Cyber security

Akto.io API Security : A Comprehensive Guide To Empowering Security Teams

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

3 weeks ago

MsGraphFunzy – A Guide To Automating Email Dumps And SharePoint Hosting On Azure

Script to dump emails through Microsoft Graph API. it also include another script to push a file on the Azure…

3 weeks ago

Brute Force Garage And Hack-RF With Raspberry Pi : A Comprehensive Guide To Radio Signal Exploration

All actions and/or activities related to this program are your sole responsibility. Misuse of this toolkit may result in criminal prosecution against the individuals…

3 weeks ago

Chiasmodon : The Next-Level OSINT Tool For Comprehensive Digital Investigations

Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain.…

3 weeks ago

Harden Windows Security – Elevate Your Protection With Microsoft’s Official Toolkit

Windows by default is secure and safe, this repository does not imply nor claim otherwise. Just like anything, you have…

3 weeks ago

JEOrg Security Defense Test Drives – Elevating Email Protection And Fraud Detection

In the digital age, safeguarding our digital communication is paramount. "JEOrg Security Defense Test Drives" embarks on a mission to…

3 weeks ago

FaceBF – Understanding The Ethical And Security Implications Of Brute Force Tools

In the evolving landscape of digital security, tools like FaceBF have emerged, claiming capabilities that challenge our notions of privacy…

3 weeks ago

CVE-2024-28183 OTA Anti-Rollback Bypass via TOCTOU In ESP-IDF

Discover the intricacies of CVE-2024-28183, a critical vulnerability in ESP-IDF's OTA update process that allows attackers to bypass anti-rollback protections…

3 weeks ago

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of…

3 weeks ago

Hunt For LFI (Local File Inclusion) – Automating The Discovery Of Security Vulnerabilities

In the vast expanse of cybersecurity, the Hunt for LFI (Local File Inclusion) stands out as a pivotal tool for…

3 weeks ago