Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Setup Free and Unlimited Storage For Your ImgBed Hosted on Cloudflare Pages

2/10/2026

0 Comments

 
Click to set custom HTML
0 Comments

Create Your Own Free Image Bed / File Hosting Site Using Cloudflare Free Services

2/8/2026

0 Comments

 
Click to set custom HTML
0 Comments

Unifi - Ubiquiti

2/4/2026

0 Comments

 

UniFi provides a comprehensive environment for all your IT needs, starting with networking and seamlessly integrating security cameras, VoIP phones, door access, and much more. At the heart of UniFi are our Cloud Gateways, giving you unparalleled control over your entire IT infrastructure paired with world-class network security.


 https://unifi.ui.com/consoles/






Introduction

UniFi Applications

The UniFi application suite is thoughtfully constructed to serve a wide variety of technological needs within your home or business. These applications run on UniFi Cloud Gateways:

  • UniFi Network - Combines powerful internet gateways with scalable WiFi and switching. Provides real-time traffic dashboards, visual topology maps, and optimization tips. If you have heard of a 'UniFi Controller' before, most likely that is someone referring to the UniFi Network application by an informal name. The preferred way to deploy UniFi Network is on a UniFi Cloud Gateway, rather than on a server, laptop, or other self-hosted environment
  • UniFi Protect - AI-driven camera platform for local video storage. Features smart detection, customizable recording schedules, and flexible notification settings. Learn more here.
  • UniFi Access: Secure and intuitive access control system featuring modern touch-screen readers, integrated video for entry and exit events, multi-tenant intercom systems, elevator hubs, and flexible mobile credentials. It simplifies user and policy management while maintaining UL 294 compliance.
  • UniFi Talk - Plug-and-play VoIP system for small and medium businesses. Includes advanced call routing and admin features, with touchscreen phones offering a smartphone-like experience. Learn more here.
  • UniFi Connect - Enterprise of Things platform for digital signage, EV charging stations, building-wide lighting and display content.




Site Manager

The UniFi Site Manager, located at unifi.ui.com, provides a centralized platform for managing all your deployments remotely. With Site Manager, you can access and administer all sites you own or have been granted administrative permissions to from a single interface. This feature is ideal for scaling management across multiple locations or ensuring seamless control, even during routine operations. This is designed around managed service providers and large enterprises with globally-dispersed locations.

Accessing UniFi Site Manager

To access Site Manager:

  1. Go to unifi.ui.com or download the UniFi Mobile App (iOS / Android).
  2. Sign in using your UI Account.
  3. Click the desired site to begin managing it.

Note: Remote Management is enabled by default during initial setup. If you need to enable it manually, click here.

Site Manager Features

Site Manager offers several advanced tools to streamline multi-site management:

  • Site Magic SD WAN: Easily establish scalable, high-performance VPN connections between UniFi Gateways without the hassle of complex configurations or subnet management. Learn more here.
  • ISP Viewer: Analyze key internet performance metrics, including latency, packet loss, and uptime, across all your deployments.
  • Update Manager: Manage and initiate all updates across your sites from one location. Learn more here.
  • Admin Management: Easily assign admin roles and permissions with this scalable solution.
  • API Integration: The Site Manager API enables developers to monitor and manage UniFi deployments programmatically. Visit https://developer.ui.com/ to get started.

UDM SE


UniFi Network

UniFi Network by Ubiquiti Networks, inc. is a software that binds gateways, switches and wireless access points together with one graphical front end.




Settings







Channel AI




Dashboard







Topology


Network

USW Pro Max 16 PoE









Devices




Gateway - UDM SE

The Ubiquiti UniFi Dream Machine Special Edition (UDM-SE) is a rack-mountable, all-in-one Enterprise-grade UniFi OS Console, router, and security gateway with an integrated 8-port PoE switch and Network Video Recorder (NVR). It features 10G SFP+ and 2.5GbE WAN, 128GB internal storage, and supports over 100 UniFi devices and 1,000 clients, designed for managing comprehensive network and surveillance setups. 
Key Features and Capabilities:
  • Performance: Powered by a 1.7 GHz quad-core processor with 3.5 Gbps IPS/IDS threat detection.
  • Networking: Features high-speed dual-WAN connectivity, including a 2.5GbE RJ45 port and a 10G SFP+ port for high-speed internet.
  • PoE Switch: Includes an 8-port Gigabit switch with (6) 802.3af PoE and (2) 802.3at PoE+ ports to power devices directly.
  • NVR Functionality: Features a 3.5" hard drive bay (plus 128GB internal storage) for UniFi Protect video surveillance, supporting camera security systems.
  • Management: Runs UniFi OS to manage WiFi access points, security cameras, phones, and access readers from one interface.
  • Setup: Features a 1.3" touchscreen for status and Bluetooth for easy setup via the mobile app. 
The UDM-SE is a more capable successor to the UDM-Pro, adding PoE capability to its LAN ports, 2.5GbE/10G WAN support, and more internal storage for enhanced performance and security. 



Switch - USW Pro Max 16 PoE

The Ubiquiti UniFi Switch Pro Max (USW-Pro-Max) is a series of high-performance, Managed Layer 3 network switches featuring "Etherlighting" ports that illuminate to indicate port speed, link activity, and VLAN/network. They support 2.5 GbE RJ45 ports for high-speed devices, 10G SFP+ uplinks, and are designed for, but not limited to, high-bandwidth applications in modern network infrastructures. 
Key features and models include:
  • Models: Available in 16, 24, and 48-port configurations, with PoE++ (Power over Ethernet) options.
  • Etherlighting™: Ports light up to show speed/link/VLAN, with color-coding, making cable management intuitive.
  • Speed & Connectivity: Features 2.5 GbE RJ45 ports for faster-than-gigabit speeds and 10G SFP+ ports for high-speed fiber uplinks.
  • Performance: Layer 3 switching capabilities, with models offering up to 112 Gbps non-blocking switching capacity.
  • PoE Capability: Pro Max PoE models support high-power PoE++ (802.3bt) for devices like Wi-Fi 7 access points, cameras, and high-power IoT.
  • Management: Managed via the UniFi Network Application (version 8.0.24 and later). 


AP

U7 Pro
U7 Pro Outdoor




Client Devices






Ports




Gateway 


USW Pro Max 16 PoE






Radios

Airview








Insights








References





https://blog.51sec.org


Via http://blog.51sec.org/2026/02/unifi-ubiquiti.html
0 Comments

Disable UnUsed Background Services & Remove Built-in Useless Components and Features to Speed up Windows System

2/4/2026

0 Comments

 

Windows system has pre-installed all kinds of services and software to meet most of user's requirements in all kinds of different scenaries. But some of them are not necessary for many users just like you, if you want to utilize your system potention, this post might help you. It will guide you step-by-step through safely disabling some alomst useless Windows background services and remove some rarely used software to significantly improve your system's performance and smoothness. 



To improve the speed and responsiveness of the Windows operating system, disabling some unnecessary background services is an effective optimization technique. By turning off these services that silently consume system resources in the background, users can free up CPU, memory, and disk usage, resulting in a smoother computer experience.

