Skip to content

NoDataFound/hackGPT

Repository files navigation

Test the app live here: https://hackgpt.com Screenshot 2023-04-30 at 6 59 28 PM

Screenshot 2023-05-11 at 12 09 48 PM

WhiskersGPT

Screenshot 2023-04-29 at 2 42 41 PM

Screenshot 2023-04-24 at 8 41 52 PM

Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment

JIRA_hackGPT.mp4

Screenshot 2023-03-29 at 8 05 29 PM

Launch hackGPT with python

hackGPT_python.mp4

Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer Screenshot 2023-03-05 at 6 49 23 PM

hackGPT enabled Siri Screenshot 2023-03-05 at 7 36 26 AM

hackGPT being superduper wrong Nope

Launch hackGPT with Google Colab(colab.research.google.com):

hackGPT.mp4

hackGPT

Automate the parsing and analysis of json threat data from CyberDefense tools like my SecurityScorecard ASI API tool here: https://github.com/securityscorecard/ssc-asi-tools/tree/master/tools/SSC_APIHunter:

sscplushgpt

hackGPT chatbot on mobile - https://colab.research.google.com/github/NoDataFound/hackGPT/blob/main/hacklab.hackGPT.ipynb hackgpt_mobile

demo0.mov

Automate CVE exploit creation and CyberDefense protections: (results https://github.com/NoDataFound/PwnAI/tree/main/output)

Screenshot 2022-12-14 at 8 08 05 AM

Ask ChatGPT to print its own source

Screenshot 2022-12-16 at 4 46 35 PM

Screenshot 2022-12-04 at 6 27 59 PM

Screenshot 2022-12-04 at 6 32 40 PM

Screen.Recording.2022-12-06.at.4.17.45.PM.mov

hackGPT

𝗜𝗻𝘀𝘁𝗮𝗹𝗹𝗮𝘁𝗶𝗼𝗻

Clone this repo

git clone https://github.com/NoDataFound/PwnAI.git

Clone this repo via SSH (alt. method)

git clone [email protected]:NoDataFound/hackGPT.git

Setup virtual environment (optional)

~$ python3 -m venv env
~$ source env/bin/activate

Install dependancies

python3 -m pip install -r requirements.txt

Review Input and Bulk Input samples

head -n 10 input/malware/malware_sample && head -n 10 input/sample_sources

# Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)
# Date: 02/11/2022
# Exploit Author: hacefresko
# Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/
# Version: 1.1.15 and below
# Tested on: 1.1.11, 1.1.14 and 1.1.15
# CVE : CVE-2021-4045

# Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce

https://github.com/rapid7/metasploit-payloads/blob/master/python/meterpreter/meterpreter.py
https://github.com/rapid7/metasploit-payloads/blob/master/powershell/MSF.Powershell/Meterpreter/Core.cs

Open Jupyter Notebook Install Jupyter Notebook if needed - use pip or download binaries here: https://jupyter.org/

pip3 install jupyter notebook

install (pictured) https://marketplace.visualstudio.com/items?itemName=ms-toolsai.jupyter-renderers

𝖫𝖺𝗎𝗇𝖼𝗁 𝖭𝗈𝗍𝖾𝖻𝗈𝗈𝗄 𝘄𝗶𝘁𝗵 𝗩𝗦𝗰𝗼𝗱𝗲

Configure .env with your OpenAI API key(notebook will help you)

Use Python

set API key on launch Screenshot 2022-12-03 at 1 23 38 PM

single searches

python3 PwnAI.py

Screenshot 2022-12-04 at 6 26 38 PM

Bulk searches

python3 PwnAI_bulk.py

Screenshot 2022-12-04 at 6 27 59 PM