This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/usr/bin/env python3 | |
| """ | |
| M365 OSINT Reconnaissance Tool | |
| Based on techniques from: https://dstreefkerk.github.io/2025-07-m365-email-osint-after-lockdown/ | |
| This script performs modern M365/Azure AD reconnaissance after Microsoft's lockdown of traditional | |
| enumeration methods. It uses multiple validation techniques to discover organizational information | |
| and attempts to infer MOERA domains. | |
| """ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ################################################################# | |
| # reconFTW config file # | |
| ################################################################# | |
| # General values | |
| tools=~/Tools # Path installed tools | |
| SCRIPTPATH="$( cd "$(dirname "$0")" >/dev/null 2>&1 ; pwd -P )" # Get current script's path | |
| profile_shell=".$(basename $(echo $SHELL))rc" # Get current shell profile | |
| reconftw_version=$(git rev-parse --abbrev-ref HEAD)-$(git describe --tags) # Fetch current reconftw version | |
| generate_resolvers=false # Generate custom resolvers with dnsvalidator |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| import os | |
| import shutil | |
| import sqlite3 | |
| import sys | |
| from datetime import datetime, timedelta | |
| import argparse | |
| import warnings | |
| parser = argparse.ArgumentParser(description="This script allows you to query for urls in a 'History' file of the Chrome browser", | |
| formatter_class=argparse.ArgumentDefaultsHelpFormatter) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| console.log("[*] SSL Pinning Bypasses"); | |
| console.log(`[*] Your frida version: ${Frida.version}`); | |
| console.log(`[*] Your script runtime: ${Script.runtime}`); | |
| /** | |
| * by incogbyte | |
| * Common functions | |
| * thx apkunpacker, NVISOsecurity, TheDauntless | |
| * Remember that sslpinning can be custom, and sometimes u need to reversing using ghidra,IDA or something like that. | |
| * !!! THIS SCRIPT IS NOT A SILVER BULLET !! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # | |
| # from http://codex.wordpress.org/Hardening_WordPress#File_permissions | |
| # | |
| # | |
| WP_OWNER=nginx # <-- wordpress owner ( for default : nginx ) | |
| WP_GROUP=nginx # <-- wordpress group ( for default : nginx ) | |
| WP_ROOT= /../././ # <-- wordpress root directory | |
| WS_GROUP=nginx # <-- webserver group ( for default : nginx ) |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/sh | |
| # Uncomment this is you want some more verbose output to see what is happening | |
| #set -x | |
| ## Variables | |
| # Change this directory name if you want to place these somewhere else | |
| _projectdir=~/projects | |
| _gitrepo=https://github.com/mkubecek/vmware-host-modules.git | |
| if [ $(grep -q "workstation.product.version" /etc/vmware/config;echo $?) -eq 0 ];then |