Buna Byte Cybersecurity
841 subscribers
273 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

πŸ“§ Contact Email: info@bunabyte.com
Download Telegram
Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ₯°1
πŸ’£DDoS Tools

πŸ”ΉAnevicon - Powerful UDP-based load generator, written in Rust.
πŸ”—https://github.com/rozgo/anevicon

πŸ”ΉD(HE)ater - D(HE)ater sends forged cryptographic handshake messages to enforce the Diffie-Hellman key exchange.
πŸ”—https://github.com/Balasys/dheater

πŸ”ΉHOIC - Updated version of Low Orbit Ion Cannon, has 'boosters' to get around common counter measures.
πŸ”—https://sourceforge.net/projects/high-orbit-ion-cannon/

πŸ”ΉLow Orbit Ion Canon (LOIC) - Open source network stress tool written for Windows.
πŸ”—https://github.com/NewEraCracker/LOIC

πŸ”ΉMemcrashed - DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API.
πŸ”—https://github.com/649/Memcrashed-DDoS-Exploit

πŸ”ΉSlowLoris - DoS tool that uses low bandwidth on the attacking side.
πŸ”—https://github.com/gkbrk/slowloris

πŸ”ΉT50 - Faster network stress tool.
πŸ”—https://gitlab.com/fredericopissarra/t50/

πŸ”ΉUFONet - Abuses OSI layer 7 HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc.
πŸ”—https://github.com/epsylon/ufonet

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ₯°1
🎣Phishing Email Check

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ‘1
❀2πŸ”₯1πŸ‘1
Here is another Training and Internship opportunity πŸš€ Apply here πŸ‘‡πŸ‘‡

https://nas.io/cybersecuredindia
πŸ‘2πŸ₯°1πŸ‘1
πŸͺHTTP Cookie Explained

πŸ”ΉWhat?
πŸ”ΉHow it works?
πŸ”ΉSet-Cookie
πŸ”ΉCookie
πŸ”ΉPurposes

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ‘1πŸ₯°1
πŸ’‰The Ultimate SQLmap Tutorial: Master SQL Injection and Vulnerability Assessment!

πŸ“SQL Injection is a type of cyber attack where malicious actors exploit vulnerabilities in web applications to inject malicious SQL code into backend databases. This can lead to the exposure of sensitive data, unauthorized access to systems, and even complete system compromise.

SQLmap is a powerful open-source tool used to automate the process of detecting and exploiting SQL Injection vulnerabilities in web applications. It is a command-line tool that can be used to enumerate databases, extract data, and even execute operating system commands on the underlying system.

πŸ”—https://en.hacks.gr/2023/12/15/the-ultimate-sqlmap-tutorial-master-sql-injection-and-vulnerability-assessment/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ‘1
🟒WEB APPLICATION SECURITY TESTING COURSES

▫️Web Application Security Testing Encoding, Filtering & Evasion Basics (4.36GB)
▫️Web Application Penetration Testing File & Resource Attacks (4.61GB)
▫️Web Application Security Testing Web Service Security Testing (3.37GB)
▫️Web Application Security Testing Testing for Common Attacks (3.23GB)
▫️Web Application Security Testing CMS Security Testing (6.31GB)

πŸ”—https://mega.nz/folder/byp2CIra#Jvj3A1qZCgUFeawGL_3Wxg

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1πŸ₯°1
🟒⚑Automatic Vulnerability Scanning for APIs Using OWASP ZAP (crAPI as an exmaple)

πŸ•΅οΈVulnerability Scanning is the technique with which we will try to find vulnerabilities in the system and/or web application, API, Mobile App, using some sort of an automated scanner to get security misconfigurations.

βš’οΈthere are many vulnerability scanners that are great tools to pentesters. Such as Acunetix, Netsparker, Nessus, Openvas, Burp Suite Professional, etc. But in this article we will be using the free and opensource OWASP ZAP as our Vulnerability Scanner.

βš™οΈAPIs are a bit different than normal Web Applications and sometimes using Automated tools like Nikto won’t show us any good results.

πŸ”—https://en.hacks.gr/2023/12/15/automatic-vulnerability-scanning-for-apis-using-owasp-zap-crapi-as-an-exmaple/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘2❀1🀩1
⛏Virtual Host Enumeration for Uncovering Hidden Subdomains

πŸ“Tools and Techniques for efficient virtual host discovery

πŸ”—https://en.hacks.gr/2023/12/12/virtual-host-enumeration-for-uncovering-hidden-subdomains/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘5❀1πŸ‘1
⚑️Bypass SSL Pinning for Flutter

πŸ“Flutter is an open source framework by Google for building beautiful, natively compiled, multi-platform applications from a single codebase.