To start with the process, we need to access the Services management interface. Use the keyboard shortcut Win+R to open the command prompt and type the command services.msc.


How to disable these services:
  1. Press the Win + R key combination to open the "Run" dialog box.
  2. Type services.msc and press Enter to open the "Services" window.
  3. Locate the service in the service list and double-click to open its properties.
  4. Change the "Startup type" to "Disabled", then click the "Stop" button, and finally click "Apply" and "OK".

 Connected User Experiences and Telemetry



  • Function : This service collects and sends your computer's usage and diagnostic data to Microsoft to improve the Windows user experience.

  • Why disable it : Disabling this service reduces background CPU and network resource consumption and enhances personal privacy protection, preventing your usage data from being collected.

  • Potential impact : Disabling this feature may affect some functions that rely on telemetry data, such as automatic updates and feedback functions, but it will have little impact on the daily use of most users.





Windows Search


  • Features : Provides content indexing, attribute caching, and search results for files, emails, and other content.

  • Why disable it : While it makes file searching more convenient, the Windows Search service continuously builds a file index in the background, consuming significant CPU and disk resources, especially when dealing with a large number of files. Users who don't frequently use the system search function or use third-party search tools (such as Everything) can disable it.

  • Potential impact : Disabling this feature will slow down the speed at which you can find files, apps, and settings using the Windows built-in search box.

Of course, we can use a third-party search tool like Everything to replace Windows' built-in search function. The results are absolutely phenomenal; both its search speed and efficiency far surpass the system's built-in search service. And it's completely free!




SysMain (formerly known as Superfetch)



  • Function : By analyzing the user's memory usage patterns, frequently used applications are preloaded into memory, thereby speeding up program startup.

  • Why disable it : For users of solid-state drives (SSDs), since SSDs themselves have extremely fast read and write speeds, the performance improvement brought by SysMain is limited, and may even increase the disk load due to continuous background read and write operations.

  • Potential impact : Disabling this feature may slightly slow down the initial launch speed of some infrequently used applications.




Print Spooler (Optional)



  • Functionality : Manages all local and network print queues and controls all print jobs.

  • Why disable it : If you don't use the printer, or only use it occasionally, this service running continuously in the background will consume a small amount of system resources. Disabling it when printing is not needed will free up these resources.

  • Potential impact : Printing will be impossible after disabling the service. You will need to re-enable the service if you require to use the printer.




Windows Biometric Service



  • Functionality : Provides applications with the ability to capture, compare, process, and store biometric data, supporting functions such as fingerprint recognition and facial recognition.

  • Why disable it : If your computer does not have a biometric device such as a fingerprint reader or infrared camera, or if you do not use features such as Windows Hello, then it is safe to disable this service to save resources.

  • Potential impact : After disabling, all biometric-related functions (such as fingerprint login) will be unavailable.



Remote Registry



  • Function : Allows remote users to modify registry settings on this computer.

  • Why disable it : For the vast majority of home users, remote modification of the registry is almost unnecessary. Disabling this service can improve system security and prevent potential malicious attacks.

  • Potential impact : Disabling this feature will prevent remote management of the local registry over a network. This may affect users who require remote technical support or network management.




Program Compatibility Assistant Service


  • Function : Provides support for the application compatibility assistant, monitors the programs installed and run by users, and detects known compatibility issues.

  • Why disable it : This feature sometimes misjudges programs that have no compatibility issues as problematic, causing frequent pop-up prompts and affecting user experience. Experienced users can identify and handle program compatibility issues themselves, so this service can be disabled.

  • Potential impact : After disabling, the system will no longer automatically prompt for program compatibility issues, requiring users to manually set compatibility mode to run some older applications.


Remove Unused Bulit-in Components / Features

 
https://christitus.com/windows-tool/

Run in an elevated PowerShell (Run as Administrator):

iwr -useb https://christitus.com/win | iex

Or:

irm christitus.com/win | iex





It will take a few seconds to load, and once you are in, go to the "Tweaks" tab. You will now find two sections on the left, one for essential tweaks and another for advanced ones. I tend to focus on the former, except for disabling Microsoft Copilot, which falls under the latter. Go with entries like deleting temporary files, disabling telemetry and hibernation, and running disk cleanup. On the right, under Customize Preferences, I disable the Search button and Task View for the taskbar, since I prefer a clean look, and enable file name extensions and hidden files.
===========================================================

Github project: Windows - Remove Common Unused BuiltinApps


https://github.com/MSEndpointMgr/Windows/blob/master/BuiltInApps/Remove-Appx-AllUsers.ps1



The following 13 apps were targeted for removal from the device:-


Microsoft.BingNews
Microsoft.GamingApp
Microsoft.MicrosoftSolitaireCollection
Microsoft.WindowsCommunicationsApps
Microsoft.WindowsFeedbackHub
Microsoft.XboxGameOverlay
Microsoft.XboxGamingOverlay
Microsoft.XboxIdentityProvider
Microsoft.XboxSpeechToTextOverlay
Microsoft.YourPhone
Microsoft.ZuneMusic
Microsoft.ZuneVideo
MicrosoftTeams



$u="https://github.com/MSEndpointMgr/Windows/raw/refs/heads/master/BuiltInApps/Remove-Appx-AllUsers.ps1";$p="$env:TEMP\Remove-Appx-AllUsers.ps1";Invoke-WebRequest $u -OutFile $p;Set-ExecutionPolicy -Scope Process Bypass -Force;& $p


Videos

 




References


  • https://www.freedidi.com/22529.html
  • https://github.com/MSEndpointMgr/Windows/blob/master/BuiltInApps/Remove-Appx-AllUsers.ps1




https://blog.51sec.org


Via http://blog.51sec.org/2026/01/disable-some-background-sservices-and.html
0 Comments

Disable UnUsed Background Services & Remove Built-in Useless Components and Features to Speed up Windows System

1/31/2026

0 Comments

 

Windows system has pre-installed all kinds of services and software to meet most of user's requirements in all kinds of different scenaries. But some of them are not necessary for many users just like you, if you want to utilize your system potention, this post might help you. It will guide you step-by-step through safely disabling some alomst useless Windows background services and remove some rarely used software to significantly improve your system's performance and smoothness. 



To improve the speed and responsiveness of the Windows operating system, disabling some unnecessary background services is an effective optimization technique. By turning off these services that silently consume system resources in the background, users can free up CPU, memory, and disk usage, resulting in a smoother computer experience.

To start with the process, we need to access the Services management interface. Use the keyboard shortcut Win+R to open the command prompt and type the command services.msc.


How to disable these services:
  1. Press the Win + R key combination to open the "Run" dialog box.
  2. Type services.msc and press Enter to open the "Services" window.
  3. Locate the service in the service list and double-click to open its properties.
  4. Change the "Startup type" to "Disabled", then click the "Stop" button, and finally click "Apply" and "OK".

 Connected User Experiences and Telemetry



  • Function : This service collects and sends your computer's usage and diagnostic data to Microsoft to improve the Windows user experience.

