WhiteFAANG demonstrates potential adversarial scenarios of data exploitation based on user account data exports from Apple, Google, and Meta. The POCs utilize various input files exported from the respective services, which can be found in the following links:
Apple: https://support.apple.com/en-us/102208
Google: https://takeout.google.com
Meta: https://www.meta.com/help/quest/articles/accounts/privacy-information-and-settings/view-your-information-and-download-your-information
A related blog post:
https://www.cyberark.com/resources/threat-research-blog/white-faang-devouring-your-personal-data
Once you export your personal data to your laptop, replace the placeholder values with the full path of the export.
Use pip install
to install any required modules when necessary.
Run the relevant code segment of the Jupyter Notebook.
The output demonstrates the expected format but contains randomized information (MAC addr, etc.).
We welcome contributions of all kinds to this repository.
For instructions on how to get started and descriptions
of our development workflows, please see our https://github.com/cyberark/WhiteFAANG/blob/main/CONTRIBUTING.md.
Copyright (c) 2024 CyberArk Software Ltd. All rights reserved
This repository is licensed under Apache License 2.0 - see LICENSE
for more details.
For more comments, suggestions, or questions, you can contact Lior Yakim from CyberArk Labs. You can find more projects developed by us at https://github.com/cyberark/.