UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘π…π‘π„π„ π‘π„π’πŽπ”π‘π‚π„π’ - π‹πˆππ”π—

To acquire the basics of pentesting, it is crucial to understand what an operating system is.
As an open-source, community-developed operating system, Linux plays an essential role here.
As well as being a powerful tool for system administrators, Linux is also a powerful tool for pentesters.

In this list, you'll find various resources designed to help you understand and start with Linux.

πŸ‘‰π—ͺ𝗛𝗔𝗧 π—œπ—¦ π—Ÿπ—œπ—‘π—¨π—«?
🌟What is Linux on TechTarget
https://lnkd.in/eAm2rHXj

🌟What is Linux on Linux.com
https://lnkd.in/eTwMHeCM

πŸ‘‰π—Ÿπ—œπ—‘π—¨π—« 𝗙𝗒π—₯ π—•π—˜π—šπ—œπ—‘π—‘π—˜π—₯𝗦
🌟Linux journey by Cindy Quach
https://linuxjourney.com/

🌟Your linux guide by LinuxOpSys
https://linuxopsys.com/

🌟Crash Course for Beginners by freeCodeCamp
https://lnkd.in/eF9P79U4

🌟Linux Full Course for Beginners by FreeCodeCamp
https://lnkd.in/eGhw9Qy3

🌟How Linux Works by Gwyneth Peña-Siguenza
https://lnkd.in/eDZt4CKA

🌟NDG Linux Unhatched by Netacad
https://lnkd.in/ebmPF9ev

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘π—•π—”π—¦π—› 𝗦𝗖π—₯π—œπ—£π—§π—œπ—‘π—š
🌟What is Bash by opensource
https://lnkd.in/eVYjUxvD

🌟Bash for Beginners by Microsoft Developer
https://lnkd.in/eA7E9wTt

🌟Bash Scripting Full Course by linuxhint
https://lnkd.in/eFTJe3Dm

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘π—›π—”π—–π—žπ—œπ—‘π—š π—ͺπ—œπ—§π—› π—Ÿπ—œπ—‘π—¨π—«:

🌟Useful Commands and tools for pentest on Linux by C.S. by G.B.
https://lnkd.in/eUS5hi8w

🌟Linux for hackers by Chuck Keith aka NetworkChuck
https://lnkd.in/er4MJht9
🌟Learn Linux on Hackthebox (blog post)
https://lnkd.in/eXcX2fng

🌟Top Kali Linux Tools for hacking by IT’s Foss
https://lnkd.in/eDKjut6n

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘How to run OpenAI's CLI (Python-based Tool)

OpenAI also offers a CLI tool called openai, which you can install via pip and use to interact with their models directly from the command line. This is more structured than using curl and can be easily integrated into scripts.

Install the OpenAI CLI:
pip install openai


Usage:
After installing the openai package, you can use the openai command-line tool directly.

openai api completions.create -m text-davinci-003 -p "What is the capital of France?" --max-tokens 50


- -m specifies the model (text-davinci-003 in this case).


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘dark web links
A list of helpful links I found for the dark web


note: Some of the content here can lead you to some illegal websites. so the use of those links is on you!

The list:
Hidden wikis/ sites with links:
Darkweblink.com

http://dwltorbltw3tdjskxn23j2mwz2f4q25j4ninl5bdvttiy4xb6cqzikid.onion/
OnionLinks

http://s4k4ceiapwwgcm3mkb6e4diqecpo7kvdnfr5gg7sph7jjppqkvwwqtyd.onion
The Original Hidden Wiki

http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page
The Hidden Wiki

http://paavlaytlfsqyvkg3yqj7hflfg5jw2jdg2fgkza5ruf6lplwseeqtvyd.onion/
Another Hidden Wiki

http://2jwcnprqbugvyi6ok2h2h7u26qc6j5wxm7feh3znlh2qu3h6hjld4kyd.onion/
UnderDir

http://underdiriled6lvdfgiw4e5urfofuslnz7ewictzf76h4qb73fxbsxad.onion
TheDeepDarkNet

http://torlisthsxo7h65pd2po7kevpzkk4wwf3czylz3izcmsx4jzwabbopyd.onion/
DeepLink Onion Directory

http://deeeepv4bfndyatwkdzeciebqcwwlvgqa6mofdtsvwpon4elfut7lfqd.onion/
Pug's Ultimate Guide To The Dark Web

http://jgwe5cjqdbyvudjqskaajbfibfewew4pndx52dye7ug3mt3jimmktkid.onion/
Tor Links

http://torlinksge6enmcyyuxjpjkoouw4oorgdgeo7ftnq3zodj7g2zxi3kyd.onion/
Searching engine
Deep Search

http://search7tdrcvri22rieiwgi5g46qnwsesvnubqav2xakhezv4hjzkkad.onion/
Torch

http://xmh57jrknzkhv6y3ls3ubitzfqnkrwxhopf5aygthi7d6rplyvk3noyd.onion
Tor66

http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/
Ahmia

http://juhanurmihxlp77nkq76byazcldy2hlmovfu2epvl5ankdibsot4csyd.onion/
chat rooms
Ableonion

notbumpz34bgbz4yfdigxvd6vzwtxc3zpt5imukgl6bvip2nikdmdaad.onion
Black Hat Chat

http://blkhatjxlrvc5aevqzz5t6kxldayog6jlx5h7glnu44euzongl4fh5ad.onion

Source
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Cybersecurity Projects Ideas: From Beginners to Experts πŸ”

Are you looking to kickstart your career in cybersecurity or take it to the next level? Whether you're a beginner or an experienced professional, hands-on projects are the ultimate way to enhance your skills. 🌟

🟒 Beginner-Level Projects
These are ideal for building foundational skills:
1️⃣ Honeypot Setup
2️⃣ Password Cracker
3️⃣ Packet Sniffer
4️⃣ Keylogger
5️⃣ Forensic Analysis
6️⃣ Home Lab Setup
7️⃣ Basic Cryptography
8️⃣ Phishing Campaign
9️⃣ Wi-Fi Security Analysis
πŸ”Ÿ Network Vulnerability Scanning

🟑 Intermediate-Level Projects
Challenge yourself with these impactful projects:
1️⃣1️⃣ Firewall Rules
1️⃣2️⃣ 2FA System
1️⃣3️⃣ Secure Web App
1️⃣4️⃣ Snort IDS
1️⃣5️⃣ DNS Spoofer
1️⃣6️⃣ Malware Reverse Engineering
1️⃣7️⃣ TLS Mutual Authentication
1️⃣8️⃣ Zero-Day Exploit Research

πŸ”΄ Advanced-Level Projects
For seasoned professionals seeking mastery:
2️⃣6️⃣ Malware Analysis Sandbox
2️⃣7️⃣ Full Disk Encryption
2️⃣8️⃣ IDS/IPS with ML
2️⃣9️⃣ Secure Cryptocurrency Wallet
3️⃣0️⃣ Threat Detection Using AI
3️⃣1️⃣ Firmware Reverse Engineering
3️⃣2️⃣ ICS Security
3️⃣3️⃣ Nation-State Malware Analysis
3️⃣4️⃣ Advanced Firewalls

Source: Linkedin
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