When Flutter launched in 2018, it mainly supported mobile app development. Flutter now supports application development on six platforms: iOS, Android, the web, Windows, MacOS, and Linux.

πŸ”—https://en.hacks.gr/2023/12/19/bypass-ssl-pinning-for-flutter/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘4❀1πŸ₯°1
🌍Hackers Search Engines

πŸ“Security researchers, analysts, and others can use hacker-friendly search engines. In the field of security operations, these tools can help in the discovery of vulnerable devices, tracking of threats, planning for spear phishing simulations, and much more.

This list includes special search engines that assist security professionals in finding information on connected devices, private data on individuals (in a more curated manner than traditional search engines offer), breached credentials, and other topics.

πŸ”—https://en.iguru.gr/shodan-pio-epikindyni-michani-anazitisis-ston-kosmo/

JOIN:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘5πŸ‘1🀩1
πŸ“±Android Pentesting 101: A Novice’s Handbook to Getting Started

πŸ“Android pentesting is the process of evaluating the security of an Android application by identifying its vulnerabilities and weaknesses. It involves analyzing the application’s source code, binary files, and network traffic to find security flaws. There are mainly 2 parts Static and Dynamic analysis

Static analysis involves examining an application’s code and configuration files without executing it, while dynamic analysis involves testing the application in a running state to observe its behavior and interactions. Both approaches are important for testing the security of an Android application.

πŸ”—https://en.hacks.gr/2023/12/20/android-pentesting-101-a-novices-handbook-to-getting-started/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ₯°1
πŸ“šPractical Ethical Hacking from Beginning to Advance!

πŸ“A Complete Free Course: Learn Ethical Hacking From Scratch!

πŸ”—https://drive.google.com/drive/u/0/mobile/folders/1if6MCeBCj8sxWwJIKhtgwU0GBuBW8uLx?s=09&pli=1

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ”₯2πŸ₯°1🀩1
⚠️DLL Hijacking Basics

πŸ“DLL Hijacking is a type cyberattack where a malicious actor takes advantage of a system’s search order for dynamic link libraries (DLL) to load and execute malicious code instead of legitimate libraries. In other words, it refers to tricking a program to load a harmful code library instead of the intended safe one. Before going into details, let’s take a look at DLL Files.

πŸ”—https://en.hacks.gr/2023/12/20/dll-hijacking-basics/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ₯°3πŸ‘1
πŸ“Captcha Bypass

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3😁1
🩸Exploit Eternal Blue (MS17–010) for Window 7 and higher (custom payload)

πŸ“This article shows you how to exploit the MS17–010 vulnerability on Windows 7 or higher.

πŸ”—https://en.hacks.gr/2023/12/22/exploit-eternal-blue-ms17-010-for-window-7-and-higher-custom-payload/

Join🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀3πŸ₯°1
🟒This year we made a ranking with the most popular tools between January and December 2023.πŸ˜‹



The tools of this year encompass a diverse range of cybersecurity disciplines, including AI-Enhanced Penetration Testing, Advanced Vulnerability Management, Stealth Communication Techniques, Open-Source General Purpose Vulnerability Scanning, and more.πŸ€—


Without going into further details, we have prepared a useful list of the most popular tools in Kitploit 2023:πŸ˜‹

🟒 (https://www.kitploit.com/2022/12/top-20-most-popular-hacking-tools-in.html)

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀2πŸ”₯1πŸ₯°1
🧰CrackMapexec | SMB & AD Enumeration Simplified!

πŸ“Have you ever found yourself staring at a Windows network, wondering how to find vulnerabilities and security holes? Don’t worry, CrackMapExec is here to save the day! It’s like having a Swiss Army knife for your penetration testing needs.

πŸ”—https://en.hacks.gr/2023/12/15/crackmapexec-smb-ad-enumeration-simplified/

Join:🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
❀3πŸ‘1
πŸ’£ Buffer Overflow

πŸ“From memory structure and ROP to Linux and Windows 11 real examples.

πŸ”ΉPart 1 https://en.hacks.gr/2023/10/28/buffer-overflow-part-i/

πŸ”ΉPart 2 https://en.hacks.gr/2023/10/29/buffer-overflow-part-ii/

πŸ”ΉPart 3 https://en.hacks.gr/2023/11/08/buffer-overflow-part-iii/

πŸ”ΉPart 4 https://en.hacks.gr/2023/11/09/buffer-overflow-part-iv/


Join: 🟒@hacker_habeshaπŸ‡ͺπŸ‡Ή
πŸ‘3πŸ”₯1