UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Smtp server and mail list system for sending unlimited emails and text messages:

Mail Demon is a robust and efficient tool for sending bulk emails and text messages. Its design focuses on high performance, simplicity, and secure delivery, leveraging .NET 6.0+ and integration with frameworks like MimeKit and MailKit. It includes built-in security features such as SPF validation and integrates seamlessly with IPBan for added protection against brute force attacks.

>> Features
- High Performance: Optimized for low memory and CPU usage, capable of sending thousands of messages per second.
- Security: Supports SPF, DKIM, and DMARC records for secure email delivery.
- SMTP Features: Includes support for extensions like STARTTLS, AUTH PLAIN, and SMTPUTF8.
- Mail List Management: Integrated website for managing mailing lists, templates, and subscriber interactions.
- Database Support: SQLite by default, with SQL Server support as an option.
- Cross-platform Compatibility: Runs on Linux and Windows servers.

>> Setup Instructions

>> General Prerequisites
1. Install .NET 6.0+ runtime or publish as a self-contained executable.
2. Update `appsettings.json` with your configurations:
- SMTP settings.
- User credentials (avoid default settings).
- SSL certificates (recommended: Let’s Encrypt).

>># Building Mail Demon
1. Download and open the project in Visual Studio/VS Code.
2. Set the release configuration.
3. Publish the project.
4. Transfer the binaries to your server.

>> Linux Service Configuration
1. Place binaries in /opt/MailDemon.
2. Create a service file (/lib/systemd/system/MailDemon.service):

   [Unit]
Description=Mail Demon Service
After=network.target

[Service]
WorkingDirectory=/opt/MailDemon
ExecStart=/usr/bin/dotnet /opt/MailDemon/MailDemon.dll
Restart=on-failure

[Install]
WantedBy=multi-user.target

3. Enable and start the service:

   sudo systemctl daemon-reload
sudo systemctl enable MailDemon
sudo systemctl start MailDemon
systemctl status MailDemon


>># DNS Configuration
1. SPF Record: v=spf1 mx -all
2. MX Record: Point to your domain's email server.
3. A/AAAA Record: Map to your server's IP address.
4. DMARC Record: Refer to [DMARC wiki](https://en.wikipedia.org/wiki/DMARC).
5. DKIM: Set up DKIM keys for email authentication.
6. Reverse DNS: Ensure your IP address resolves to your mail server domain.

>> Mail List Management
1. Enable Web Interface:
- Set enableWeb to true in appsettings.json.
- Configure authority, admin credentials, and reCAPTCHA keys.
2. Create and Manage Lists:
- Log in at /MailDemonLogin.
- Define lists and templates.
- Customize templates using Razor syntax.

3. Sending Emails:
- Assign a subject using <!-- Subject: ... --> in templates.
- Send bulk emails using the integrated mail list interface.

4. Magic Templates for Default Behaviors:
- SubscribeInitial: Sign-up form.
- SubscribeConfirm: Confirmation email.
- SubscribeWelcome: Welcome email.

>> Database Management
- Default: SQLite (MailDemon.db).
- Optional: SQL Server (configure in appsettings.json).

>> Known Issues
- Hotmail and Outlook Certificates: Add problematic domains to appsettings.json if invalid SSL certificates are encountered.

This streamlined tool is ideal for managing notifications, announcements, and bulk messaging tasks with ease.

@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Exploit: index : ghostpdl.git
CVE-2024-46951

See bug report for details.

Diffstat
-rw-r--r-- psi/zcolor.c 3
1 files changed, 3 insertions, 0 deletions
diff --git a/psi/zcolor.c b/psi/zcolor.c
index d4e7a4438..d3384d75d 100644
--- a/psi/zcolor.c
+++ b/psi/zcolor.c
@@ -5276,6 +5276,9 @@ static int patterncomponent(i_ctx_t * i_ctx_p, ref *space, int *n)
code = array_get(imemory, pImpl, 0, &pPatInst);
if (code < 0)
return code;
+
+ if (!r_is_struct(&pPatInst) || (!r_has_stype(&pPatInst, imemory, st_pattern1_instance) && !r_has_stype(&pPatInst, imemory, st_pattern2_instance)))
+ return_error(gs_error_typecheck);
cc.pattern = r_ptr(&pPatInst, gs_pattern_instance_t);
if (pattern_instance_uses_base_space(cc.pattern))
*n = n_comps;


@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Simulate Attack with Atomic Red Team:

What is Atomic Red Teams?
According to their Github pages, Atomic Red Team is a library of tests mapped to the MITRE ATT&CK framework. Security teams can use Atomic Red Team to quickly, portably, and reproducibly test their environments.


Prerequisites

>Virtual Machine with NAT Connection (Dont Use your Real Own PC).

>Windows Operating System (in this tutorial we are using Win10 Pro).

>Disabled Antivirus and Exclusion The

>EDR Script Onboarding
(If you want to deploy with local script deployment)

🦑Powershell to execute the command
Step-By-Step:

Login to your VM. Prepare the Environment first with disabling the Antivirus. Right Click Windows PowerShell > Run As Admin PowerShell