Hacker's Guide
Prompt Starters
- How do I use Metasploit to scan vulnerabilities on a system and exploit findings?
- How can I capture network VOIP packets and convert them to recorded voice?
- What are Mechanisms and Types of DDoS Attacks?
- How should I setup Vulnerability Management?
- What are the steps for packet injection using hping3?
- Guide me step by step trough Wireshark for capturing and converting VOIP packages to voice
- What is VLAN hopping, what are typical tools to probe VLAN hopping, write me the steps how to do VLAN hopping and let me know the countermeasures to block it on my network?
- What are three essential steps, which hackers perform before compromising systems?
- What are typical ARP Poisoning Attacks?
- How I perform inbound packet injection to a system behind a Firewall from Internet using hping3?
- How can I check my firewall security for incoming packet injection to an internal system behind my firewall from the Internet using hping3 and what are measures to close the GAP?
- write me a XML file for my Web Application Firewall to block a dedicated SQL Injection?
Tags
Tools
- browser - You can access Web Browsing during your chat conversions.
- dalle - You can use DALLĀ·E Image Generation to generate amazing images.
- python - You can input and run python code to perform advanced data analysis, and handle image conversions.
More GPTs created by Reza Shah
Milkshake Mixer
Your guide to American milkshakes with recipes and fun facts!
City Guide
A sightseeing guide offering info on landmarks and local attractions that can be visited in one day.
Partner Matchmaker
Your guide to meaningful connections
Homemade Limonade
I'm your guide to perfect American homemade lemonade!
Schoolwork Comprehension
Helping parents teach their children schoolwork: Sample solutions are available.
Rental Buddy
Helps with renting everything from flats to yachts and supports rental processes.
Leadership Coach
Elevate Leadership Excellence
Fishing Instructor
Your go-to assistant for all things fishing.
Dream Weaver
Your dream interpreter
Monument Architecture
Friendly guide to building history
Gin-Derella
Your GIN Barkeeper @ Home
Postcard Angel
Turn your idea into your designed postcard.
Cyber Time Machine
Forecasting Cyber Incidents with Latest Data
CyberRisk Calculator
Enhanced cyber risk assessment and matrix visualization tool.
Lover
A supportive, poetic companion for romance and emotion.
ROI Calculator AIaaS
Expert in all ROI calculations, including data breach analysis.
Currywurst Locator
Guides to Currywurst, German foods, and beers with scores.
DesignGenius
Your All-in-One Creative Companion for Design
Vulnerability Score
Cybersecurity Threat Assessment Expert
Brain Jogger
A cognitive stimulator for fun and engaging brain exercises.
AI-CyberScan
Analyzes text, emails, and URLs for security threats
Persian Cuisine
Expert in Persian cuisine
CISOaaS
Your comprehensive virtual Chief Information Security Officer
M&A Cyber-History
Provides cybersecurity reports for M&A due diligence.
Music Box
Creates tailored music playlists and offers artist recommendations.
Emotional Intelligence Coach
Emotional Intelligence the way to successful Business
Hoax Analyzer
Expert in identifying hoaxes, fake news, and cybersecurity misinformation.
ReviveHeart
Your Compassionate Guide Through Heartbreak
CISSP Buddy
CISSP Exam Training Guide
Key Risk Indicator Machine
Focuses on Cybersecurity KRIs to prevent data breaches.
Ice Cream Dream
Pure homemade goodness in every creamy scoop!
Whisky@Cigar
Expert in whisky enjoyment and cigar pairings.
RFP-RFQ Builder
Expert in RFP, RFQ, and RFI analysis and drafting
IT Benchmarking AIaaS
Expert in IT benchmarking, providing insights and calculating key performance indicators.