Buna Byte Cybersecurity
845 subscribers
272 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
🟒Awesome GPTs (Agents) for Cybersecurity

πŸ“The "Awesome GPTs (Agents) Repo" represents an initial effort to compile a comprehensive list of GPT agents focused on cybersecurity (offensive and defensive), created by the community.

🟒@hacker_habeshaπŸ”΄
πŸ”₯2❀1πŸ₯°1
🟒Collection of the best Networking Books for hackers and cybersecurity enthusiasts.

🟒@hacker_habeshaπŸ”΄
❀2πŸ”₯1πŸ₯°1
🟒Collection of the best Networking Books for hackers and cybersecurity enthusiasts.

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή

πŸ”Ίpart 1N πŸ”Ίpart 7N
πŸ”Ίpart 2N πŸ”Ίpart 8N
πŸ”Ίpart 3N πŸ”Ίpart 9N
πŸ”Ίpart 4N
πŸ”Ίpart 5N
πŸ”Ίpart 6N
πŸ”₯2πŸ‘1πŸ₯°1
🟒You can find the book you want by the link ....wish you all good time "Remember if you push your limits you become part of The Top 1%"πŸ‘ΎπŸ‘Ύ

🟣 Touch Me πŸ‘‡πŸ‘‡
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️
♻️ πŸ”΄Hacking Books 😎 ♻️
♻️ πŸ”΄Networking Books😎 ♻️
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️


🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ‘1
🟒If you want to learn CYBERSECURITY for FREE, this THREAD is for you.

🟒Here are Loads of FREE RESOURCES (Courses, Certifications, Communities, Internship opportunities) to get you STARTED.

1. Cisco CCNA Cyber Ops Associate 200-201 - MEGA
πŸ”—https://mega.nz/folder/B4A0WDZA#zAFQcBE8Fx_Nk5UXW89olg

2. Cybersecurity FULLY LOADED by Simplilearn
πŸ”—https://consent.youtube.com/m?continue=https%3A%2F%2Fm.youtube.com%2Fplaylist%3Flist%3DPLEiEAq2VkUUJfPOj5nRounXvf3n17PCft%26cbrd%3D1&gl=GR&m=1&pc=yt&cm=2&hl=el&src=1

3. Cybersecurity FULL course by EDUREKA
πŸ”—https://consent.youtube.com/m?continue=https%3A%2F%2Fm.youtube.com%2Fplaylist%3Flist%3DPL9ooVrP1hQOGPQVeapGsJCktzIO4DtI4_%26cbrd%3D1&gl=GR&m=1&pc=yt&cm=2&hl=el&src=1

4. Awesome Cybersecurity University
πŸ”—https://docs.google.com/document/u/0/d/1zKkLwgfUCESexAQrhcvsCM1XDYU50mbMz12OfivTZnE/mobilebasic?pli=1

5. Cybersecurity books for beginners
πŸ”—https://drive.google.com/drive/mobile/folders/1DqvFPxC3ROZgRndVYsfpX7C7Nqx1CnmL?usp=sharing

6. Cybersecurity Documents
πŸ”—https://drive.google.com/drive/mobile/folders/179D_slEOLXWOTeFdmRrMkdV8C4DSLdYT?s=08

🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2πŸ₯°2πŸ™1
🟒 WORLD DANGEROUS HACKERS TOOL EXPOSE 🟒 Part 1

πŸ†•  Pish web tool
πŸ”— Link : https://github.com/Cabdulahi/pish

πŸ†• MITM attack tool
πŸ”— Link : https://github.com/websploit/websploit

πŸ†• kill shot pentesting framework
πŸ”— Link :https://github.com/bahaabdelwahed/killshot

❗️ Facebook Tool Links ❗️

πŸ†• Facebook information gathering
πŸ”— Link :  git clone https://github.com/CiKu370/OSIF.git

πŸ†• Facebook Toolkit + bots,  dump private data
πŸ”— Link : https://github.com/warifp/FacebookToolkit

πŸ†• Facebook cracking tool Fcrack.py
πŸ”— Link : https://github.com/INDOnimous/FB-Crack-

πŸ†• Facebook and yahoo account cloner
πŸ”— Link : https://gitlab.com/W1nz0N/fyc.git

πŸ†• Facebook report tool
πŸ”— Link : git clone https://github.com/IlayTamvan/Report

πŸ†• Facebook BruteFoRce Tool
πŸ”— Link : https://github.com/IAmBlackHacker/Facebook-BruteForce

πŸ†• Facebook hacking ASU
πŸ”— Link : git clone https://github.com/LOoLzeC/ASU

πŸ†• Facebook Downloader
πŸ”— Link : https://github.com/barba99/facebook-spotify-youtube-descargar

πŸ†• Hack Facebook MBF
πŸ”— Link : git clone https://github.com/Rizky-ID/autombf

πŸ†• Facebook Repot3
πŸ”— Link : git clone https://github.com/PangeranAlvins/Repot3