  • Why disable it : Disabling this service reduces background CPU and network resource consumption and enhances personal privacy protection, preventing your usage data from being collected.

  • Potential impact : Disabling this feature may affect some functions that rely on telemetry data, such as automatic updates and feedback functions, but it will have little impact on the daily use of most users.





Windows Search


  • Features : Provides content indexing, attribute caching, and search results for files, emails, and other content.

  • Why disable it : While it makes file searching more convenient, the Windows Search service continuously builds a file index in the background, consuming significant CPU and disk resources, especially when dealing with a large number of files. Users who don't frequently use the system search function or use third-party search tools (such as Everything) can disable it.

  • Potential impact : Disabling this feature will slow down the speed at which you can find files, apps, and settings using the Windows built-in search box.

Of course, we can use a third-party search tool like Everything to replace Windows' built-in search function. The results are absolutely phenomenal; both its search speed and efficiency far surpass the system's built-in search service. And it's completely free!




SysMain (formerly known as Superfetch)



  • Function : By analyzing the user's memory usage patterns, frequently used applications are preloaded into memory, thereby speeding up program startup.

  • Why disable it : For users of solid-state drives (SSDs), since SSDs themselves have extremely fast read and write speeds, the performance improvement brought by SysMain is limited, and may even increase the disk load due to continuous background read and write operations.

  • Potential impact : Disabling this feature may slightly slow down the initial launch speed of some infrequently used applications.




Print Spooler (Optional)



  • Functionality : Manages all local and network print queues and controls all print jobs.

  • Why disable it : If you don't use the printer, or only use it occasionally, this service running continuously in the background will consume a small amount of system resources. Disabling it when printing is not needed will free up these resources.

  • Potential impact : Printing will be impossible after disabling the service. You will need to re-enable the service if you require to use the printer.




Windows Biometric Service



  • Functionality : Provides applications with the ability to capture, compare, process, and store biometric data, supporting functions such as fingerprint recognition and facial recognition.

  • Why disable it : If your computer does not have a biometric device such as a fingerprint reader or infrared camera, or if you do not use features such as Windows Hello, then it is safe to disable this service to save resources.

  • Potential impact : After disabling, all biometric-related functions (such as fingerprint login) will be unavailable.



Remote Registry



  • Function : Allows remote users to modify registry settings on this computer.

  • Why disable it : For the vast majority of home users, remote modification of the registry is almost unnecessary. Disabling this service can improve system security and prevent potential malicious attacks.

  • Potential impact : Disabling this feature will prevent remote management of the local registry over a network. This may affect users who require remote technical support or network management.




Program Compatibility Assistant Service


  • Function : Provides support for the application compatibility assistant, monitors the programs installed and run by users, and detects known compatibility issues.

  • Why disable it : This feature sometimes misjudges programs that have no compatibility issues as problematic, causing frequent pop-up prompts and affecting user experience. Experienced users can identify and handle program compatibility issues themselves, so this service can be disabled.

  • Potential impact : After disabling, the system will no longer automatically prompt for program compatibility issues, requiring users to manually set compatibility mode to run some older applications.


Remove Unused Bulit-in Components / Features

 
https://christitus.com/windows-tool/

Run in an elevated PowerShell (Run as Administrator):

iwr -useb https://christitus.com/win | iex

Or:

irm christitus.com/win | iex





It will take a few seconds to load, and once you are in, go to the "Tweaks" tab. You will now find two sections on the left, one for essential tweaks and another for advanced ones. I tend to focus on the former, except for disabling Microsoft Copilot, which falls under the latter. Go with entries like deleting temporary files, disabling telemetry and hibernation, and running disk cleanup. On the right, under Customize Preferences, I disable the Search button and Task View for the taskbar, since I prefer a clean look, and enable file name extensions and hidden files.
===========================================================

Github project: Windows - Remove Common Unused BuiltinApps


https://github.com/MSEndpointMgr/Windows/blob/master/BuiltInApps/Remove-Appx-AllUsers.ps1



The following 13 apps were targeted for removal from the device:-


Microsoft.BingNews
Microsoft.GamingApp
Microsoft.MicrosoftSolitaireCollection
Microsoft.WindowsCommunicationsApps
Microsoft.WindowsFeedbackHub
Microsoft.XboxGameOverlay
Microsoft.XboxGamingOverlay
Microsoft.XboxIdentityProvider
Microsoft.XboxSpeechToTextOverlay
Microsoft.YourPhone
Microsoft.ZuneMusic
Microsoft.ZuneVideo
MicrosoftTeams



$u="https://github.com/MSEndpointMgr/Windows/raw/refs/heads/master/BuiltInApps/Remove-Appx-AllUsers.ps1";$p="$env:TEMP\Remove-Appx-AllUsers.ps1";Invoke-WebRequest $u -OutFile $p;Set-ExecutionPolicy -Scope Process Bypass -Force;& $p


Videos

 




References


  • https://www.freedidi.com/22529.html
  • https://github.com/MSEndpointMgr/Windows/blob/master/BuiltInApps/Remove-Appx-AllUsers.ps1




https://blog.51sec.org


Via http://blog.51sec.org/2026/01/disable-some-background-sservices-and.html
0 Comments

Free and Easy Way to Sync Your Local Folder to Cloud Drives Folder (Mount to Local then Sync)

1/27/2026

0 Comments

 

My OneDrive has 5T storage and always thinking how I could use them well to stoare my files and share with others. It is a bit problem to sync certain folder with my local drive , especially cross multiple OneDrive accounts, and other cloud drives. I started to try some of alternatives from Microsoft native OneDrive program since the limitation I met. 

There are a couple of software I have tested or took a quick look, here are some of my comments (WIP):

1. https://www.raidrive.com/  - free for persoanl onedrive. but not free for onedrive business
2. https://mountainduck.io/ - Trial and not installable for my Windows 10
3. https://cyberduck.io/ - Free, not able to mount, but able to upload/download/sync. 
4. https://stablebit.cloud/
5. https://southrivertech.com/webdrive/ - No free
6. Add a OneDrive as a network drive on local - https://helpdesk.rightnetworks.com/en-us/s/article/Add-OneDrive-as-a-Network-Location-in-Rightworks
7. Rclone
8. https://www.airlivedrive.com/en/ - free available, but same as raidrive, not for onedrive business. But during the testing, it seems the warning does n't stop mounting a business one drive account
9. ZeeDrive - https://www.zeedrive.com/pricing/ - No free
10. https://www.netdrive.net/ - No Free
11. https://www.konnekt.io/ - No Free
12. https://www.expandrive.com/ - Free




For free MS265 and OneDrive, here are some related posts:
  • MS 365 E5 Advanced Usage: Renew Subscription, One Drive Upgrade to 5T & Create Catch All Exchange Mail Rule
  • Add Your Own Domain into Free Microsoft 365 Subscription
  • Methods to Renew Free Microsoft 365 Developer E5 Subscription
  • Get Free Office 365 with E1 / E3 Subscription! Hurry to Get Before Offer Gone!
  • Free Microsoft Deal:0$ for 10 User Microsoft 365 Business Basic (No Credit Card)

For Sharing your OneDrive or Cloud Drive to the world, here are some:
  • Use Cloudflare Workers with Rclone to Deploy A Cloud Drive Index & List App - OnePoint
  • OpenList - A New Open Source and Self Hosted Multiple Storage Management Tool to Replace AList [Docker & Other Deployment Methods]
  • [5 Mins Docker] A Free File List App for Multiple Cloud Storages - Alist
  • Alist / OpenList Advanced Usages
  • Create New Client ID& Secret in OneDrive and Google Drive & Get Refresh_Token Using Rclone
  • OneManager - Deploy a free OneDrive List App using Heroku and Cloudflare
  • Fast OneDrive Index - A Serverless OneDrive Index Setup
  • Using Cloudflare Workers to Deploy Free Google Drive Directory Indexer in 5 Minutes (GoIndex)

ExpanDrive

https://www.expandrive.com/

The main ExpanDrive application for Windows, Mac, and Linux is now completely free for personal use.

