Buna Byte Cybersecurity
841 subscribers
273 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
πŸ”₯Hacking Tools Collection

1. DDoS
2. Forensics
3. Programming
4. Exploitation
5. Phone Hacking
6. Server Hacking
7. Client Hacking
8. Website Hacking
9. Network Hacking
10. Wireless Hacking
11. Reverse Engeenering
12. Information Gathering

#DDoS
1. MDK3
2. LOIC
3. HULK
4. DDOSIM
5. Ufonet
6. Hping3
7. Xerxes
8. Hammer
9. Slowloris
10. Websploit
11. GoldenEye
12. Metasploit
13. Aireplay-ng
14. Slowhttptest

#Forensics
1. COFEE
2. Volafox
3. Autopsy
4. Foremost
5. Hashdeep
6. Binwalk

#Programming
1. Notepad++
2. Visual Studio
3. Text Editor

#Exploitation
1. Metasploit
2. Sqlmap
3. Core Imact
4. W3af
5. BeEF
6. Dradis

#Phone_Hacking
1. Metasploit
2. Apktool
3. Droidjack
4. AndroRAT
5. Spynote

#Server_Hacking
1. SQLmap
2. Jsql
3. Havij
4. Hydra
5. Metasploit
6. Armitage
7. Brupsuite
8. Owasp-ZAP
9. Invicti
10. Acunetix
11. OpenVAS

#Client_Hacking
1. Darkcomet
2. FatRat
3. Veil-Evasion
4. Shallter
5. Unicorn
6. Setoolkit
7. Armitage
8. BeEF-Framework
9. EmPyre
10. FakeImageExploiter
11. Pupy
12. DFU-Programmer
13. Cobalt Strike
14. Exploitpack
15. Gcat
16. Crowbar

#Website_Hacking
1. Sn1per
2. Owasp-ZAP
3. Brupsuite
4. Invicti
5. Acunetix
6. SQLmap
7. Xsser
8. WPScan
9. Joomrra
10. Joomscan
11. WPSeku
12. XSStrike
13. Kadimus
14. jexboss
15. CMSmap
16. brut3k1t
17. 0d1n
18. CloudFail
19. Arachni
20. Nikto
21. Webscarab
22. Nmap
23. Vbscan
24. Sentry MBA

#Network_Hacking
1. MITMf
2. Bettercap
3. Ettercap
4. Tcpdump
5. Wireshark
6. Driftnet
7. SSLstrip
8. Armitage
9. Metasploit
10. Xerosploit
11. Sparta
12. Hydra

#Wireless_Hacking
1. Wifite
2. Airodump-ng
3. Aireplay-ng
4. Wash
5. WiFi Pumpkin
6. Wifiphisher
7. Fluxion
8. Infernal Twin
9. WPSpin

#Reverse_Engeenering
1. OWASP-ZSC
2. OllyDBG
3. Apktool

#OSINT
1. OSINT Framework
2. CheckUserNames
3. HaveIbeenPwned
4. SecurityTrails API
5. Censys
6. Wappalyzer
7. Google Dorks
8. Maltego
9. Recon-Ng
10. theHarvester
11. Shodan
12. Jigsaw
13. SpiderFoot
14. Creepy
15. Nmap
16. WebShag
17. OpenVAS
18. Fierce
19. Unicornscan
20. Foca
21. ZoomEye
22. OWASP Amass
23. IVRE
24. Metagoofil
25. Exiftool


Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ”₯2❀1
Credential Dump & Password Attack Tools πŸ”
πŸ›‘οΈCyberSecurity Ecosystem

πŸ”ΉPeople
πŸ”ΉHardware
πŸ”ΉSoftware
πŸ”ΉNetwork
πŸ”ΉData Risk & Compliance

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ₯°1
πŸ›‘οΈ7 Subfields of CyberSecurity

πŸ”ΉDigital Forensic & Incident Response
πŸ”ΉCyber Defence
πŸ”ΉOsint
πŸ”ΉPurple Team
πŸ”ΉICS/OT Security
πŸ”ΉCloud
πŸ”ΉOffensive Security

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°2πŸ‘1
🌐Hacker Search Engines: Phone Numbers

πŸ”ΉNumLookup - Free reverse phone lookup
πŸ”—https://www.numlookup.com/

πŸ”Ή SpyDialer - Free Reverse Lookup Search
πŸ”—https://spydialer.com/

πŸ”Ή WhitePages - Find people, contact info & background checks
πŸ”—https://www.whitepages.com/

πŸ”Ή National Cellular Directory - Begin your comprehensive people search now
πŸ”—https://www.nationalcellulardirectory.com/

πŸ”Ή Phone Validator - Is it a cell phone or is it a landline or is it a fake?
πŸ”—https://www.phonevalidator.com/

πŸ”Ή Free Carrier Lookup - Enter a phone number and we'll return the carrier name
πŸ”—https://freecarrierlookup.com/

πŸ”Ή RocketReach - Your first-degree connection to any professional
πŸ”—https://rocketreach.co/

πŸ”Ή sync.me - Find out who called
πŸ”—https://sync.me/

πŸ”Ή EmobileTracker - Track Mobile Owner Name, Location and Mobile Service Provider
πŸ”—https://www.emobiletracker.com/

πŸ”Ή Reverse Phone Lookup - Find Out The Owner Of A Phone Number
πŸ”—https://www.reversephonelookup.com/

