A simple guide to flashing the AT firmware onto BW16-Kit modules.
-
USBC BW16-Kit:
at version:release/v2.11.2 sdk version:amebad_v6.2C firmware version:release/v4.9.2
-
MicroUSB BW16:
version:v2.4.1,amebaD v6.0a(Aug 14 2019)
<?xml version="1.0" encoding="utf-8"?> | |
<feed xmlns="http://www.w3.org/2005/Atom"> | |
<title>Bug Bounty Blog List</title> | |
<updated>2024-06-03T12:00:00Z</updated> | |
<author> | |
<name>g0ldencybersec</name> | |
</author> | |
<id>https://raw.githubusercontent.com/g0ldencybersec/bugbountybloglist/main/blogs.txt</id> | |
<link href="https://raw.githubusercontent.com/g0ldencybersec/bugbountybloglist/main/blogs.txt" rel="self"/> |
#!/bin/bash | |
# Adapted from github.com/bksieski/WardrivingScript_pi4_rig | |
# Wait 30s for interfaces and GPS to init | |
sleep 30 | |
# Function to enable monitor mode on network adapters | |
enable_monitor_mode() { | |
echo "Enabling monitor mode on ${interfaces[@]}..." | |
for interface in "${interfaces[@]}"; do |
This guide walks through the setup of an automated wardriving system using a Raspberry Pi.
import requests | |
from bs4 import BeautifulSoup | |
import subprocess | |
def fetch_trending_topics(): | |
url = "https://en.wikipedia.org/wiki/Wikipedia:Top_25_Report" | |
response = requests.get(url) | |
soup = BeautifulSoup(response.content, 'html.parser') | |
topics = [] | |
for item in soup.select("h3 + ul")[0].select("li"): |
This guide outlines the process of installing and configuring Snort 3, an open-source Network Intrusion Detection System (NIDS), on macOS using Homebrew.
If you haven't already installed Homebrew, run the following command in the terminal:
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
""" | |
GitHub Repository Security Scanner | |
----------------------------------- | |
This script scans a specified GitHub repository for potential sensitive information and security vulnerabilities using a predefined list of Git dorks. It is intended to be a part of DevSecOps practices to prevent sensitive data leaks. | |
The script requires a GitHub Access Token and a Discord Webhook URL to operate. It sends alerts to the specified Discord channel when sensitive information is found in any of the repository's files. | |
Dependencies: | |
- PyGithub: A Python client for the GitHub API |
#!/bin/bash | |
########################################################## | |
# CyberRecon.sh | |
# Comprehensive Cybersecurity Reconnaissance Script | |
# | |
# Description: | |
# This script performs a detailed cybersecurity reconnaissance and scanning | |
# for a given target domain. It integrates various tools to enumerate | |
# subdomains, analyze DNS, scan web endpoints, identify vulnerabilities, |
#!/bin/bash | |
# Create a sudo user | |
read -p "Create a new sudo user (Allows for administrative actions with accountability)? (y/n): " create_user | |
if [ "$create_user" == "y" ]; then | |
read -p "Enter the username for the new sudo user: " username | |
adduser "$username" | |
usermod -aG sudo "$username" | |
fi |
#!/usr/bin/env python3 | |
import requests | |
from urllib.parse import urljoin | |
from bs4 import BeautifulSoup | |
import logging | |
import time | |
import csv | |
# Set up logging |