Commercial, academic, or government use is also free for enterprises where fewer than 10 people use ExpanDrive across the enterprise during a calendar year.




Menu





Settings:


New Connection:


Download
Download the latest Windows build of ExpanDrive.

Other Windows packages:

  • 32-bit Installer .exe

  • 32-bit .nupkg
  • 64-bit .nukpg
It supports:
  • Amazon S3
  • SFTP
  • FTP
  • Box
  • Dropbox
  • Google Drive
  • IDrive e2
  • Nextcloud
  • OneDrive
  • SharePoint
  • Wasabi
  • WebDAV
  • and more...






FreeFileSync

FreeFileSync is a folder comparison and synchronization software that creates and manages backup copies of all your important files. Instead of copying every file every time, FreeFileSync determines the differences between a source and a target folder and transfers only the minimum amount of data needed. FreeFileSync is Open Source software, available for Windows, macOS, and Linux. https://freefilesync.org/



Download: 
Download
FreeFileSync

Tutorials:
  • https://freefilesync.org/tutorials.php
Manual:
  • https://freefilesync.org/manual.php

Main Interface:
FreeFileSync main window
  1. Change comparison settings
  2. Start comparison
  3. Include/exclude specific files
  4. Change synchronization settings
  5. Start synchronization
  6. Add folder pairs
  7. Select left and right folders
  8. Save/load configuration
  9. Tree overview panel
  10. Preview synchronization
  11. Select categories to show on grid
  12. Synchronization statistics







CyberDuck

 


Pro:

1. Set up is simple

2. Speed is faster

2. Support multiple cloud storage


Con:

1. Not able to mount it as a drive to system

2. Not easy to configure sync


Upload / Download / Sync



For OneDrive:




Throttled Messages


Preference:











Air Live Drive

 Air Live Drive will need license for OneDrive for Business.









It works!





Videos
















References







https://blog.51sec.org


Via http://blog.51sec.org/2026/01/free-and-easy-way-to-sync-your-local.html
0 Comments

Free and Easy Way to Sync Your Local Folder to Cloud Drives Folder (Mount to Local then Sync)

1/27/2026

0 Comments

 

My OneDrive has 5T storage and always thinking how I could use them well to stoare my files and share with others. It is a bit problem to sync certain folder with my local drive , especially cross multiple OneDrive accounts, and other cloud drives. I started to try some of alternatives from Microsoft native OneDrive program since the limitation I met. 

There are a couple of software I have tested or took a quick look, here are some of my comments (WIP):

1. https://www.raidrive.com/  - free for persoanl onedrive. but not free for onedrive business
2. https://mountainduck.io/ - Trial and not installable for my Windows 10
3. https://cyberduck.io/ - Free, not able to mount, but able to upload/download/sync. 
4. https://stablebit.cloud/
5. https://southrivertech.com/webdrive/ - No free
6. Add a OneDrive as a network drive on local - https://helpdesk.rightnetworks.com/en-us/s/article/Add-OneDrive-as-a-Network-Location-in-Rightworks
7. Rclone
8. https://www.airlivedrive.com/en/ - free available, but same as raidrive, not for onedrive business. But during the testing, it seems the warning does n't stop mounting a business one drive account
9. ZeeDrive - https://www.zeedrive.com/pricing/ - No free
10. https://www.netdrive.net/ - No Free
11. https://www.konnekt.io/ - No Free
12. https://www.expandrive.com/ - Free




For free MS265 and OneDrive, here are some related posts:
  • MS 365 E5 Advanced Usage: Renew Subscription, One Drive Upgrade to 5T & Create Catch All Exchange Mail Rule
  • Add Your Own Domain into Free Microsoft 365 Subscription
  • Methods to Renew Free Microsoft 365 Developer E5 Subscription
  • Get Free Office 365 with E1 / E3 Subscription! Hurry to Get Before Offer Gone!
  • Free Microsoft Deal:0$ for 10 User Microsoft 365 Business Basic (No Credit Card)

For Sharing your OneDrive or Cloud Drive to the world, here are some:
  • Use Cloudflare Workers with Rclone to Deploy A Cloud Drive Index & List App - OnePoint
  • OpenList - A New Open Source and Self Hosted Multiple Storage Management Tool to Replace AList [Docker & Other Deployment Methods]
  • [5 Mins Docker] A Free File List App for Multiple Cloud Storages - Alist
  • Alist / OpenList Advanced Usages
  • Create New Client ID& Secret in OneDrive and Google Drive & Get Refresh_Token Using Rclone
  • OneManager - Deploy a free OneDrive List App using Heroku and Cloudflare
  • Fast OneDrive Index - A Serverless OneDrive Index Setup
  • Using Cloudflare Workers to Deploy Free Google Drive Directory Indexer in 5 Minutes (GoIndex)

ExpanDrive

https://www.expandrive.com/

The main ExpanDrive application for Windows, Mac, and Linux is now completely free for personal use.

Commercial, academic, or government use is also free for enterprises where fewer than 10 people use ExpanDrive across the enterprise during a calendar year.




Menu





Settings:


New Connection:


Download
Download the latest Windows build of ExpanDrive.

Other Windows packages:

  • 32-bit Installer .exe

  • 32-bit .nupkg
  • 64-bit .nukpg
It supports:
  • Amazon S3
  • SFTP
  • FTP
  • Box
  • Dropbox
  • Google Drive
  • IDrive e2
  • Nextcloud
  • OneDrive
  • SharePoint
  • Wasabi
  • WebDAV
  • and more...






FreeFileSync

FreeFileSync is a folder comparison and synchronization software that creates and manages backup copies of all your important files. Instead of copying every file every time, FreeFileSync determines the differences between a source and a target folder and transfers only the minimum amount of data needed. FreeFileSync is Open Source software, available for Windows, macOS, and Linux. https://freefilesync.org/



Download: 
Download
FreeFileSync

Tutorials:
  • https://freefilesync.org/tutorials.php
Manual:
  • https://freefilesync.org/manual.php

Main Interface:
FreeFileSync main window
  1. Change comparison settings
  2. Start comparison
  3. Include/exclude specific files
  4. Change synchronization settings
  5. Start synchronization
  6. Add folder pairs
  7. Select left and right folders
  8. Save/load configuration
  9. Tree overview panel
  10. Preview synchronization
  11. Select categories to show on grid
  12. Synchronization statistics







CyberDuck

 


Pro:

1. Set up is simple

2. Speed is faster

2. Support multiple cloud storage


Con:

1. Not able to mount it as a drive to system

2. Not easy to configure sync


Upload / Download / Sync



For OneDrive:




Throttled Messages


Preference:











Air Live Drive

 Air Live Drive will need license for OneDrive for Business.









