Cyber security

Akto.io API Security : A Comprehensive Guide To Empowering Security Teams

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

11 months ago

MsGraphFunzy – A Guide To Automating Email Dumps And SharePoint Hosting On Azure

Script to dump emails through Microsoft Graph API. it also include another script to push a file on the Azure…

11 months ago

Brute Force Garage And Hack-RF With Raspberry Pi : A Comprehensive Guide To Radio Signal Exploration

All actions and/or activities related to this program are your sole responsibility. Misuse of this toolkit may result in criminal prosecution against the individuals…

11 months ago

Chiasmodon : The Next-Level OSINT Tool For Comprehensive Digital Investigations

Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain.…

11 months ago

Harden Windows Security – Elevate Your Protection With Microsoft’s Official Toolkit

Windows by default is secure and safe, this repository does not imply nor claim otherwise. Just like anything, you have…

11 months ago

JEOrg Security Defense Test Drives – Elevating Email Protection And Fraud Detection

In the digital age, safeguarding our digital communication is paramount. "JEOrg Security Defense Test Drives" embarks on a mission to…

11 months ago

FaceBF – Understanding The Ethical And Security Implications Of Brute Force Tools

In the evolving landscape of digital security, tools like FaceBF have emerged, claiming capabilities that challenge our notions of privacy…

11 months ago

CVE-2024-28183 OTA Anti-Rollback Bypass via TOCTOU In ESP-IDF

Discover the intricacies of CVE-2024-28183, a critical vulnerability in ESP-IDF's OTA update process that allows attackers to bypass anti-rollback protections…

11 months ago

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of…

11 months ago

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for…

11 months ago