Buna Byte Cybersecurity
845 subscribers
272 photos
10 videos
2 files
192 links
Learn, Hack, and Defend

Website: bunabyte.com
YouTube: youtube.com/@bunabyte
BunaByte Files: @hacker_habesha

📧 Contact Email: info@bunabyte.com
Download Telegram
👍3🤩21
🟢Here are 30 cybersecurity search engines

1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.

👉Join:@hacker_habesha🇪🇹
👉Join:@hacker_habesha🇪🇹
👍5👏1🤩1
📋List of Burp Extension Useful For Pentesting

👉Join:@hacker_habesha🇪🇹
👉Join:@hacker_habesha🇪🇹
👍5👌21🔥1
🔰 Mail Finder
━━━━━━━━━━━━━━━━━━
https://t.me/hacker_habesha
━━━━━━━━━━━━━━━━━━
OSINT tool for finding email by first and last name

━━━━━━━━━━━━━━━━━━
Installation:

apt install git

apt install python python2 python3 -y

pip3 install requests

git clone https://github.com/mishakorzik/MailFinder

cd MailFinder

python MailFinder.py

👉Join:@hacker_habesha🇪🇹
👉Join:@hacker_habesha🇪🇹
🔥51👍1
🟢 Youtube ቻናላችን ላይ የ
☕️Cybersecurity
☕️Ethical Hacking
☕️Embedded Systems
☕️Penetration Testing
☕️Networking
☕️Bug Bounty
እና ሁሉንም ኮምፒውተር  ነክ ነገር  ሙሉ በሙሉ በ ነጻ 💵ይማሩ!  እያደገ ያለውን communityችንን ይቀላቀሉ እና የቴክኖሎጂ ችሎታዎን ዛሬ ያሳድጉ!  አሁኑኑ Subscribe ያድርጉ!  

━━━━━━━━━━━━━━━━━━━━━━━━━━━━
 🟢Youtube: https://www.youtube.com/@bunabyte?sub_confirmation=1
🟢Telegram Channel - @hacker_habesha🇪🇹
━━━━━━━━━━━━━━━━━━━━━━━━━━━━
3👍2👏1
SOC Analyst😁
👉Join:@hacker_habesha🇪🇹
🤣5👍1
𝗖𝗘𝗡𝗧𝗥𝗘 𝗳𝗼𝗿 𝗖𝗬𝗕𝗘𝗥𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝗦𝘁𝘂𝗱𝗶𝗲𝘀 & 𝗥𝗘𝗦𝗘𝗔𝗥𝗖𝗛 🍂

Apply 🔗:-
https://forms.office.com/Pages/ResponsePage.aspx?id=kskZF-qPEE6RGmq3Pi1-SFBYHJ5lvDFDoxX1KMvw7VhUQTlDWlVSOUJMVDM1VEtFNzhNU1VMUDkzNy4u

👉Join:@hacker_habesha🇪🇹
👉Join:@hacker_habesha🇪🇹
🔥3🎉3
🍁 Best collection of Software Development Roadmaps 🍁

#Roadmap

This post is a curated list of roadmaps, mostly about software development, which give you a clear route to improve your knowledge or skills.

► Programming Language

Go Developer Roadmap
Java Developer Roadmap
Rust Web Developer Roadmap
Nodejs Developer Roadmap

► Web Development

Developer Roadmap
React Developer Roadmap
Angular Developer Roadmap
Vue Developer Roadmap
ASP.Net Core Developer Roadmap
Laravel Developer Roadmap

► Mobile Development

iOS Developer Roadmap
Android Developer Roadmap
Flutter Developer Roadmap

► Game Development

Game Developer Roadmap
Game Programmer

► AI / Machine Learning / Data Science

AI Expert Roadmap
NLP Roadmap
Deep Learning Papers Reading Roadmap
Deep Learning Roadmap
Data Scientist Roadmap - Overview of the core skills needed in data science
Data-scientist-roadmap - Bunch of tutorials helping whoever wants to start learning stuff about data science.
Data Engineer Roadmap

► Miscellaneous

Hacker Roadmap - A guide for amateurs pen testers and a collection of hacking tools, resources and references.
System Design Master Plan
The Full-Stack Software Design and Architecture Roadmap
Software architect roadmap
UI/UX Designer Roadmap

Source

👉Join:@hacker_habesha🇪🇹

Drop Reactions For More!!!
👌6🫡2👍1👏1
If you use an android and consider your "pattern" to be the crowning achievement of your own thoughtfulness - here are the sets of the most frequently used patterns of graphic keys, sorted by complexity.

Well, for criminologists and inquisitive weekend fun - another reason to check the statistics :)

Join us:@hacker_habesha🇪🇹
👏5🔥1
Join us:@hacker_habesha🇪🇹
👍5👏2🙏2
👨‍💻Persist. Achieve. Repeat.

Join us: @hacker_habesha🇪🇹
4👍1👏1🫡1
Channel name was changed to «Buna Byte☕️ቡና ባይት»
🟢 Youtube ቻናላችን ላይ የ
☕️Cybersecurity
☕️Ethical Hacking
☕️Embedded Systems
☕️Penetration Testing
☕️Networking
☕️Bug Bounty
እና ሁሉንም ኮምፒውተር ነክ ነገር ሙሉ በሙሉ በ ነጻ 💵ይማሩ! እያደገ ያለውን communityችንን ይቀላቀሉ እና የቴክኖሎጂ ችሎታዎን ዛሬ ያሳድጉ! አሁኑኑ Subscribe ያድርጉ!
👉Youtube: https://www.youtube.com/@bunabyte?sub_confirmation=1
👉TELEGRAM: t.me/hacker_habesha

#BunaByte #ThankYouSubscribers #HackerHabesha
👍8🎉2👏1
💰Bug Hunting Methodology for Small Scope and Medium Scope

Join: buna_byte
👍5🔥2
☣️ 100 Web Vulnerabilities, categorized into various types 👇

🔰 Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)

🔰 Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse

🔰 Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling

🔰 Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration

🔰 XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb

🔰 Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control

🔰 Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection

🔰 API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation

🔰 Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols

🔰 Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues

🔰 Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service

🔰 Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse

🔰 Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering

🔰 IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities

🔰 Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues

🔰 Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass

🔰 Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF

🔰 Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass

🔰 Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws

🔰 Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits

Join: buna_byte
5🔥2👍1