This guide walks through the setup of an automated wardriving system using a Raspberry Pi.
- Raspberry Pi (3/4 recommended) running Raspberry Pi OS Lite (32-bit).
- USB WLAN adapter(s) compatible with Linux.
- GPS module or compatible USB device.
#!/bin/bash | |
# Adapted from github.com/bksieski/WardrivingScript_pi4_rig | |
# Wait 30s for interfaces and GPS to init | |
sleep 30 | |
# Function to enable monitor mode on network adapters | |
enable_monitor_mode() { | |
echo "Enabling monitor mode on ${interfaces[@]}..." | |
for interface in "${interfaces[@]}"; do |
This guide walks through the setup of an automated wardriving system using a Raspberry Pi.
import requests | |
from bs4 import BeautifulSoup | |
import subprocess | |
def fetch_trending_topics(): | |
url = "https://en.wikipedia.org/wiki/Wikipedia:Top_25_Report" | |
response = requests.get(url) | |
soup = BeautifulSoup(response.content, 'html.parser') | |
topics = [] | |
for item in soup.select("h3 + ul")[0].select("li"): |
This guide outlines the process of installing and configuring Snort 3, an open-source Network Intrusion Detection System (NIDS), on macOS using Homebrew.
If you haven't already installed Homebrew, run the following command in the terminal:
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)"
""" | |
GitHub Repository Security Scanner | |
----------------------------------- | |
This script scans a specified GitHub repository for potential sensitive information and security vulnerabilities using a predefined list of Git dorks. It is intended to be a part of DevSecOps practices to prevent sensitive data leaks. | |
The script requires a GitHub Access Token and a Discord Webhook URL to operate. It sends alerts to the specified Discord channel when sensitive information is found in any of the repository's files. | |
Dependencies: | |
- PyGithub: A Python client for the GitHub API |
#!/bin/bash | |
########################################################## | |
# CyberRecon.sh | |
# Comprehensive Cybersecurity Reconnaissance Script | |
# | |
# Description: | |
# This script performs a detailed cybersecurity reconnaissance and scanning | |
# for a given target domain. It integrates various tools to enumerate | |
# subdomains, analyze DNS, scan web endpoints, identify vulnerabilities, |
#!/bin/bash | |
# Create a sudo user | |
read -p "Create a new sudo user (Allows for administrative actions with accountability)? (y/n): " create_user | |
if [ "$create_user" == "y" ]; then | |
read -p "Enter the username for the new sudo user: " username | |
adduser "$username" | |
usermod -aG sudo "$username" | |
fi |
#!/usr/bin/env python3 | |
import requests | |
from urllib.parse import urljoin | |
from bs4 import BeautifulSoup | |
import logging | |
import time | |
import csv | |
# Set up logging |
<?php | |
/*This will use the metadata from a shift page created using Employee Scheduler (Shiftee) and create an iCal link with event*/ | |
// Add a custom endpoint "calendar" | |
function add_calendar_feed() | |
{ | |
add_feed('calendar', 'export_ics'); | |
// Only uncomment these 2 lines the first time you load this script, to update WP rewrite rules |