Forwarded from DailyCVE
๐ต SimpleXLSX, Cross-site Scripting (XSS) Vulnerability (#CVE-2024-XXX)
https://dailycve.com/simplexlsx-cross-site-scripting-xss-vulnerability-cve-2024-xxx/
@Daily_CVE
https://dailycve.com/simplexlsx-cross-site-scripting-xss-vulnerability-cve-2024-xxx/
@Daily_CVE
DailyCVE
SimpleXLSX, Cross-site Scripting (XSS) Vulnerability (CVE-2024-XXX) - DailyCVE
2024-12-12 A Cross-site Scripting (XSS) vulnerability has been identified in the SimpleXLSX library, specifically in the `readXfs` and `toHTMLEx` functions. [โฆ]
Forwarded from UNDERCODE TESTING
๐ฆ ๐
๐๐๐ ๐๐ฅ๐๐ฌ๐ฌ๐๐ฌ ๐๐จ๐ซ ๐ ๐ฉ๐๐ญ๐ก๐ฐ๐๐ฒ ๐ข๐ง๐ญ๐จ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ง๐ ๐๐ญ๐ก๐ข๐๐๐ฅ ๐ก๐๐๐ค๐ข๐ง๐ ๐
๐จ๐ฎ๐ง๐๐๐ญ๐ข๐จ๐ง๐ฌ:
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Help Desk
โก๏ธTCM Security Academy โ Practical Help Desk (https://lnkd.in/geDEvt6d)
โก๏ธProfessor Messer โ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)
Networking
โก๏ธProfessor Messer โ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โก๏ธCisco Networking Academy โ Packet Tracer (https://lnkd.in/guGibYx6)
Linux
โก๏ธTCM Security Academy โ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โก๏ธLinux Journey (https://linuxjourney.com/)
โก๏ธOverTheWire โ Bandit (https://lnkd.in/gRwPsump)
Programming
โก๏ธTCM Security โ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โก๏ธCodecademy (https://lnkd.in/gxAHnTFD)
Security Essentials
โก๏ธProfessor Messer โ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)
Hacking Essentials
โก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โก๏ธTryHackMe (https://tryhackme.com/)
Active Directory Hacking
โก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)
Web Application Hacking
โก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โก๏ธHacker101 (https://www.hacker101.com/)
โก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)
Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ Chinese Police Caught Using #Android #Spyware to Track Mobile Devices
https://undercodenews.com/chinese-police-caught-using-android-spyware-to-track-mobile-devices/
@Undercode_News
https://undercodenews.com/chinese-police-caught-using-android-spyware-to-track-mobile-devices/
@Undercode_News
UNDERCODE NEWS
Chinese Police Caught Using Android Spyware to Track Mobile Devices - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
North Korea's Cyberwarfare: Indictment of 14 IT Workers
https://undercodenews.com/north-koreas-cyberwarfare-indictment-of-14-it-workers/
@Undercode_News
https://undercodenews.com/north-koreas-cyberwarfare-indictment-of-14-it-workers/
@Undercode_News
UNDERCODE NEWS
North Korea's Cyberwarfare: Indictment of 14 IT Workers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Takedown of Rydox: Major #Cybercrime Marketplace Shut Down, Admins Arrested
https://undercodenews.com/takedown-of-rydox-major-cybercrime-marketplace-shut-down-admins-arrested/
@Undercode_News
https://undercodenews.com/takedown-of-rydox-major-cybercrime-marketplace-shut-down-admins-arrested/
@Undercode_News
UNDERCODE NEWS
Takedown of Rydox: Major Cybercrime Marketplace Shut Down, Admins Arrested - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โ ๏ธ Cyberattacks on Critical Infrastructure: Iranian #Malware Targets #IoT and OT Systems
https://undercodenews.com/cyberattacks-on-critical-infrastructure-iranian-malware-targets-iot-and-ot-systems/
@Undercode_News
https://undercodenews.com/cyberattacks-on-critical-infrastructure-iranian-malware-targets-iot-and-ot-systems/
@Undercode_News
UNDERCODE NEWS