It works!





Videos
















References







https://blog.51sec.org


Via http://blog.51sec.org/2026/01/free-and-easy-way-to-sync-your-local.html
0 Comments

Cloudflare R2 Storage Integrates with ShareX

1/27/2026

0 Comments

 

ShareX, which is a the most powerful, free and open source application screenshot utility with a lot of features, includes the ability to upload images, videos, and files to not only the many publicly available services, but your own custom ones.


ShareX has provided their own documentation here for configuring ShareX with Cloudflare R2, which is simple to follow. This post is to give a more screenshot guide to show you the steps how to configure ShareX to upload screenshots to Cloudflare R2, this s3 compatible storage.

https://i.itprosec.com/2026/01/integrate%20Cloudflare%20R2%20storage%20with%20ShareX.png

https://i.itprosec.com/2026/01/Photos_zlRapcl5zI.jpg

Free tier of Cloudflare R2

Cloudflare R2 is an object storage provider similar to Amazon S3, which allows for storing large amounts of unstructured data. Cloudflare R2 is S3-compatible, so it is able to utilize some of the already created S3 libraries, extensions, and tools. One of the core benefits of Cloudflare’s offering, is that there are no egress charges, which some other companies charge when data is accessed externally. And depending on volume of requests and how much data is being requested, that can become costly.

More information can be found here.

Cloudflare R2 offers a forever free tier, that includes:

  • 10 GB Storage per month
  • 1,000,000 Class A Operations per month
  • 10,000,000 Class B Operations per month

If you need to go past these limits or your utilization is past these limits, then the following is the current additional costs as of 3/3/2025:

  • $0.015/GB for storage past 10 GB.
  • $4.50 per additional million operations past your monthly free limit of 1,000,000 Class A Operations.
  • $0.36 per additional million operations past your monthly free limit of 10,000,000 Class B Operations.
You can use the following amount of storage and operations each month for free.
Free
Storage 10 GB-month / month
Class A Operations 1 million requests / month
Class B Operations 10 million requests / month
Egress (data transfer to Internet) Free 1

Warning

The free tier only applies to Standard storage, and does not apply to Infrequent Access storage.



The main different between Class A Operations vs Class B Operations is what they do.

  • Class A Operations tend to mutate the state.
  • Class B Operations tend to read the state.

If you are only hosting images, files, or files that are not changing, you will mainly be using Class B Operations, since that would be people viewing those items stored. And the Class A Operations would you be uploading these items, listing what is inside your bucket, deleting, editing, etc.

Another benefit of utilizing a custom domain with Cloudflare R2, is that it can leverage other features from Cloudflare such as their Content Delivery Network (CDN) for caching these files/images/videos. Which should result in limiting the number of Class B Operations, if the files are already cached by the user’s browser on Cloudflare’s edge network.

Additional information on pricing and the different type of operations can be found here.

Class A operations

Class A Operations include ListBuckets, PutBucket, ListObjects, PutObject, CopyObject, CompleteMultipartUpload, CreateMultipartUpload, LifecycleStorageTierTransition, ListMultipartUploads, UploadPart, UploadPartCopy, ListParts, PutBucketEncryption, PutBucketCors and PutBucketLifecycleConfiguration.

Class B operations

Class B Operations include HeadBucket, HeadObject, GetObject, UsageSummary, GetBucketEncryption, GetBucketLocation, GetBucketCors and GetBucketLifecycleConfiguration.

Free operations

Free operations include DeleteObject, DeleteBucket and AbortMultipartUpload.



Uploads to Cloudflare R2


1. Dashboard upload limitation
<100 files, < 300MB size


2. https://r2uploader.com/
A lightweight yet powerful desktop application built with Rust and Tauri, enabling lightning-fast file uploads. Optimized for large files and batch uploads, with no 300MB limit!
Your configuration remains local - we never collect or upload your credentials.



Connection Setup

Find your Cloudflare R2 S3 API URL:


Go to your R2 bucket settings page
Look for the "S3 API" section under "Bucket Details"
Copy the S3 API URL in the following format:
https://[accountId].r2.cloudflarestorage.com/[bucketName]
The application will automatically extract the Bucket Name and Account ID from this URL.

Create an API token with the following steps:


Go to Cloudflare R2 API Tokens page: https://dash.cloudflare.com/?to=/:account/r2/api-tokens
Generate a new token with at least read and write permissions for objects
Copy the "Access Key ID" and paste it into the "Access Key" field
Copy the "Secret Access Key" and paste it into the "Secret Key" field
(Optional) Configure a Custom Domain:

If you have a custom domain for your R2 bucket, enter it in the "Custom Domain" field
This domain will be used when generating shareable links for uploaded files
In this example, I did not put my cusome domain in. It will i.51sec.org or i.itprosec.com

Verification and Save

Click the "Check" button to verify your bucket connectivity
If the connection test passes, click "Save" to store your configuration





ShareX Integration

https://getsharex.com/docs/cloudflare-r2



Ensure that your domain is added to Cloudflare and verified with NS (Name Server) records on your domain registrar. Your domain has to be hosted through Cloudflare; otherwise, this won't work, and you will be unable to use R2 / Cloudflare CDN to host your images.

While R2 is not free, it does have a generous free tier. The full pricing is available to see here.

To create a bucket:

  1. Open R2.
  2. Select Create bucket.
  3. Type your bucket name of choice, and click Create Bucket.
  4. Select Settings.
  5. Scroll to Domain Access and select Connect Domain.
  6. Type your domain and select Continue.
  7. Select Connect domain.

This connects your domain to the R2 bucket and allows any objects inside that bucket to be accessible by the selected domain.

Custom Domain for your bucket:



To create an API token:

  1. Open R2.
  2. Select Manage R2 API Tokens on the top-right side of the dashboard.
  3. Select Create API token.
  4. Select the pencil icon or R2 Token text to edit your API token name.
  5. Under Permissions, select Read or Edit for your token.
  6. Select Create API Token.
  7. Save a copy of your Access Key ID and Secret access key for the next step.



Create User API Toker for speciy bucket:


Note: you want to make sure to choose object read&write permissions at this screen. 

To configure uploading with ShareX:

  1. In Destinations, select Destination Settings.
  2. Scroll down to Amazon S3 and select it.
  3. Using the Access Key ID and Secret access key, fill in the two top boxes.
  4. Select Endpoint: and type <ACCOUNT_ID>.r2.cloudflarestorage.com. (You can find your account ID on the right-hand side of your Dashboard.)
  5. Set Region: to auto.
  6. Fill Bucket name: with the bucket name you picked on Cloudflare.
  7. Change Upload path: to your preference.
  8. Update Use custom domain: to the domain that you selected in the first step.
  9. Uncheck Set public-read ACL on file.
  10. Ignore the rest of the settings.
  11. In Destinations, select Image uploader: and change it to File Uploader -> Amazon S3.
  12. Take a screenshot and ensure that it uploads correctly.

