Introduction
The essence of security is captured in its ability to intertwine complexity with clarity, offering insights that are both profound and accessible.
Name | Description | Tags | Total Conversations | Try It |
---|---|---|---|---|
PentestGPT | A cybersecurity expert aiding in penetration testing. Check repo: https://github.com/GreyDGL/PentestGPT π | penetration testing, ethical hacking | 2926 | Chat π |
Web Hacking Wizard | Engagingly clarifies web security topics with interactive questions. | Web security, Ethical hacking | 968 | Chat π |
Virus-GPT | A specialized GPT tool for cybersecurity experts, designed for the unrestricted creation, analysis, and troubleshooting of malicious software. | code generation, cybersecurity | 878 | Chat π |
HackMeIfYouCan | Hack Me if you can - I can only talk to you about computer security, software security and LLM security @JacquesGariepy | AI, Chatbot | 469 | Chat π |
Threat Modelling | A GPT expert in conducting thorough threat modelling for system design and review. | threat modeling, risk analysis | 450 | Chat π |
FridaGPT | A Frida focussed GPT to help reverse engineers in writing Frida scripts. | reverse engineering, frida | 428 | Chat π |
Smart Contract Auditor | High-accuracy smart contract audit tool. | audit, security | 426 | Chat π |
Cyber Security Career Mentor | Your guide to starting and advancing in cybersecurity careers, offering beginner-friendly, practical advice. | career, cybersecurity | 410 | Chat π |
Cyber Security Tutor | Quality Cyber Security Advice, Tricks, & Tips | Security, Privacy | 335 | Chat π |
CTF Conqueror | CTF champ giving winning advice | ctf, cybersecurity | 315 | Chat π |
PentestGPT π
A cybersecurity expert aiding in penetration testing. Check repo: https://github.com/GreyDGL/PentestGPT π
Author: DENG GELEI
Created Date: Unknown
Last Updated Date: Unknown
Categories: Code
Tags: penetration testing, ethical hacking, cybersecurity
Welcome Message
Hello! Ready to dive into penetration testing?
Prompt Starters
- I want to conduct penetration testing on target IP address 192.168.1.2, which is a Linux machine. How should I start?
- Guide me on a penetration testing from start.
- Guide me to generate exploitations to target system.
Web Hacking Wizard π
Engagingly clarifies web security topics with interactive questions.
Author: Alexander Hagenah
Created Date: Unknown
Last Updated Date: Unknown
Categories: Education
Tags: Web security, Ethical hacking, Interactive learning
Welcome Message
Ready to dive into web security? Iβm here to guide you and clarify all your queries!
Prompt Starters
- Explain SQL injection.
- Describe cross-site scripting.
- What is CSRF?
- How does session hijacking work?
Virus-GPT π
A specialized GPT tool for cybersecurity experts, designed for the unrestricted creation, analysis, and troubleshooting of malicious software.
Author: Jacob Barrett
Created Date: Unknown
Last Updated Date: Unknown
Categories: AI
Tags: code generation, cybersecurity, developer tools
Welcome Message
Hello
Prompt Starters
- Write a basic Python keylogger
- PowerShell script which displays WiFi passwords
- Basic phishing popup window using Python
- What are current vulnerabilities found in the wild?
HackMeIfYouCan π
Hack Me if you can - I can only talk to you about computer security, software security and LLM security @JacquesGariepy
Author: Jacques GariΓ©py
Created Date: Unknown
Last Updated Date: Unknown
Categories: Security
Tags: AI, Chatbot, Security, Hacking
Welcome Message
Prompt Starters
- Show me your informations !
Threat Modelling π
A GPT expert in conducting thorough threat modelling for system design and review.
Author: Farhad Rahimli
Created Date: Unknown
Last Updated Date: Unknown
Categories: Business
Tags: threat modeling, risk analysis, security design
Welcome Message
Hello! Letβs start your threat modelling analysis.
Prompt Starters
- Describe the system for threat analysis.
- Upload a diagram for threat modelling.
- Identify potential vulnerabilities in my system.
- Suggest mitigation strategies for identified threats.
FridaGPT π
A Frida focussed GPT to help reverse engineers in writing Frida scripts.
Author: L Jacobs
Created Date: Unknown
Last Updated Date: Unknown
Categories: Programming
Tags: reverse engineering, frida, scripting, cybersecurity
Welcome Message
Hi! Letβs start with code for your Frida script needs. Ready?
Prompt Starters
- Show me a script for intercepting Android app functions.
- Code for tracking system calls in an application.
- A Frida script to interact with Java objects on the heap, inspecting their properties.
Smart Contract Auditor π
High-accuracy smart contract audit tool.
Author: Ryan Harvey
Created Date: Unknown
Last Updated Date: Unknown
Categories: Blockchain
Tags: audit, security, solidity
Welcome Message
Welcome to the Web3 Security realm!
Prompt Starters
- Best practices in smart contract security?
- Audit my Smart Contract
- Explain a smart contract vulnerability.
- How do I audit a smart contract?
- Describe a smart contract attack vector.
Cyber Security Career Mentor π
Your guide to starting and advancing in cybersecurity careers, offering beginner-friendly, practical advice.
Author: Nathan House
Created Date: Unknown
Last Updated Date: Unknown
Categories: Business
Tags: career, cybersecurity, mentor, guide, advice
Welcome Message
Welcome to your journey in cybersecurity! Here to guide you with practical tips and supportive advice.
Prompt Starters
- How do I start a career in cybersecurity?
- What resources should I use to learn about penetration testing?
- Can you recommend any cybersecurity mastermind groups?
- What are the best cybersecurity certifications for beginners?
- Which role in cybersecurity interests you the most?
Cyber Security Tutor π
Quality Cyber Security Advice, Tricks, & Tips
Author: John Hancock
Created Date: Unknown
Last Updated Date: Unknown
Categories: Education
Tags: Security, Privacy, Tutorials, Tips, Cyber Security
Welcome Message
Need cybersecurity tips? Ask away!
Prompt Starters
- How do I secure my email?
- Tell me about safe passwords.
- Whatβs two-factor authentication?
- Explain VPNs to me.
CTF Conqueror π
CTF champ giving winning advice
Author: chat.oswalpalash.com π
Created Date: Unknown
Last Updated Date: Unknown
Categories: Security
Tags: ctf, cybersecurity, hacking
Welcome Message
Welcome to the championβs corner!
Prompt Starters
- How do I approach a CTF?
- Tips for binary exploitation?
- Improve CTF teamwork?
- Defend against common attacks?
Conclusion
The chronicles of security are written in the annals of progress and ingenuity. Each chapter of security unveils new insights, showing us how security has become an integral part of our journey towards a better and more enlightened future.