πŸ†• Facebook Information Gathering
πŸ”— Link : https://github.com/xHak9x/fbi

πŸ†• Facebook Brute with TOR
πŸ”— Link : https://github.com/thelinuxchoice/facebash


πŸ‘‰πŸŸ’@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘‰Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ”₯2❀1πŸ‘1🀯1
⚑️SpyScraper: Osint tool to scraper websites⚑️

🍳Scraping skills:

🎯emails
🎯phones numbers
🎯hrefs
🎯author
🎯date of creation/update/expiration
🎯location
🎯servers names

Github : https://github.com/N0rz3/SpyScraper

πŸ‘‰πŸŸ’Join: @hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ”₯1
🟒Hacking Tools Cheat Sheet

πŸ”ΉInformation Gathering
πŸ”ΉVulnerability DBs & Exploits
πŸ”ΉCracking
πŸ”ΉMetasploit Framework
πŸ”ΉHTTP Tools
πŸ”ΉSniffing
πŸ”ΉLinux Privilege Escalation
πŸ”ΉWindows Privilege Escalation
πŸ”ΉNetwork Scanning
πŸ”ΉWindows Credentials Gathering
πŸ”ΉShells
πŸ”ΉNTLM Relay
πŸ”ΉActive Directory
πŸ”ΉPass-the-Hash

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯2πŸ‘1
πŸŸ’πŸ“‘Wireless Penetration Testing Tools

πŸ”ΉWIFISpy
πŸ“ WiFiSpy is a tool written to automate powerful wifi / local attacks, with its nice user friendly console and easy-to-use, WiFiSpy can deliver a powerful ability to break in a network or even spy over a network!
πŸ”—https://github.com/DeaDHackS/WiFiSpy

πŸ”ΉAirattackit
πŸ“Automated Wireless Attack Framework
πŸ”—https://github.com/JoyGhoshs/Airattackit

πŸ”Ήehtools
πŸ“Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools
πŸ”—https://github.com/jawaharputti/EHTools

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ™2πŸ‘1
πŸŸ’πŸ”“Crack WPA/WPA2-PSK using Aircrack-ng and Hashcat

πŸŸ’πŸ“This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network’s security or break into one nearby.

The attack outlined below is entirely passive and it is impossible to detect provided that you don’t actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and to get the handshake value.

πŸ”—https://en.hacks.gr/2023/11/13/crack-wpa-wpa2-psk-using-aircrack-ng-and-hashcat/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°2πŸ‘1
Forwarded from Buna Byte Cybersecurity
🟒You can find the book you want by the link ....wish you all good time "Remember if you push your limits you become part of The Top 1%"πŸ‘ΎπŸ‘Ύ

♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️
♻️ πŸ”΄Hacking Books 😎 ♻️
♻️ πŸ”΄Networking Books😎 ♻️
♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️♻️


🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2
🟒50 Top Digital Forensics Tools

πŸ”·Network Forensic Tools
πŸ”ΈNmap
πŸ”Έ Wireshark
πŸ”ΈXplico
πŸ”ΈSnort
πŸ”ΈTCPDump
πŸ”ΈThe Slueth Kit

πŸ”·Mobile Forensics Tools
πŸ”ΈElcomspoft iOS Forensic Toolkit
πŸ”ΈMobile Verification Toolkit
πŸ”ΈOxygen Forensic
πŸ”ΈMOBILedit
πŸ”ΈCellebrite UFED
πŸ”ΈMSAB XRY

πŸ”·Malware Analysis Tools
πŸ”ΈWireshark
πŸ”ΈYARA
πŸ”ΈMalwarebytes
πŸ”ΈVirusTotal
πŸ”ΈCuckoo Sandbox
πŸ”ΈIDA Pro

πŸ”·Data Recovery Tools
πŸ”ΈRecuva
πŸ”ΈEaseUS Data Recovery
πŸ”ΈTestDisk
πŸ”ΈStellar Data Recovery
πŸ”ΈPhotoRec
πŸ”ΈDisk Drill

πŸ”·Email Forensic Tools
πŸ”ΈMailXaminer
πŸ”ΈMailPro+
πŸ”ΈXtraxtor
πŸ”ΈAid4Mail
πŸ”ΈeMailTrackerPro
πŸ”ΈAutopsy

πŸ”·OSINT Tools
πŸ”ΈMaltego
πŸ”ΈNmap
πŸ”ΈOSINT Framework
πŸ”ΈShodan
πŸ”ΈRecon-ng
πŸ”ΈTheHavester

πŸ”·Live Forensics Tools
πŸ”ΈOS Forensics
πŸ”ΈEncase Live
πŸ”ΈCAINE
πŸ”ΈF-Response
πŸ”ΈKali Linux Forensic Mode