ShareX Configuration (uploader to Amazon S3):


Amazon S3 Configuration:







References


  • How to configure Cloudflare R2 and use it in ShareX
  • ShareX Custom Uploader Solution with Cloudflare R2 Object Storage


https://blog.51sec.org


Via http://blog.51sec.org/2026/01/cloudflare-r2-operations-and-integrate.html
0 Comments

Monthly Free Pen Test Labs Notes (PentesterLab)

1/27/2026

0 Comments

 

PentesterLab provides two free exercises every month. This post is to record some interesting ones I have been done. 


Related Posts:

  • Free Online and Offline Labs From PentesterLab
  • Monthly Free Pen Test Labs Notes (PentesterLab)

https://pentesterlab.com/my/progress#onlinefree

Lab: API 18

In this challenge, your goal is to retrieve the key. However, the user you are logging in with does not have permission to access it. Your task is to identify a vulnerability in the authorization middleware. Upon logging in, you will see part of the application's source code. Audit the code carefully to uncover the vulnerability.



Burpsuite

Turn intercept on then open buit-in browser to open this page 

Click forward a couple of times until we got post 



Change post content by adding health=health, then forward 

You should be able to bypass the following check, which is checking if there is "health" at the end of url, and if the username is admin. If any of those condition not met, it will give you an error to show you dont have access to the key. 

    if !strings.HasSuffix(r.URL.String(), "health") && claims.Username != "admin" {
      http.Error(w, "You don't have access to the key", http.StatusUnauthorized)
      return
    }

Lab: Directory Traversal 01


Directory Traversals

Directory traversals come from a lack of filtering/encoding of information used as part of a path by an application.

As with other vulnerabilities, you can use the "same-value technique" to test for this type of issue.

For example, if the path used by the application inside a parameter is /images/photo.jpg. You can try to access:

  • /images/./photo.jpg: you should see the same file.
  • /images/../photo.jpg: you should get an error.
  • /images/../images/photo.jpg: you should see the same file again.
  • /images/../IMAGES/photo.jpg: you should get an error (depending on the file system), or something weird is going on.

If you don't have the value images and the legitimate path looks like photo.jpg, you will need to work out what the parent repository is.

Once you have tested that, you can try to retrieve other files.

On Linux/Unix the most common test case is the /etc/passwd.

You can test: images/../../../../../../../../../../../etc/passwd

If you get the passwd file, the application is vulnerable. The good news is that you don't need to know the number of ... If you put too many, it will still work.

Another interesting thing to know is that if you have a directory traversal in Windows, you will be able to access test/../../../file.txt, even if the directory test does not exist.

This is not the case on Linux.

This can be really useful where the code concatenates user-controlled data, to create a file name.

For example, the following PHP code is supposed to add the parameter id to get a file name (example_1.txt for example).

On Linux, you won't be able to exploit this vulnerability if there is no directory starting with example_, whereas on Windows, you will be able to exploit it, even if there is no such directory.

$file = "/var/files/example_".$_GET['id'].".txt";

In these exercises, the vulnerabilities are illustrated by a script used inside an <img tag.

You will need to read the HTML source (or use "Copy image URL") to find the correct link, and start exploiting the issue.

The first example is a really simple directory traversal. You just need to go up in the file system, and then back down, to get any files you want. In this instance, you will be restricted by the file system permissions, and won't be able to access /etc/shadow, for example.

In this example, based on the header sent by the server, your browser will display the content of the response. Sometimes the server will send the response with a header Content-Disposition: attachment, and your browser will not display the file directly. You can open the file to see the content. This method will take you some time for every test.

Using a Linux/Unix system, you can do this more quickly, by using wget or curl.

The objective of this exercise is to find the directory traversal and retrieve the key in the following file: /pentesterlab.key


For example, you find a file or image url is 
  • https://i.51sec.org/2025/chrome_fMjzra75Wa.png
You should be able to try to add . or .. into the url to go to other folders, but it will still show same result. 
  • https://i.51sec.org/././2025/chrome_fMjzra75Wa.png
  • https://i.51sec.org/../../../../../2025/chrome_fMjzra75Wa.png

If this vulnerability exists on the website, we should be able to construct a url like this to get the key:
  • https://i.51sec.org/../../../../../pentesterlab.key

In this exercise, you can use existing file.php to view this php file's content by right clicking page and viewing  source since it will show an empty page.

It is also possible to use a new constructed url to view /etc/passwd as show from following screenshot in Linux:
  • https://netsec.libcurl.me/file.php?file=../../../../../../../../../etc/passwd


On windows, you might be able to get the file boot.ini from c:/ drive. 






Lab: GraphQL Introspection

You can use GraphQL Introspection this vulnerability to find data that may not be exposed directly by an application.

Follow the following steps:

  • Find the GraphiQL endpoint, to be able to easily send a GraphQL query.
  • Lookup how to use GraphQL Introspection.
  • Find the hidden data to get the key to solve this exercise.

GraphQL

GraphQL is similar to SQL in that it's a standard to request and organize data (as opposed to MySQL that is a product that uses the standard SQL).

When coming across a new standard/product/technology, it's always a good idea to go through the "Introduction" course/tutorial that may be available.

For example, for GraphQL, you can read Introduction to GraphQL. This will help you get a better idea of the technology.

Some of this "training" may also offer you a sandpit/online version to start playing with the tool.

Detection of the issue

First, you will need to look at the traffic sent to the server when accessing the projects link. You should see a query to a /graphql/ endpoint. Here, the frontend graphiql is available, so you should find a web based IDE when you browse to the endpoint.

GraphQL offers an easy way to view metadata about the available information (this is very similar to the information_schema tables in modern databases. It helps users know what is available).

However, this has a security impact as it may allow attackers to get access to information that may not otherwise be exposed. This can be referred to as "security by obscurity".

