MsGraphFunzy – A Guide To Automating Email Dumps And SharePoint Hosting On Azure

0

Script to dump emails through Microsoft Graph API. it also include another script to push a file on the Azure tenant. Usage graph_dump.py This script dump emails and attachments python3 graph_dump.py extended_azure_token_file_path (optional filter) Filter Examples '$search="body:password"' '$search="subject:password"' '$search="attachment:password"' python3 graph_dump.py extended_azure_token_file_path '$search="body:password"' Usage push_sharepoint.py This script can be used to host on file on an Azure tenant python3 extract_email.py extended_azure_token_file_path file_to_upload_path remote_filename (optional -organization) Device Code Phishing Extended Scope PS> install-module...

Brute Force Garage And Hack-RF With Raspberry Pi : A Comprehensive Guide To Radio Signal Exploration

0

All actions and/or activities related to this program are your sole responsibility. Misuse of this toolkit may result in criminal prosecution against the individuals in question.  Contributors will not be held responsible for any criminal charges brought against people who misuse this toolkit to break the law. This project just aims to demonstrate the flaws of the radio devices around us and the understanding of radio...

TDM Calculator – Revolutionizing Urban Planning In Los Angeles

0

Traffic Demand Management (TDM) calculator tool. DTLA Hack for LA is partnering with Los Angeles Department of Transportation (LADOT) to develop this tool to help planners at LADOT and real estate developers calculate how to meet some of Los Angeles’s Mobility Plan 2035 goals. Transportation demand management (TDM) is a defined set of strategies aimed at maximizing traveller choices while...

Chiasmodon : The Next-Level OSINT Tool For Comprehensive Digital Investigations

0

Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. The tool allows users to search by domain, CIDR, ASN, email, username,...

Harden Windows Security – Elevate Your Protection With Microsoft’s Official Toolkit

0

Windows by default is secure and safe, this repository does not imply nor claim otherwise. Just like anything, you have to use it wisely and don't compromise yourself with reckless behavior and bad user configuration; Nothing is foolproof. This repository only uses the tools and features that have already been implemented by Microsoft in Windows OS to fine-tune it...

JEOrg Security Defense Test Drives – Elevating Email Protection And Fraud Detection

0

In the digital age, safeguarding our digital communication is paramount. "JEOrg Security Defense Test Drives" embarks on a mission to fortify email security and unveil deceptive practices, equipping users with the tools and knowledge to combat phishing and fraud. This article explores the innovative solutions and strategies at the heart of their defense mechanisms. Project Layout auto-phishing-reporter - Auto Phishing report to...

FaceBF – Understanding The Ethical And Security Implications Of Brute Force Tools

0

In the evolving landscape of digital security, tools like FaceBF have emerged, claiming capabilities that challenge our notions of privacy and access. FaceBF, purportedly a tool designed for hacking Facebook accounts via brute force methods, underscores a growing concern in cybersecurity: the ease of unauthorized access to personal information. This article delves into the ethical and security implications of...

Drone-Hacking-Tool : A Comprehensive Guide To Ethical Drone Security Testing

0

Drone Hacking Tool is a GUI tool that works with a USB Wifi adapter and HackRF One for hacking drones. Drones, as a high mobility item that can be carried around easily and launched, are becoming cheaper and more popular among the public, they can be seen almost anywhere nowadays. However, the drone built-in flying cameras could use for illegal usage...

CVE-2024-28183 OTA Anti-Rollback Bypass via TOCTOU In ESP-IDF

0

Discover the intricacies of CVE-2024-28183, a critical vulnerability in ESP-IDF's OTA update process that allows attackers to bypass anti-rollback protections through a TOCTOU exploit, posing significant security risks to devices using ESP32. 1. Overview Anti-rollback is a security mechanism implemented in the ESP32 as part of the over-the-air (OTA) update process. This feature prevents attackers from "downgrading" firmware to older and...

xzbot – A Strategic Approach To Counter CVE-2024-3094 Through Honeypots And ED448 Patches

0

We delve into the intricacies of xzbot, a tool designed to combat the CVE-2024-3094 vulnerability. By employing a combination of honeypots, custom ED448 patches, and detailed backdoor analysis, we provide a robust framework for detecting and mitigating exploit attempts. This guide outlines the steps to utilize xzbot effectively, ensuring your systems are safeguarded against potential breaches. Exploration of the xz backdoor (CVE-2024-3094)....