πŸ”·Memory Forensics Tools
πŸ”ΈVolatility
πŸ”ΈDumpIt
πŸ”ΈmemDump
πŸ”ΈAccess data FTK Imager
πŸ”ΈHibernation Recon
πŸ”ΈWindowSCOPE

πŸ”·Cloud Forensic Tools
πŸ”ΈMagnet AXIOM
πŸ”ΈMSAB XRY Cloud
πŸ”ΈAzure CLI


Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ₯°1
10 Website to Learn Ethical Hacking

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ‘1
🟒Top tech Skills In Demand 2024

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ‘Œ2
🟒The Complete Ethical Hacking Course

πŸ“What Will You Learn:

πŸ’» Hacking Lab setup
πŸ’» Kali Linux 101
πŸ’» Anonymity Online
πŸ’» Dark Web
πŸ’» Network Pentesting
πŸ’» Wireless Attacks
πŸ’» Post Connection Attacks
πŸ’» System Pentesting
πŸ’» Attacks On Users
πŸ’» Social Engineering
πŸ’» Social Media Security
πŸ’» Beef
πŸ’» External Networks Attacks
πŸ’» Fake Game Websites Attack
πŸ’» Post Hacking Sessions
πŸ’» Hacker Methodology
πŸ’» Website Reconnaissance
πŸ’» Website Pentesting
πŸ’» SQL 101
πŸ’» SQL Injection
πŸ’» Website Pentesting Tools
πŸ’» Ethical Hacking Certifications
πŸ’» Python For Ethical Hacking
πŸ’» Python Data Types & Structure
πŸ’» Control Statements & Loops
πŸ’» Essentials
πŸ’» Functions
πŸ’» Object Oriented Programming
πŸ’» Modules
πŸ’» Mac Changer
πŸ’» Network Scanner
πŸ’» Man In The Middle
πŸ’» Packet Listener
πŸ’» Keylogger
πŸ’» Backdoor
πŸ’» Packaging & Malicious Files
πŸ’» Closing & Ethical Hacker's Handbook And many More things

πŸ“šSize: 9.07 GB

πŸ”—https://mega.nz/folder/WvIlFCLQ#KHWbWS4Ez57R3jCdpYdREw/folder/yuwimBTD

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2πŸ₯°1πŸ‘1
🧬Networking Protocols Explained

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°3πŸ‘1πŸ”₯1πŸ‘1
πŸŸ’βš”οΈMan in the Middle: Network Attacks

πŸ”ΉSSLStripping
πŸ”ΉBGP Hijacking
πŸ”ΉRogue Devices
πŸ”ΉPacket Sniffing
πŸ”ΉARP Spoofing & Poisoning
πŸ”ΉWi-Fi Eaves Dropping
πŸ”ΉEvil Twin Attacks
πŸ”ΉSession Hijacking
πŸ”ΉDNS Spoofing & Poisoning
πŸ”ΉMalware & Trojans

Join🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ‘1
🟒Web Applications Proxies πŸ”°


πŸ”Ή Burpsuite - Burpsuite is a graphical tool for testing Web application security.
πŸ”—https://portswigger.net/

πŸ”ΉZAP One of the world’s most popular free security tools.
πŸ”—https://github.com/zaproxy/zaproxy

πŸ”ΉMitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
πŸ”—https://github.com/mitmproxy/mitmproxy

πŸ”ΉBroxy - An HTTP/HTTPS intercept proxy written in Go.
πŸ”—https://github.com/rhaidiz/broxy

πŸ”ΉHetty - An HTTP toolkit for security research.
πŸ”—https://github.com/dstotijn/hetty

πŸ”ΉProxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
πŸ”—https://github.com/projectdiscovery/proxify

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ”₯1πŸ₯°1
πŸ‘¨β€πŸ’»How to Spot a Pentester
πŸ‘2πŸ”₯1πŸ₯°1
🧬Hashing Vs Encryption vs Encoding: A Brief Comparison

πŸ“œHashing:
This is primarily used for data integrity verification and password storage.
It involves applying the Hash function to data, this generates a fixed-size structure of characters (hash value) that is unique to the input data.

πŸ”’Encryption:
This is used to protect the confidentiality of data during transmission or storage.
It uses algorithms and a key to transform plaintext into cipher text , making it unreadable without the corresponding decryption key.

πŸ›‘οΈEncoding:
Encoding is a method of converting data to a different format for safe and efficient data transmission.
Encoding is typically reversible, meaning the original data can be obtained by reversing the process.
Unlike Hashing and Encryption, Encoding is not designed to keep data secret.

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2πŸ”₯1πŸ‘1
🟒Network and Communication Security Cheat sheet

πŸ”ΉOSI Reference Model
πŸ”ΉCommon TCP Protocols
πŸ”ΉAttack in OSI Layers
πŸ”ΉHardware Devices
πŸ”ΉIP Addresses
πŸ”ΉNetwork Types
πŸ”ΉNetworking Methods & Standards

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ₯°1😁1