Depending on the version of the GraphQL standard, you can use one of the following queries:

  • For old versions:
query IntrospectionQuery {
  __schema {
    queryType { name }
    mutationType { name }
    subscriptionType { name }
    types {
      ...FullType
    }
    directives {
      name
      description
      args {
        ...InputValue
      }
      onOperation
      onFragment
      onField
    }
  }
}

fragment FullType on __Type {
  kind
  name
  description
  fields(includeDeprecated: true) {
    name
    description
    args {
    ...InputValue
    }
    type {
    ...TypeRef
    }
    isDeprecated
    deprecationReason
  }
  inputFields {
  ...InputValue
  }
  interfaces {
  ...TypeRef
  }
  enumValues(includeDeprecated: true) {
    name
    description
    isDeprecated
    deprecationReason
  }
  possibleTypes {
  ...TypeRef
  }
}

fragment InputValue on __InputValue {
  name
  description
  type { ...TypeRef }
  defaultValue
}

fragment TypeRef on __Type {
  kind
  name
  ofType {
    kind
    name
    ofType {
      kind
      name
      ofType {
        kind
        name
      }
    }
  }
}
  • For more recent versions:
query IntrospectionQuery {
  __schema {
    queryType { name }
    mutationType { name }
    subscriptionType { name }
    types {
      ...FullType
    }
    directives {
      name
      description
      args {
        ...InputValue
      }
      locations
    }
  }
}

fragment FullType on __Type {
  kind
  name
  description
  fields(includeDeprecated: true) {
    name
    description
    args {
      ...InputValue
    }
    type {
      ...TypeRef
    }
    isDeprecated
    deprecationReason
  }
  inputFields {
    ...InputValue
  }
  interfaces {
    ...TypeRef
  }
  enumValues(includeDeprecated: true) {
    name
    description
    isDeprecated
    deprecationReason
  }
  possibleTypes {
    ...TypeRef
  }
}

fragment InputValue on __InputValue {
  name
  description
  type { ...TypeRef }
  defaultValue
}

fragment TypeRef on __Type {
  kind
  name
  ofType {
    kind
    name
    ofType {
      kind
      name
      ofType {
        kind
        name
      }
    }
  }
}

The only difference being the move from onOperation, onFragment and onFields to locations.

To get in more details, we use __schema to get more information about the available data. Then we ask for more information.

The most important part is to ask for types and look at everything with the name Query ("name": "Query"):

query MyQuery {
  __schema {
    types {
      name
      fields {
        name
      }
    }
  }
}

Using one of these queries, you should get a list of queries that you can run in place of the getprojects, used by the application.

One of the queries should give you access to the key to solve this exercise.

query Query {
  [NAME] {
    id
  }
}

Where [NAME] is the name of the query. For example, with projects:

query Query {
  projects {
    id
  }
}

You can use GraphQL Introspection to get access to information that is not necessarily exposed by the application. Then you managed to write your own GraphQL query to get access to this data.

It's very common that storage and query mechanisms offer a way to get metadata about the available information, it's always a wise idea to see if there is more data available than what is exposed by the application.

Start Kali Linux - Burpsuite v2025.8.8 Community Edition


Proxy - HTTPHistory - Open Browser - enter url of target if you have not done that before.


Right click the content then select "Send to Repeater". 



change code with VIM to replace new line characters with the literal string \n
  • :%s /\n/\\n/

query IntrospectionQuery {\n  __schema {\n    queryType { name }\n    mutationType { name }\n    subscriptionType { name }\n    types {\n      ...FullType\n    }\n    directives {\n      name\n      description\n      args {\n        ...InputValue\n      }\n      locations\n    }\n  }\n}\n\nfragment FullType on __Type {\n  kind\n  name\n  description\n  fields(includeDeprecated: true) {\n    name\n    description\n    args {\n      ...InputValue\n    }\n    type {\n      ...TypeRef\n    }\n    isDeprecated\n    deprecationReason\n  }\n  inputFields {\n    ...InputValue\n  }\n  interfaces {\n    ...TypeRef\n  }\n  enumValues(includeDeprecated: true) {\n    name\n    description\n    isDeprecated\n    deprecationReason\n  }\n  possibleTypes {\n    ...TypeRef\n  }\n}\n\nfragment InputValue on __InputValue {\n  name\n  description\n  type { ...TypeRef }\n  defaultValue\n}\n\nfragment TypeRef on __Type {\n  kind\n  name\n  ofType {\n    kind\n    name\n    ofType {\n      kind\n      name\n      ofType {\n        kind\n        name\n      }\n    }\n  }\n}\n
Modify the query part as show below, then send the request again, you will see response is giving lots of data schema related info now:
from previous screenshot's response, you will find a name which is ptlabkeys.

Tried to change original query to replace projects with ptlabkeys, then see what we got:

Remove a bit more information regarding name and description since could not find . We got this 

Go back first response screenshot, you will find there is a value field, which you can put it to get the final key:





CBC-MAC



https://pentesterlab.com/exercises/cbc-mac

CBC-MAC is a method to ensure the integrity of a message by encrypting it using CBC mode and keeping the last encrypted block as a "signature". This ensures that a malicious user cannot modify any part of the data without having to change the signature. The key used for the "encryption" ensures that the signature cannot be guessed.

However, when using CBC-MAC, the developer needs to be very careful if the messages are not of a fixed length. In this example, we will use the fact that there is no protection in place to get the application to sign two messages and build another message by concatenating the two messages.

Theory

With CBC-MAC, we can generate two signatures t and t' for the messages m and m'. By using m and m' we can forge another message m'' that will have the same signature as m' (t'). One thing to keep in mind is that the recommended way to use CBC-MAC is to use a NULL IV.

To keep things simple, we are going to work on a single block for each message.

We can see below how signing both messages works (NB: both signatures are completely independent of each other):

If we try to concatenate those messages, the signature will no longer be valid (since t is now the IV for the second block where it was only NULL before):

However, if we XOR m' and t, the signature is now t':

Implementation

Based on the size of the signature, we can guess that the block size is likely to be 8. With this information, we will split administrator into:

  • administ.
  • rator\00\00\00.

We can trivially generate the signature for the first block, by just logging in and retrieving the signature t.

For the second block, we want the m' XOR t to be equal to rator\00\00\00. So to generate the second username we will need to XOR rator\00\00\00 with t (since the application will sign it with a NULL IV instead of t). Once we have this value, we can get the signature t'.

Finally, we just need to concatenate m and m' to get administrator and use t' as a signature.

https://pentesterlab.com/exercises/cbc-mac/videos





GCM Tag Truncation


Introduction

This exercise covers the impact of tag truncation in Galois/Counter Mode (GCM). When GCM is used, an authentication tag is generated to verify the integrity of the encrypted data. If an application fails to enforce the expected tag length, an attacker can supply a truncated tag and brute-force the missing bytes, drastically weakening the security.

This lab demonstrates how GCM truncation can be exploited against a Ruby application. The same vulnerable pattern can also be found in PHP with openssl_decrypt.

Exploitation

To exploit this issue, you will first need to register an account. The attack relies on creating a username that is very close to the targeted one (for example, bdmin, cdmin, or ddmin) in order to escalate to admin.

Once registered, you can take the encrypted session data, base64-decode it, and truncate the GCM tag to a single byte. If the application does not enforce the tag length, it may still accept the ciphertext, keeping you logged in.

At this point, you can modify the first byte of the encrypted username (after base64-decoding) and brute-force the single-byte tag until the server accepts it. If successful, you will be logged in. I you are logged in as admin, you will get access to the key for the challenge. If you end up logged in as another user, you can repeat the process with a different modification of the first byte until you gain access as admin.


References


  • https://pentesterlab.com/exercises
  • Penetration Testing Methodologies from Tryhackme
https://blog.51sec.org


Via http://blog.51sec.org/2025/11/pen-test-labs-notes.html
0 Comments

Cloudflare R2 Storage Integrates with ShareX

1/19/2026

0 Comments

 

ShareX, which is a the most powerful, free and open source application screenshot utility with a lot of features, includes the ability to upload images, videos, and files to not only the many publicly available services, but your own custom ones.


