I leverage OpenAI and ChatGPT to do hackerish things
Test the app live here:
https://hackgpt.com
Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment
https://user-images.githubusercontent.com/3261849/228703126-adf614ba-d931-4ec0-8d1a-99654063058b.mp4
Launch hackGPT with python
https://user-images.githubusercontent.com/3261849/222942128-3f75b9b7-5763-4a0c-a4df-aadbb24dcf5d.mp4
Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer
hackGPT enabled Siri
hackGPT being superduper wrong
Launch hackGPT with Google Colab(colab.research.google.com):
https://user-images.githubusercontent.com/3261849/218538303-68c06a8e-071b-40a2-b7b2-b9e974b41f09.mp4
Automate the parsing and analysis of json threat data from CyberDefense tools like my SecurityScorecard ASI API tool here: https://github.com/securityscorecard/ssc-asi-tools/tree/master/tools/SSC_APIHunter:
hackGPT chatbot on mobile - https://colab.research.google.com/github/NoDataFound/hackGPT/blob/main/hacklab.hackGPT.ipynb
https://user-images.githubusercontent.com/3261849/222963550-41fc50c5-6c89-45af-a794-31a47fc5a51e.mov
Automate CVE exploit creation and CyberDefense protections:
(results https://github.com/NoDataFound/PwnAI/tree/main/output)
Ask ChatGPT to print its own source
https://user-images.githubusercontent.com/3261849/206036893-b583fad1-6b77-4dfb-8424-639229ffdd19.mov
Clone this repo
git clone https://github.com/NoDataFound/PwnAI.git
Clone this repo via SSH (alt. method)
git clone [email protected]:NoDataFound/hackGPT.git
Setup virtual environment (optional)
~$ python3 -m venv env
~$ source env/bin/activate
Install dependancies
python3 -m pip install -r requirements.txt
Review Input and Bulk Input samples
head -n 10 input/malware/malware_sample && head -n 10 input/sample_sources
# Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE)
# Date: 02/11/2022
# Exploit Author: hacefresko
# Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/
# Version: 1.1.15 and below
# Tested on: 1.1.11, 1.1.14 and 1.1.15
# CVE : CVE-2021-4045
# Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce
https://github.com/rapid7/metasploit-payloads/blob/master/python/meterpreter/meterpreter.py
https://github.com/rapid7/metasploit-payloads/blob/master/powershell/MSF.Powershell/Meterpreter/Core.cs
Open Jupyter Notebook
Install Jupyter Notebook if needed - use pip or download binaries here: https://jupyter.org/
pip3 install jupyter notebook
install (pictured) https://marketplace.visualstudio.com/items?itemName=ms-toolsai.jupyter-renderers
Configure .env with your OpenAI API key(notebook will help you)
set API key on launch
single searches
python3 PwnAI.py
Bulk searches
python3 PwnAI_bulk.py