoshs/Airattackit

πŸ”Ήehtools
πŸ“Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools
πŸ”—https://github.com/jawaharputti/EHTools

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ™2πŸ‘1
πŸŸ’πŸ”“Crack WPA/WPA2-PSK using Aircrack-ng and Hashcat

πŸŸ’πŸ“This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network’s security or break into one nearby.

The attack outlined below is entirely passive and it is impossible to detect provided that you don’t actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and to get the handshake value.

πŸ”—https://en.hacks.gr/2023/11/13/crack-wpa-wpa2-psk-using-aircrack-ng-and-hashcat/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ‘1
Forwarded from Buna Byte Cybersecurity
🟒You can find the book you want by the link ....wish you all good time "Remember if you push your limits you become part of The Top 1%"πŸ‘ΎπŸ‘Ύ

♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️
♻️ πŸ”΄Hacking Books 😎 ♻️
♻️ πŸ”΄Networking Books😎 ♻️
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️


🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2
🟒50 Top Digital Forensics Tools

πŸ”·Network Forensic Tools
πŸ”ΈNmap
πŸ”Έ Wireshark
πŸ”ΈXplico
πŸ”ΈSnort
πŸ”ΈTCPDump
πŸ”ΈThe Slueth Kit

πŸ”·Mobile Forensics Tools
πŸ”ΈElcomspoft iOS Forensic Toolkit
πŸ”ΈMobile Verification Toolkit
πŸ”ΈOxygen Forensic
πŸ”ΈMOBILedit
πŸ”ΈCellebrite UFED
πŸ”ΈMSAB XRY

πŸ”·Malware Analysis Tools
πŸ”ΈWireshark
πŸ”ΈYARA
πŸ”ΈMalwarebytes
πŸ”ΈVirusTotal
πŸ”ΈCuckoo Sandbox
πŸ”ΈIDA Pro

πŸ”·Data Recovery Tools
πŸ”ΈRecuva
πŸ”ΈEaseUS Data Recovery
πŸ”ΈTestDisk
πŸ”ΈStellar Data Recovery
πŸ”ΈPhotoRec
πŸ”ΈDisk Drill

πŸ”·Email Forensic Tools
πŸ”ΈMailXaminer
πŸ”ΈMailPro+
πŸ”ΈXtraxtor
πŸ”ΈAid4Mail
πŸ”ΈeMailTrackerPro
πŸ”ΈAutopsy

πŸ”·OSINT Tools
πŸ”ΈMaltego
πŸ”ΈNmap
πŸ”ΈOSINT Framework
πŸ”ΈShodan
πŸ”ΈRecon-ng
πŸ”ΈTheHavester

πŸ”·Live Forensics Tools
πŸ”ΈOS Forensics
πŸ”ΈEncase Live
πŸ”ΈCAINE
πŸ”ΈF-Response
πŸ”ΈKali Linux Forensic Mode

πŸ”·Memory Forensics Tools
πŸ”ΈVolatility
πŸ”ΈDumpIt
πŸ”ΈmemDump
πŸ”ΈAccess data FTK Imager
πŸ”ΈHibernation Recon
πŸ”ΈWindowSCOPE

πŸ”·Cloud Forensic Tools
πŸ”ΈMagnet AXIOM
πŸ”ΈMSAB XRY Cloud
πŸ”ΈAzure CLI


Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ₯°1
10 Website to Learn Ethical Hacking

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ‘1
🟒Top tech Skills In Demand 2024

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ‘Œ2