β‘οΈSpyScraper: Osint tool to scraper websitesβ‘οΈ
π³Scraping skills:
π―emails
π―phones numbers
π―hrefs
π―author
π―date of creation/update/expiration
π―location
π―servers names
Github : https://github.com/N0rz3/SpyScraper
ππ’Join: @hacker_habeshaπͺπΉ
π³Scraping skills:
π―emails
π―phones numbers
π―hrefs
π―author
π―date of creation/update/expiration
π―location
π―servers names
Github : https://github.com/N0rz3/SpyScraper
ππ’Join: @hacker_habeshaπͺπΉ
β€2π₯°2π₯1
π’Hacking Tools Cheat Sheet
πΉInformation Gathering
πΉVulnerability DBs & Exploits
πΉCracking
πΉMetasploit Framework
πΉHTTP Tools
πΉSniffing
πΉLinux Privilege Escalation
πΉWindows Privilege Escalation
πΉNetwork Scanning
πΉWindows Credentials Gathering
πΉShells
πΉNTLM Relay
πΉActive Directory
πΉPass-the-Hash
Join:π’@hacker_habeshaπͺπΉ
πΉInformation Gathering
πΉVulnerability DBs & Exploits
πΉCracking
πΉMetasploit Framework
πΉHTTP Tools
πΉSniffing
πΉLinux Privilege Escalation
πΉWindows Privilege Escalation
πΉNetwork Scanning
πΉWindows Credentials Gathering
πΉShells
πΉNTLM Relay
πΉActive Directory
πΉPass-the-Hash
Join:π’@hacker_habeshaπͺπΉ
β€2π₯2π1
π’π‘Wireless Penetration Testing Tools
πΉWIFISpy
π WiFiSpy is a tool written to automate powerful wifi / local attacks, with its nice user friendly console and easy-to-use, WiFiSpy can deliver a powerful ability to break in a network or even spy over a network!
πhttps://github.com/DeaDHackS/WiFiSpy
πΉAirattackit
πAutomated Wireless Attack Framework
πhttps://github.com/JoyGhoshs/Airattackit
πΉehtools
πWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools
πhttps://github.com/jawaharputti/EHTools
Join:π’@hacker_habeshaπͺπΉ
πΉWIFISpy
π WiFiSpy is a tool written to automate powerful wifi / local attacks, with its nice user friendly console and easy-to-use, WiFiSpy can deliver a powerful ability to break in a network or even spy over a network!
πhttps://github.com/DeaDHackS/WiFiSpy
πΉAirattackit
πAutomated Wireless Attack Framework
πhttps://github.com/JoyGhoshs/Airattackit
πΉehtools
πWi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools
πhttps://github.com/jawaharputti/EHTools
Join:π’@hacker_habeshaπͺπΉ
β€2π2π1
π’πCrack WPA/WPA2-PSK using Aircrack-ng and Hashcat
π’πThis is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own networkβs security or break into one nearby.
The attack outlined below is entirely passive and it is impossible to detect provided that you donβt actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and to get the handshake value.
πhttps://en.hacks.gr/2023/11/13/crack-wpa-wpa2-psk-using-aircrack-ng-and-hashcat/
Join:π’@hacker_habeshaπͺπΉ
π’πThis is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own networkβs security or break into one nearby.
The attack outlined below is entirely passive and it is impossible to detect provided that you donβt actually use the password that you crack. An optional active deauthentication attack can be used to speed up the reconnaissance process and to get the handshake value.
