Telegram Hacking Tools And Resources For 2024
Dive into the deep end of cyber threat intelligence and offensive security focused groups on Telegram. Beware that a number of these groups might have links to malicious websites so proceed with caution and at your own risk. Offensive tools and techniques provided to be exclusively utilized within the confines of sanctioned penetration tests.
github credits: https://github.com/fastfire/deepdarkCTI
#Telegram #hacking #cyberthreatintelligence #offensivesecurity
17
views
1
comment
Hacking Mobile Phones | Android & iOS | 2024
#termux #pegasus #Mobile
Hacking Mobile Phones | Android & iOS | 2024
23
views
1
comment
ChatGPT For Cybersecurity
In this video, I go over the process of how to use ChatGPT and cover various examples of how to use ChatGPT for Cybersecurity.
ChatGPT is an AI-driven chatbot launched by OpenAI in November 2022.
It is trained using Reinforcement Learning from Human Feedback (RLHF).
It is built on top of OpenAI's GPT-3.5 family of large language models and is fine-tuned with both supervised and reinforcement learning techniques.
OpenAI ChatGPT: https://chat.openai.com/chat
Timestamps:
0:00 Introduction
7:50 ChatGPT usage
10:45 Pentesting examples
13:10 Generating shells
14:25 Fuzzing
17:15 Shellcode
18:00 Custom emails
19:34 Macros
20:56 Buffer overflow
22:15 Automation
25:00 Blue team examples
28:33 ChatGPT impact on cybersecurity
#chatgpt #openai #cybersecurity
11
views
1
comment
EternalBlue Tutorial - Doublepulsar With Metasploit (MS17-010)
Hey guys! HackerSploit her back again with another video, in this video we will be looking at how to use the EternalBlue exploit that was used as part of the worldwide WannaCry ransomware attack.
Module Name: exploit/windows/smb/ms17_010_eternalblue
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
7
views
1
comment
Armitage Kali Linux Complete Tutorial
Hey guys! in this video, we will be looking at how to use Armitage for discovery and exploitation.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
7
views
1
comment
The Complete Meterpreter Guide | Privilege Escalation & Clearing Tracks
Hey guys! HackerSploit her back again with another Metasploit Meterpreter tutorial, in this video, we will be looking at how to fully utilize the meterpreter for post-exploitation and privilege escalation.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
<br>
12
views
1
comment
Veil-Evasion Complete Tutorial
Hey guys! HackerSploit here back again with another video, in this video, we will looking at how to generate undetectable payloads with Veil Evasion.
Veil-Evasion is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
2
views
Gaining Access - Web Server Hacking - Metasploitable - #1
Hey, guys In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
10
views
1
comment
Metasploit For Beginners - #4 - Basic Exploitation
Hey, guys HackerSploit here, back again with another video. In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
8
views
1
comment
Metasploit For Beginners - #2 - Understanding Metasploit Modules
Hey, guys . In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
HackerSploit Website: https://hsploit.com/
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section.
14
views
1
comment
Metasploit For Beginners - #3 - Information Gathering - Auxiliary Scanners
Hey, guys In this video, we will be continuing the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
HackerSploit Website: https://hsploit.com/
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section.
11
views
1
comment
Metasploit For Beginners - #1 - The Basics - Modules, Exploits & Payloads
Hey, guys In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section
22
views
1
comment
How to Listen to Phone Calls Using Wireshark Fast And Simple
In this video I demonstrate how to listen to RTP voice streams in Wireshark. I cover how to pick a good capture point on the network, then how to select and listen to the audio stream.
Sample capture can be found here under 'SIP and RTP':
https://wiki.wireshark.org/SampleCaptures#sip-and-rtp
37
views
1
comment
Speed Overkill: How ISPs Sell You Bandwidth Instead of Performance
In this video I demonstrate how ISPs sell you more bandwidth than you actually need, when what you're really looking for is a reliable network which carries your traffic with minimal latency and loss. I dive into the three main factors which make up connection quality (bandwidth, latency and loss), explain why speedtests are almost useless, and show you how to estimate how much bandwidth you actually need. Finally, I preview Netprobe, a simple and effective tool I wrote for monitoring your internet performance at home (and totally free and open source!) Useful links: How Speedtest.net Works https://oneringnetworks.com/bandwidth... Netprobe - https://github.com/plaintextpackets/n...
10
views
1
comment