# hackGPT222 **Repository Path**: devdasdevdasjan/hack-gpt222222 ## Basic Information - **Project Name**: hackGPT222 - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: main - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2023-11-21 - **Last Updated**: 2023-11-21 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README ![](https://img.shields.io/badge/hackGPT-v23-purple) `Test the app live here:` https://hackgpt.com Screenshot 2023-04-30 at 6 59 28 PM ![Screenshot 2023-05-11 at 12 09 48 PM](https://github.com/NoDataFound/hackGPT/assets/3261849/f8f85831-706f-4398-9da1-365323f656bd) ![WhiskersGPT](https://github.com/NoDataFound/hackGPT/assets/3261849/2157a52a-5f77-4d23-a6ca-c80d917b2bf8) Screenshot 2023-04-29 at 2 42 41 PM Screenshot 2023-04-24 at 8 41 52 PM `Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment ` https://user-images.githubusercontent.com/3261849/228703126-adf614ba-d931-4ec0-8d1a-99654063058b.mp4 Screenshot 2023-03-29 at 8 05 29 PM `Launch hackGPT with python` https://user-images.githubusercontent.com/3261849/222942128-3f75b9b7-5763-4a0c-a4df-aadbb24dcf5d.mp4 `Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer` Screenshot 2023-03-05 at 6 49 23 PM `hackGPT enabled Siri` Screenshot 2023-03-05 at 7 36 26 AM `hackGPT being superduper wrong` Nope `Launch hackGPT with Google Colab(colab.research.google.com):` https://user-images.githubusercontent.com/3261849/218538303-68c06a8e-071b-40a2-b7b2-b9e974b41f09.mp4 hackGPT

`Automate the parsing and analysis of json threat data from CyberDefense tools like my SecurityScorecard ASI API tool here: https://github.com/securityscorecard/ssc-asi-tools/tree/master/tools/SSC_APIHunter:` sscplushgpt `hackGPT chatbot on mobile - https://colab.research.google.com/github/NoDataFound/hackGPT/blob/main/hacklab.hackGPT.ipynb` ![hackgpt_mobile](https://user-images.githubusercontent.com/3261849/218890190-e4edceff-ca65-4db0-93ee-82aa055eb576.png) https://user-images.githubusercontent.com/3261849/222963550-41fc50c5-6c89-45af-a794-31a47fc5a51e.mov `Automate CVE exploit creation and CyberDefense protections:` (results https://github.com/NoDataFound/PwnAI/tree/main/output) Screenshot 2022-12-14 at 8 08 05 AM `Ask ChatGPT to print its own source` Screenshot 2022-12-16 at 4 46 35 PM Screenshot 2022-12-04 at 6 27 59 PM Screenshot 2022-12-04 at 6 32 40 PM https://user-images.githubusercontent.com/3261849/206036893-b583fad1-6b77-4dfb-8424-639229ffdd19.mov hackGPT

## 𝗜𝗻𝘀𝘁𝗮𝗹𝗹𝗮𝘁𝗶𝗼𝗻 `Clone this repo` ``` git clone https://github.com/NoDataFound/PwnAI.git ``` `Clone this repo via SSH (alt. method)` ``` git clone git@github.com:NoDataFound/hackGPT.git ``` `Setup virtual environment (optional)` ``` ~$ python3 -m venv env ~$ source env/bin/activate ``` `Install dependancies` ``` python3 -m pip install -r requirements.txt ``` `Review Input and Bulk Input samples` ``` head -n 10 input/malware/malware_sample && head -n 10 input/sample_sources # Exploit Title: TP-Link Tapo c200 1.1.15 - Remote Code Execution (RCE) # Date: 02/11/2022 # Exploit Author: hacefresko # Vendor Homepage: https://www.tp-link.com/en/home-networking/cloud-camera/tapo-c200/ # Version: 1.1.15 and below # Tested on: 1.1.11, 1.1.14 and 1.1.15 # CVE : CVE-2021-4045 # Write up of the vulnerability: https://www.hacefresko.com/posts/tp-link-tapo-c200-unauthenticated-rce https://github.com/rapid7/metasploit-payloads/blob/master/python/meterpreter/meterpreter.py https://github.com/rapid7/metasploit-payloads/blob/master/powershell/MSF.Powershell/Meterpreter/Core.cs ``` `Open Jupyter Notebook` *Install Jupyter Notebook if needed - use pip or download binaries here: https://jupyter.org/* ``` pip3 install jupyter notebook ``` `install (pictured) https://marketplace.visualstudio.com/items?itemName=ms-toolsai.jupyter-renderers` ## 𝖫𝖺𝗎𝗇𝖼𝗁 𝖭𝗈𝗍𝖾𝖻𝗈𝗈𝗄 𝘄𝗶𝘁𝗵 𝗩𝗦𝗰𝗼𝗱𝗲

`Configure .env with your OpenAI API key(notebook will help you)` ## Use Python `set API key on launch` Screenshot 2022-12-03 at 1 23 38 PM `single searches` ``` python3 PwnAI.py ``` Screenshot 2022-12-04 at 6 26 38 PM `Bulk searches` ``` python3 PwnAI_bulk.py ``` Screenshot 2022-12-04 at 6 27 59 PM