πŸ”Ή ThatsThem - Reverse phone lookup
πŸ”—https://thatsthem.com/reverse-phone-lookup

πŸ”Ή thisnumber.com - International Phone Directories
πŸ”—https://www.thisnumber.com/

πŸ”Ή usphonebook.com - Free Reverse Phone Number Lookup
πŸ”—https://www.usphonebook.com/

πŸ”Ή truepeoplesearch.com - Get current address, cell phone number, email address, relatives, friends and a lot more
πŸ”—https://www.truepeoplesearch.com/#

πŸ”Ή Tellows - Who is calling? The phone number reverse search
πŸ”—https://www.tellows.com/

πŸ”Ή SynapsInt - The unified OSINT research tool
πŸ”—https://synapsint.com/

πŸ”Ή C99.nl - Over 57 quality API's and growing
πŸ”—https://api.c99.nl/

πŸ”Ή ValidNumber.com - Free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada
πŸ”—https://validnumber.com/

πŸ”Ή CellIdFinder - Nonprofit project wich helps you to find GSM BTS by MCC, MNC, LAC and CellID
πŸ”—https://cellidfinder.com/

πŸ”Ή OldPhoneBook - Intantly search a large selection from the past 20 years of USA phone listings
πŸ”—http://www.oldphonebook.com/

πŸ”Ή Spokeo - Search by name, phone, address, or email to confidentially lookup information about people you know
πŸ”—https://www.spokeo.com/

πŸ”Ή Intelius Phone Lookup - Look up a phone number to find owner information, carrier details, and more
πŸ”—https://www.intelius.com/reverse-phone-lookup/

πŸ”Ή ZabaSearch Phone Lookup - Reverse Phone Lookup Tool Can Uncover Personal Information, Social Media Data, Online Activity, Photos, and More
πŸ”—https://www.zabasearch.com/reverse-phone-lookup/

πŸ”Ή AnyWho Phone Lookup - Find out information associated with a phone number
πŸ”—https://www.anywho.com/reverse-phone-lookup/

πŸ”Ή Radaris Phone Lookup - Look up any phone number to see its owner and identify who's calling or texting you
πŸ”—https://radaris.com/#findPhoneH

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘4❀1πŸ”₯1
🦢Foot Printing

πŸ”ΉDomain Name
πŸ”ΉIP Adress
πŸ”ΉPhone Numbers
πŸ”ΉEmail Address
πŸ”ΉEmployees Information
πŸ”ΉNamespaces

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀3πŸ‘1
Awesome Github Scripts & Tools | Part #1

Article : https://lnkd.in/d-JK8MMn

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ”₯1
πŸ›‘Cyber security Acronyms

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ₯°1
πŸŸ’βš”οΈCommon Types of Password Attacks

πŸ”ΉBrute Force Attack
πŸ”ΉDictionary Attack
πŸ”ΉRainbow Table Attack
πŸ”ΉSocial Engineering Attacks
πŸ”ΉCredential Stuffing Attack

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀4πŸ”₯1πŸ‘1
🟒Common Types Of Wireless Attacks

πŸ”ΉPacket Sniffing
πŸ”ΉRogue Access Point
πŸ”ΉJamming
πŸ”ΉEvil Twin
πŸ”ΉWar Driving
πŸ”ΉBluejacking
πŸ”ΉBluesnarfing
πŸ”ΉWar Chalking
πŸ”ΉWPS Attack

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ‘1
🟒Types of Cyber Attacks

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘4❀1πŸ₯°1
🧬The DNS System Hierarchy

1️⃣Client
2️⃣DNS Cache
3️⃣DNS Resolver
4️⃣Root Server
5️⃣TLD Server
6️⃣Authoratative Server

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°4❀1πŸ”₯1
🎭Create a fake Access Point

πŸ“Think twice before connecting to a free public wireless hotspot at a coffee shop, airport or hotel. Ever wondered if the public Wi-Fi you just connected to is safe or if it could be an Evil Twin hotspot?

πŸ”—https://en.iguru.gr/dimiourgiste-ena-pseftiko-access-point/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ‘1πŸ₯°1
Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ₯°1
πŸ’£DDoS Tools

πŸ”ΉAnevicon - Powerful UDP-based load generator, written in Rust.
πŸ”—https://github.com/rozgo/anevicon

πŸ”ΉD(HE)ater - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.
πŸ”—https://github.com/Balasys/dheater

πŸ”ΉHOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
πŸ”—https://sourceforge.net/projects/high-orbit-ion-cannon/

πŸ”ΉLow Orbit Ion Canon (LOIC) - Open source network stress tool written for Windows.
πŸ”—https://github.com/NewEraCracker/LOIC

πŸ”ΉMemcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
πŸ”—https://github.com/649/Memcrashed-DDoS-Exploit

πŸ”ΉSlowLoris - DoS tool that uses low bandwidth on the attacking side.
πŸ”—https://github.com/gkbrk/slowloris

πŸ”ΉT50 - Faster network stress tool.
πŸ”—https://gitlab.com/fredericopissarra/t50/

πŸ”ΉUFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
πŸ”—https://github.com/epsylon/ufonet

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ₯°1
🎣Phishing Email Check

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ‘1
❀2πŸ”₯1πŸ‘1
Here is another Training and Internship opportunity πŸš€ Apply here πŸ‘‡πŸ‘‡

https://nas.io/cybersecuredindia
πŸ‘2πŸ₯°1πŸ‘1