πhttps://en.hacks.gr/2023/11/13/crack-wpa-wpa2-psk-using-aircrack-ng-and-hashcat/
Join:π’@hacker_habeshaπͺπΉ
β€2π₯°2π1
Forwarded from Buna Byte Cybersecurity
π’You can find the book you want by the link ....wish you all good time "Remember if you push your limits you become part of The Top 1%"πΎπΎ
β»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈ
β»οΈ π΄Hacking Books π β»οΈ
β»οΈ π΄Networking Booksπ β»οΈ
β»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈ
π’@hacker_habeshaπͺπΉ
β»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈ
β»οΈ π΄Hacking Books π β»οΈ
β»οΈ π΄Networking Booksπ β»οΈ
β»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈβ»οΈ
π’@hacker_habeshaπͺπΉ
π2
π’50 Top Digital Forensics Tools
π·Network Forensic Tools
πΈNmap
πΈ Wireshark
πΈXplico
πΈSnort
πΈTCPDump
πΈThe Slueth Kit
π·Mobile Forensics Tools
πΈElcomspoft iOS Forensic Toolkit
πΈMobile Verification Toolkit
πΈOxygen Forensic
πΈMOBILedit
πΈCellebrite UFED
πΈMSAB XRY
π·Malware Analysis Tools
πΈWireshark
πΈYARA
πΈMalwarebytes
πΈVirusTotal
πΈCuckoo Sandbox
πΈIDA Pro
π·Data Recovery Tools
πΈRecuva
πΈEaseUS Data Recovery
πΈTestDisk
πΈStellar Data Recovery
πΈPhotoRec
πΈDisk Drill
π·Email Forensic Tools
πΈMailXaminer
πΈMailPro+
πΈXtraxtor
πΈAid4Mail
πΈeMailTrackerPro
πΈAutopsy
π·OSINT Tools
πΈMaltego
πΈNmap
πΈOSINT Framework
πΈShodan
πΈRecon-ng
πΈTheHavester
π·Live Forensics Tools
πΈOS Forensics
πΈEncase Live
πΈCAINE
πΈF-Response
πΈKali Linux Forensic Mode
π·Memory Forensics Tools
πΈVolatility
πΈDumpIt
πΈmemDump
πΈAccess data FTK Imager
πΈHibernation Recon
πΈWindowSCOPE
π·Cloud Forensic Tools
πΈMagnet AXIOM
πΈMSAB XRY Cloud
πΈAzure CLI
Join:π’@hacker_habeshaπͺπΉ
π·Network Forensic Tools
πΈNmap
πΈ Wireshark
πΈXplico
πΈSnort
πΈTCPDump
πΈThe Slueth Kit
π·Mobile Forensics Tools
πΈElcomspoft iOS Forensic Toolkit
πΈMobile Verification Toolkit
πΈOxygen Forensic
πΈMOBILedit
πΈCellebrite UFED
πΈMSAB XRY
π·Malware Analysis Tools
πΈWireshark
πΈYARA
πΈMalwarebytes
πΈVirusTotal
πΈCuckoo Sandbox
πΈIDA Pro
π·Data Recovery Tools
πΈRecuva
πΈEaseUS Data Recovery
πΈTestDisk
πΈStellar Data Recovery
πΈPhotoRec
πΈDisk Drill
π·Email Forensic Tools
πΈMailXaminer
πΈMailPro+
πΈXtraxtor
πΈAid4Mail
πΈeMailTrackerPro
πΈAutopsy
π·OSINT Tools
πΈMaltego
πΈNmap
πΈOSINT Framework
πΈShodan
πΈRecon-ng
πΈTheHavester
π·Live Forensics Tools
πΈOS Forensics
πΈEncase Live
πΈCAINE
πΈF-Response
πΈKali Linux Forensic Mode
π·Memory Forensics Tools
πΈVolatility
πΈDumpIt
πΈmemDump
πΈAccess data FTK Imager
πΈHibernation Recon
πΈWindowSCOPE
π·Cloud Forensic Tools
πΈMagnet AXIOM
πΈMSAB XRY Cloud
πΈAzure CLI
Join:π’@hacker_habeshaπͺπΉ
π2β€1π₯°1
π’The Complete Ethical Hacking Course
πWhat Will You Learn:
π» Hacking Lab setup
π» Kali Linux 101
π» Anonymity Online
π» Dark Web
π» Network Pentesting
π» Wireless Attacks
π» Post Connection Attacks
π» System Pentesting
π» Attacks On Users
π» Social Engineering
π» Social Media Security
π» Beef
π» External Networks Attacks
π» Fake Game Websites Attack
π» Post Hacking Sessions
π» Hacker Methodology
π» Website Reconnaissance
π» Website Pentesting
π» SQL 101
π» SQL Injection
π» Website Pentesting Tools
π» Ethical Hacking Certifications
π» Python For Ethical Hacking
π» Python Data Types & Structure
π» Control Statements & Loops
π» Essentials
π» Functions
π» Object Oriented Programming
π» Modules
π» Mac Changer
π» Network Scanner
