Machine Learning Tutorials Repository – Unlocking The Power Of AI Learning
Welcome to the Machine Learning Tutorials Repository! This is the go-to spot for all the code associated with my Twitter tutorials. If you're passionate about diving deep into the realms of Machine Learning and exploring various topics, you're in the right place! Topics Covered Python: The core language for almost all things Machine Learning. Computer Vision: Techniques, algorithms, and methods to give machines...
Xteam Tool – The Ultimate Guide To Mastering Cybersecurity Techniques
A cutting-edge solution designed for cybersecurity enthusiasts and professionals alike. This comprehensive guide explores its multifunctional capabilities, from instant information gathering to advanced penetration testing. Dive into the world of ethical hacking with Xteam, where security breaches meet their match. Features: Insta information gathering Crack android lockscreen interfaces Phishing Hacks Wireless attacks added Update script Remove script more coming... Requirements Data connection No Root Available On Termux Kali Linux Test On: Termux Debian INSTALLATION apt update apt upgrade pkg...
Mega Man ZX Editor – Unleashing Creative Potential In Game Modding
Dive into the world of game modding with the Mega Man ZX Editor, a pioneering tool designed to simplify the process of editing and customizing Mega Man ZX and Mega Man ZX Advent. This article explores the capabilities of the editor, from tweaking dialogue files to introducing new game mechanics, aimed at both novice and experienced modders seeking to...
Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing
Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could all probably do it in our sleep (you will be with this tool), but doing it thoroughly is still tedious and wastes valuable time. Zero-E (ZrE) aims to automate the entire process in a fire-and-forget manner, from initial open...
CVE-2024-3273 Proof Of Concept (PoC) : Unveiling The Vulnerability In D-Link NAS Devices
This repository contains a Proof of Concept (PoC) for CVE-2024-3273, a security vulnerability discovered in D-Link NAS devices. The vulnerability allows attackers to execute arbitrary commands on vulnerable devices. CVE-2024-3273 is a vulnerability in D-Link NAS devices that allows remote attackers to execute arbitrary commands via a crafted HTTP request to the cgi-bin/nas_sharing.cgi endpoint. This PoC demonstrates how the vulnerability can be exploited...
Nimfilt – Unraveling The Secrets Of Nim Binaries With Advanced Analysis Tools
Nimfilt is a collection of modules and scripts to help with analyzing Nim binaries. It started out as a CLI demangling tool inspired by c++filt. It evolved into a larger set of tools for analyzing Nim, but the original name stuck. nimfilt.py: a Python module that implements demangling for Nim. It can also be run as basic CLI tool. id_nim_binary.yar: a set of YARA...
Resources For Mobile Application Testing – A Comprehensive Guide To Tools, Techniques, And Vulnerabilities
In the rapidly evolving world of mobile technology, ensuring the security and reliability of applications is paramount. This comprehensive guide offers an extensive collection of resources for mobile application testing, covering everything from vulnerability analysis to penetration testing techniques. Dive into a curated list of blogs, tools, labs, and courses designed to empower developers and security professionals in fortifying...
Akto.io API Security : A Comprehensive Guide To Empowering Security Teams
Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used by security teams to maintain a continuous inventory of APIs, test APIs for vulnerabilities and find runtime issues. Akto offers coverage for all OWASP top 10 and HackerOne Top 10 categories including BOLA, authentication, SSRF, XSS, security configurations, etc....
MsGraphFunzy – A Guide To Automating Email Dumps And SharePoint Hosting On Azure
Script to dump emails through Microsoft Graph API. it also include another script to push a file on the Azure tenant. Usage graph_dump.py This script dump emails and attachments python3 graph_dump.py extended_azure_token_file_path (optional filter) Filter Examples '$search="body:password"' '$search="subject:password"' '$search="attachment:password"' python3 graph_dump.py extended_azure_token_file_path '$search="body:password"' Usage push_sharepoint.py This script can be used to host on file on an Azure tenant python3 extract_email.py extended_azure_token_file_path file_to_upload_path remote_filename (optional -organization) Device Code Phishing Extended Scope PS> install-module...
Brute Force Garage And Hack-RF With Raspberry Pi : A Comprehensive Guide To Radio Signal Exploration
All actions and/or activities related to this program are your sole responsibility. Misuse of this toolkit may result in criminal prosecution against the individuals in question. Contributors will not be held responsible for any criminal charges brought against people who misuse this toolkit to break the law. This project just aims to demonstrate the flaws of the radio devices around us and the understanding of radio...