ShareX has provided their own documentation here for configuring ShareX with Cloudflare R2, which is simple to follow. This post is to give a more screenshot guide to show you the steps how to configure ShareX to upload screenshots to Cloudflare R2, this s3 compatible storage.

https://i.itprosec.com/2026/01/integrate%20Cloudflare%20R2%20storage%20with%20ShareX.png

https://i.itprosec.com/2026/01/Photos_zlRapcl5zI.jpg

Free tier of Cloudflare R2

Cloudflare R2 is an object storage provider similar to Amazon S3, which allows for storing large amounts of unstructured data. Cloudflare R2 is S3-compatible, so it is able to utilize some of the already created S3 libraries, extensions, and tools. One of the core benefits of Cloudflare’s offering, is that there are no egress charges, which some other companies charge when data is accessed externally. And depending on volume of requests and how much data is being requested, that can become costly.

More information can be found here.

Cloudflare R2 offers a forever free tier, that includes:

  • 10 GB Storage per month
  • 1,000,000 Class A Operations per month
  • 10,000,000 Class B Operations per month

If you need to go past these limits or your utilization is past these limits, then the following is the current additional costs as of 3/3/2025:

  • $0.015/GB for storage past 10 GB.
  • $4.50 per additional million operations past your monthly free limit of 1,000,000 Class A Operations.
  • $0.36 per additional million operations past your monthly free limit of 10,000,000 Class B Operations.
You can use the following amount of storage and operations each month for free.
Free
Storage 10 GB-month / month
Class A Operations 1 million requests / month
Class B Operations 10 million requests / month
Egress (data transfer to Internet) Free 1

Warning

The free tier only applies to Standard storage, and does not apply to Infrequent Access storage.



The main different between Class A Operations vs Class B Operations is what they do.

  • Class A Operations tend to mutate the state.
  • Class B Operations tend to read the state.

If you are only hosting images, files, or files that are not changing, you will mainly be using Class B Operations, since that would be people viewing those items stored. And the Class A Operations would you be uploading these items, listing what is inside your bucket, deleting, editing, etc.

Another benefit of utilizing a custom domain with Cloudflare R2, is that it can leverage other features from Cloudflare such as their Content Delivery Network (CDN) for caching these files/images/videos. Which should result in limiting the number of Class B Operations, if the files are already cached by the user’s browser on Cloudflare’s edge network.

Additional information on pricing and the different type of operations can be found here.

Class A operations

Class A Operations include ListBuckets, PutBucket, ListObjects, PutObject, CopyObject, CompleteMultipartUpload, CreateMultipartUpload, LifecycleStorageTierTransition, ListMultipartUploads, UploadPart, UploadPartCopy, ListParts, PutBucketEncryption, PutBucketCors and PutBucketLifecycleConfiguration.

Class B operations

Class B Operations include HeadBucket, HeadObject, GetObject, UsageSummary, GetBucketEncryption, GetBucketLocation, GetBucketCors and GetBucketLifecycleConfiguration.

Free operations

Free operations include DeleteObject, DeleteBucket and AbortMultipartUpload.



Uploads to Cloudflare R2


1. Dashboard upload limitation
<100 files, < 300MB size


2. https://r2uploader.com/
A lightweight yet powerful desktop application built with Rust and Tauri, enabling lightning-fast file uploads. Optimized for large files and batch uploads, with no 300MB limit!
Your configuration remains local - we never collect or upload your credentials.



Connection Setup

Find your Cloudflare R2 S3 API URL:


Go to your R2 bucket settings page
Look for the "S3 API" section under "Bucket Details"
Copy the S3 API URL in the following format:
https://[accountId].r2.cloudflarestorage.com/[bucketName]
The application will automatically extract the Bucket Name and Account ID from this URL.

Create an API token with the following steps:


Go to Cloudflare R2 API Tokens page: https://dash.cloudflare.com/?to=/:account/r2/api-tokens
Generate a new token with at least read and write permissions for objects
Copy the "Access Key ID" and paste it into the "Access Key" field
Copy the "Secret Access Key" and paste it into the "Secret Key" field
(Optional) Configure a Custom Domain:

If you have a custom domain for your R2 bucket, enter it in the "Custom Domain" field
This domain will be used when generating shareable links for uploaded files
In this example, I did not put my cusome domain in. It will i.51sec.org or i.itprosec.com

Verification and Save

Click the "Check" button to verify your bucket connectivity
If the connection test passes, click "Save" to store your configuration





ShareX Integration

https://getsharex.com/docs/cloudflare-r2



Ensure that your domain is added to Cloudflare and verified with NS (Name Server) records on your domain registrar. Your domain has to be hosted through Cloudflare; otherwise, this won't work, and you will be unable to use R2 / Cloudflare CDN to host your images.

While R2 is not free, it does have a generous free tier. The full pricing is available to see here.

To create a bucket:

  1. Open R2.
  2. Select Create bucket.
  3. Type your bucket name of choice, and click Create Bucket.
  4. Select Settings.
  5. Scroll to Domain Access and select Connect Domain.
  6. Type your domain and select Continue.
  7. Select Connect domain.

This connects your domain to the R2 bucket and allows any objects inside that bucket to be accessible by the selected domain.

Custom Domain for your bucket:



To create an API token:

  1. Open R2.
  2. Select Manage R2 API Tokens on the top-right side of the dashboard.
  3. Select Create API token.
  4. Select the pencil icon or R2 Token text to edit your API token name.
  5. Under Permissions, select Read or Edit for your token.
  6. Select Create API Token.
  7. Save a copy of your Access Key ID and Secret access key for the next step.



Create User API Toker for speciy bucket:


Note: you want to make sure to choose object read&write permissions at this screen. 

To configure uploading with ShareX:

  1. In Destinations, select Destination Settings.
  2. Scroll down to Amazon S3 and select it.
  3. Using the Access Key ID and Secret access key, fill in the two top boxes.
  4. Select Endpoint: and type <ACCOUNT_ID>.r2.cloudflarestorage.com. (You can find your account ID on the right-hand side of your Dashboard.)
  5. Set Region: to auto.
  6. Fill Bucket name: with the bucket name you picked on Cloudflare.
  7. Change Upload path: to your preference.
  8. Update Use custom domain: to the domain that you selected in the first step.
  9. Uncheck Set public-read ACL on file.
  10. Ignore the rest of the settings.
  11. In Destinations, select Image uploader: and change it to File Uploader -> Amazon S3.
  12. Take a screenshot and ensure that it uploads correctly.

ShareX Configuration (uploader to Amazon S3):


Amazon S3 Configuration:







References


  • How to configure Cloudflare R2 and use it in ShareX
  • ShareX Custom Uploader Solution with Cloudflare R2 Object Storage


https://blog.51sec.org


Via http://blog.51sec.org/2026/01/cloudflare-r2-operations-and-integrate.html
0 Comments
<<Previous

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org