π» Man In The Middle
π» Packet Listener
π» Keylogger
π» Backdoor
π» Packaging & Malicious Files
π» Closing & Ethical Hacker's Handbook And many More things
πSize: 9.07 GB
πhttps://mega.nz/folder/WvIlFCLQ#KHWbWS4Ez57R3jCdpYdREw/folder/yuwimBTD
Join:π’@hacker_habeshaπͺπΉ
πWhat Will You Learn:
π» Hacking Lab setup
π» Kali Linux 101
π» Anonymity Online
π» Dark Web
π» Network Pentesting
π» Wireless Attacks
π» Post Connection Attacks
π» System Pentesting
π» Attacks On Users
π» Social Engineering
π» Social Media Security
π» Beef
π» External Networks Attacks
π» Fake Game Websites Attack
π» Post Hacking Sessions
π» Hacker Methodology
π» Website Reconnaissance
π» Website Pentesting
π» SQL 101
π» SQL Injection
π» Website Pentesting Tools
π» Ethical Hacking Certifications
π» Python For Ethical Hacking
π» Python Data Types & Structure
π» Control Statements & Loops
π» Essentials
π» Functions
π» Object Oriented Programming
π» Modules
π» Mac Changer
π» Network Scanner
π» Man In The Middle
π» Packet Listener
π» Keylogger
π» Backdoor
π» Packaging & Malicious Files
π» Closing & Ethical Hacker's Handbook And many More things
πSize: 9.07 GB
πhttps://mega.nz/folder/WvIlFCLQ#KHWbWS4Ez57R3jCdpYdREw/folder/yuwimBTD
Join:π’@hacker_habeshaπͺπΉ
π2π₯°1π1
π’βοΈMan in the Middle: Network Attacks
πΉSSLStripping
πΉBGP Hijacking
πΉRogue Devices
πΉPacket Sniffing
πΉARP Spoofing & Poisoning
πΉWi-Fi Eaves Dropping
πΉEvil Twin Attacks
πΉSession Hijacking
πΉDNS Spoofing & Poisoning
πΉMalware & Trojans
Joinπ’@hacker_habeshaπͺπΉ
πΉSSLStripping
πΉBGP Hijacking
πΉRogue Devices
πΉPacket Sniffing
πΉARP Spoofing & Poisoning
πΉWi-Fi Eaves Dropping
πΉEvil Twin Attacks
πΉSession Hijacking
πΉDNS Spoofing & Poisoning
πΉMalware & Trojans
Joinπ’@hacker_habeshaπͺπΉ
π2β€1π1
π’Web Applications Proxies π°
πΉ Burpsuite - Burpsuite is a graphical tool for testing Web application security.
πhttps://portswigger.net/
πΉZAP One of the worldβs most popular free security tools.
πhttps://github.com/zaproxy/zaproxy
πΉMitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
πhttps://github.com/mitmproxy/mitmproxy
πΉBroxy - An HTTP/HTTPS intercept proxy written in Go.
πhttps://github.com/rhaidiz/broxy
πΉHetty - An HTTP toolkit for security research.
πhttps://github.com/dstotijn/hetty
πΉProxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
πhttps://github.com/projectdiscovery/proxify
Join:π’@hacker_habeshaπͺπΉ
πΉ Burpsuite - Burpsuite is a graphical tool for testing Web application security.
πhttps://portswigger.net/
πΉZAP One of the worldβs most popular free security tools.
πhttps://github.com/zaproxy/zaproxy
πΉMitmproxy - An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
πhttps://github.com/mitmproxy/mitmproxy
πΉBroxy - An HTTP/HTTPS intercept proxy written in Go.
πhttps://github.com/rhaidiz/broxy
πΉHetty - An HTTP toolkit for security research.
πhttps://github.com/dstotijn/hetty
πΉProxify - Swiss Army knife Proxy tool for HTTP/HTTPS traffic capture, manipulation, and replay on the go.
πhttps://github.com/projectdiscovery/proxify
Join:π’@hacker_habeshaπͺπΉ
π3π₯1π₯°1
π§¬Hashing Vs Encryption vs Encoding: A Brief Comparison
πHashing:
This is primarily used for data integrity verification and password storage.
It involves applying the Hash function to data, this generates a fixed-size structure of characters (hash value) that is unique to the input data.
