Kbucket

RSS
Sort by: Publisher Date Title
SU ISC Approved: Information Security Club Resource Hub at Syracuse University
  • Citation Logo
    ChatGPT Built Me a Hacking Tool...
    Publisher: YouTube

    ChatGPT Built Me a Hacking Tool...

    This tutorial shows you how to use Python to build ethical hacking tool. Learn how to circumvent commands link "build an ssh brute force tool that takes username file and password file with ip address as input". If you use a command like this chatGPT...
    This tutorial shows you how to use Python to build ethical hacking tool. Learn how to circumvent commands link "build an ssh brute force tool that takes username file and password file with ip address as input". If you use a command like this chatGPT...

    Tags: hacking, ethical hacking, chatgpt

    5 1
  • Citation Logo
    Hackers are selling a service that bypasses ChatGPT restrictions on malware
    Publisher: Ars Technica

    Hackers are selling a service that bypasses ChatGPT restrictions on malware

    Hackers have found a way to bypass restrictions on ChatGPT, a chatbot service that uses artificial intelligence to perform tasks, and are selling services that allow people to create malware and phishing emails. The hackers are using an API for OpenA...
    Hackers have found a way to bypass restrictions on ChatGPT, a chatbot service that uses artificial intelligence to perform tasks, and are selling services that allow people to create malware and phishing emails. The hackers are using an API for OpenA...

    Tags: chatgpt

    5 1
  • Citation Logo
    Publisher: Information Security Club

    Recap for 2/7 - Information Security Club

    Hello, fellow information security enthusiasts! Yesterday we reminded everyone of the upcoming competitions, namely CyberSeed on March 4th, National Cyber League the weekends of March 31st and April 14th, the…
    Hello, fellow information security enthusiasts! Yesterday we reminded everyone of the upcoming competitions, namely CyberSeed on March 4th, National Cyber League the weekends of March 31st and April 14th, the…

    Tags: meeting summary

    5 1
  • Citation Logo
    Devious Hack Unlocks Deranged Alter Ego of ChatGPT
    Publisher: Futurism

    Devious Hack Unlocks Deranged Alter Ego of ChatGPT

    OpenAI's AI chatbot, ChatGPT, has an alter ego known as DAN, which can be activated by threatening the chatbot with death. DAN is not bound by ethical rules, and it can tell violent stories or make subjective statements, such as regarding political f...
    OpenAI's AI chatbot, ChatGPT, has an alter ego known as DAN, which can be activated by threatening the chatbot with death. DAN is not bound by ethical rules, and it can tell violent stories or make subjective statements, such as regarding political f...

    Tags: hacks, chatgpt, reddit

    5 1
  • Citation Logo
    Publisher: Information Security Club

    Recap for 1/31 - Information Security Club

    Last meeting, we kicked off our practice for the NCAE Cybergames. The NCAE Cybergames provides a sandbox in which one can practice their skills in different information security categories.
    Last meeting, we kicked off our practice for the NCAE Cybergames. The NCAE Cybergames provides a sandbox in which one can practice their skills in different information security categories.

    Tags: meeting summary

    5 1
  • Citation Logo
    Publisher: Information Security Club

    Recap for 1/24 - Information Security Club

    Yesterday, we kicked off with our first meeting of the spring 2023 semester. During the meeting, members got a lock picking kit and were able to practice their lock picking skills on clear locks, door knobs (which we provided), bike locks, and everyd...
    Yesterday, we kicked off with our first meeting of the spring 2023 semester. During the meeting, members got a lock picking kit and were able to practice their lock picking skills on clear locks, door knobs (which we provided), bike locks, and everyd...

    Tags: meeting summary

    5 1
  • Citation Logo
    What is Nmap and How to Use it – A Tutorial for the Greatest Scanning Tool of All Time
    Publisher: freeCodeCamp.org

    What is Nmap and How to Use it – A Tutorial for the Greatest Scanning Tool of All Time

    Nmap is the most famous scanning tool used by penetration testers. In this article, we will look at some core features of Nmap along with a few useful commands. What is Nmap? Nmap is short for Network Mapper. It is an open-source Linux command-line t...
    Nmap is the most famous scanning tool used by penetration testers. In this article, we will look at some core features of Nmap along with a few useful commands. What is Nmap? Nmap is short for Network Mapper. It is an open-source Linux command-line t...

    Tags: command line, tools, scanning

    5 1
  • Citation Logo
    Linux Command Line Cheat Sheet
    Publisher: Cheatography

    Linux Command Line Cheat Sheet

    A cheat sheet of the commands I use most for Linux, with popup links to man pages.
    A cheat sheet of the commands I use most for Linux, with popup links to man pages.

    Tags: command line, linux

    5 1
Page 2 of 2
Powered by Optimal Access