A simple guide to flashing the AT firmware onto BW16-Kit modules.
-
USBC BW16-Kit:
at version:release/v2.11.2 sdk version:amebad_v6.2C firmware version:release/v4.9.2 -
MicroUSB BW16:
version:v2.4.1,amebaD v6.0a(Aug 14 2019)
| <?xml version="1.0" encoding="utf-8"?> | |
| <feed xmlns="http://www.w3.org/2005/Atom"> | |
| <title>Bug Bounty Blog List</title> | |
| <updated>2024-06-03T12:00:00Z</updated> | |
| <author> | |
| <name>g0ldencybersec</name> | |
| </author> | |
| <id>https://raw.githubusercontent.com/g0ldencybersec/bugbountybloglist/main/blogs.txt</id> | |
| <link href="https://raw.githubusercontent.com/g0ldencybersec/bugbountybloglist/main/blogs.txt" rel="self"/> |
| #!/bin/bash | |
| # Adapted from github.com/bksieski/WardrivingScript_pi4_rig | |
| # Wait 30s for interfaces and GPS to init | |
| sleep 30 | |
| # Function to enable monitor mode on network adapters | |
| enable_monitor_mode() { | |
| echo "Enabling monitor mode on ${interfaces[@]}..." | |
| for interface in "${interfaces[@]}"; do |
This guide walks through the setup of an automated wardriving system using a Raspberry Pi.
| import requests | |
| from bs4 import BeautifulSoup | |
| import subprocess | |
| def fetch_trending_topics(): | |
| url = "https://en.wikipedia.org/wiki/Wikipedia:Top_25_Report" | |
| response = requests.get(url) | |
| soup = BeautifulSoup(response.content, 'html.parser') | |
| topics = [] | |
| for item in soup.select("h3 + ul")[0].select("li"): |
This guide outlines the process of installing and configuring Snort 3, an open-source Network Intrusion Detection System (NIDS), on macOS using Homebrew.
If you haven't already installed Homebrew, run the following command in the terminal:
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"| """ | |
| GitHub Repository Security Scanner | |
| ----------------------------------- | |
| This script scans a specified GitHub repository for potential sensitive information and security vulnerabilities using a predefined list of Git dorks. It is intended to be a part of DevSecOps practices to prevent sensitive data leaks. | |
| The script requires a GitHub Access Token and a Discord Webhook URL to operate. It sends alerts to the specified Discord channel when sensitive information is found in any of the repository's files. | |
| Dependencies: | |
| - PyGithub: A Python client for the GitHub API |
| #!/bin/bash | |
| ########################################################## | |
| # CyberRecon.sh | |
| # Comprehensive Cybersecurity Reconnaissance Script | |
| # | |
| # Description: | |
| # This script performs a detailed cybersecurity reconnaissance and scanning | |
| # for a given target domain. It integrates various tools to enumerate | |
| # subdomains, analyze DNS, scan web endpoints, identify vulnerabilities, |
| #!/bin/bash | |
| # Create a sudo user | |
| read -p "Create a new sudo user (Allows for administrative actions with accountability)? (y/n): " create_user | |
| if [ "$create_user" == "y" ]; then | |
| read -p "Enter the username for the new sudo user: " username | |
| adduser "$username" | |
| usermod -aG sudo "$username" | |
| fi |
| #!/usr/bin/env python3 | |
| import requests | |
| from urllib.parse import urljoin | |
| from bs4 import BeautifulSoup | |
| import logging | |
| import time | |
| import csv | |
| # Set up logging |