πEncryption:
This is used to protect the confidentiality of data during transmission or storage.
It uses algorithms and a key to transform plaintext into cipher text , making it unreadable without the corresponding decryption key.
π‘οΈEncoding:
Encoding is a method of converting data to a different format for safe and efficient data transmission.
Encoding is typically reversible, meaning the original data can be obtained by reversing the process.
Unlike Hashing and Encryption, Encoding is not designed to keep data secret.
Join:π’@hacker_habeshaπͺπΉ
πHashing:
This is primarily used for data integrity verification and password storage.
It involves applying the Hash function to data, this generates a fixed-size structure of characters (hash value) that is unique to the input data.
πEncryption:
This is used to protect the confidentiality of data during transmission or storage.
It uses algorithms and a key to transform plaintext into cipher text , making it unreadable without the corresponding decryption key.
π‘οΈEncoding:
Encoding is a method of converting data to a different format for safe and efficient data transmission.
Encoding is typically reversible, meaning the original data can be obtained by reversing the process.
Unlike Hashing and Encryption, Encoding is not designed to keep data secret.
Join:π’@hacker_habeshaπͺπΉ
π2π₯1π1
π’Network and Communication Security Cheat sheet
πΉOSI Reference Model
πΉCommon TCP Protocols
πΉAttack in OSI Layers
πΉHardware Devices
πΉIP Addresses
πΉNetwork Types
πΉNetworking Methods & Standards
Join:π’@hacker_habeshaπͺπΉ
πΉOSI Reference Model
πΉCommon TCP Protocols
πΉAttack in OSI Layers
πΉHardware Devices
πΉIP Addresses
πΉNetwork Types
πΉNetworking Methods & Standards
Join:π’@hacker_habeshaπͺπΉ
β€2π₯°1π1
π’βοΈApplication Structure and the Attacks at each Layer
πΉClient-Side Attacks
πΉWeb Application Attacks
πΉDDoS Attacks
Join:π’@hacker_habeshaπͺπΉ
πΉClient-Side Attacks
πΉWeb Application Attacks
πΉDDoS Attacks
Join:π’@hacker_habeshaπͺπΉ
π2π₯1π₯°1π1
π₯Hacking Tools Collection
1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering
#DDoS
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest
#Forensics
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk
#Programming
1. Notepad++
2. Visual Studio
3. Text Editor
#Exploitation
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis
#Phone_Hacking
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote
#Server_Hacking
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS
#Client_Hacking
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar
#Website_Hacking
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA
#Network_Hacking
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra
#Wireless_Hacking
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin
#Reverse_Engeenering
1. OWASP-ZSC
2. OllyDBG
3. Apktool
#OSINT
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool
Join:π’@hacker_habeshaπͺπΉ
1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering
#DDoS
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest
#Forensics
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk
#Programming
1. Notepad++
2. Visual Studio
3. Text Editor
#Exploitation
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis
#Phone_Hacking
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote
#Server_Hacking
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS
#Client_Hacking
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar
#Website_Hacking
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA
#Network_Hacking
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra
#Wireless_Hacking
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin
#Reverse_Engeenering
1. OWASP-ZSC
2. OllyDBG
3. Apktool
#OSINT
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool
Join:π’@hacker_habeshaπͺπΉ
π3π₯2β€1
π‘οΈCyberSecurity Ecosystem
πΉPeople
πΉHardware
πΉSoftware
πΉNetwork
πΉData Risk & Compliance
Join:π’@hacker_habeshaπͺπΉ
πΉPeople
πΉHardware
πΉSoftware
πΉNetwork
πΉData Risk & Compliance
Join:π’@hacker_habeshaπͺπΉ
π3π₯°1
π‘οΈ7 Subfields of CyberSecurity
πΉDigital Forensic & Incident Response
πΉCyber Defence
πΉOsint
πΉPurple Team
πΉICS/OT Security
πΉCloud
πΉOffensive Security
Join:π’@hacker_habeshaπͺπΉ
πΉDigital Forensic & Incident Response
πΉCyber Defence
πΉOsint
πΉPurple Team
πΉICS/OT Security
πΉCloud
πΉOffensive Security
Join:π’@hacker_habeshaπͺπΉ
π₯°2π1