Cyberattacks on Critical Infrastructure: Iranian Malware Targets IoT and OT Systems - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆBug Bounty Tip : OTP Bypass
Ref: Aswin k v
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Ref: Aswin k v
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
A Flawed Feature: #Windows 11's Suggested Actions Gets the Axe
https://undercodenews.com/a-flawed-feature-windows-11s-suggested-actions-gets-the-axe/
@Undercode_News
https://undercodenews.com/a-flawed-feature-windows-11s-suggested-actions-gets-the-axe/
@Undercode_News
UNDERCODE NEWS
A Flawed Feature: Windows 11's Suggested Actions Gets the Axe - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Snapdragon X Elite 2: #Qualcomm's Next-Gen Chip Aims to Disrupt the PC Market
https://undercodenews.com/snapdragon-x-elite-2-qualcomms-next-gen-chip-aims-to-disrupt-the-pc-market/
@Undercode_News
https://undercodenews.com/snapdragon-x-elite-2-qualcomms-next-gen-chip-aims-to-disrupt-the-pc-market/
@Undercode_News
UNDERCODE NEWS
Snapdragon X Elite 2: Qualcomm's Next-Gen Chip Aims to Disrupt the PC Market - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Google Cloud Next '25: Your Gateway to the Future of Development
https://undercodenews.com/google-cloud-next-25-your-gateway-to-the-future-of-development/
@Undercode_News
https://undercodenews.com/google-cloud-next-25-your-gateway-to-the-future-of-development/
@Undercode_News
UNDERCODE NEWS
Google Cloud Next '25: Your Gateway to the Future of Development - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Rydox Marketplace Busted: International Law Enforcement Takes Down Major #Cybercrime Hub
https://undercodenews.com/rydox-marketplace-busted-international-law-enforcement-takes-down-major-cybercrime-hub/
@Undercode_News
https://undercodenews.com/rydox-marketplace-busted-international-law-enforcement-takes-down-major-cybercrime-hub/
@Undercode_News
UNDERCODE NEWS
Rydox Marketplace Busted: International Law Enforcement Takes Down Major Cybercrime Hub - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆThe Silent Saboteurs: Unmasking Cybersecurity Insider Threats
๐ก "The biggest threats often come from within."
When it comes to cybersecurity, insider threats are the silent saboteurs that can cause more damage than any external attack. Whether intentional or accidental, these threats are closer than you think.
Letโs explore how insider threats interact with the most common cyberattacks and, more importantly, how to combat them effectively.
๐ What Are Insider Threats?
Insider threats come in three forms:
1๏ธโฃ Malicious insiders โ Those intentionally harming the organization.
2๏ธโฃ Negligent insiders โ Carelessly exposing vulnerabilities.
3๏ธโฃ Compromised insiders โ Falling prey to external attackers, such as phishing schemes.
๐ How Do Insider Threats Amplify Cyberattacks?
Hereโs how insiders can make common cyberattacks even more dangerous:
Phishing: One wrong click can give attackers access to your systems.
Malware: Unintentional downloads can lead to system-wide infections.
Ransomware: A simple mistake can lock down your entire organization.
Credential Stuffing: Weak or reused passwords make attackersโ jobs easier.
Man-in-the-Middle (MitM) Attacks: Insiders might unknowingly allow sensitive communications to be intercepted.
SQL Injection & Cross-Site Scripting (XSS): Weak development or security practices can leave loopholes.
๐จ How Can Organizations Combat Insider Threats?
1๏ธโฃ Adopt Zero Trust โ Verify every user and device before granting access.
2๏ธโฃ Educate Employees โ Awareness is the first line of defense.
3๏ธโฃ Implement MFA โ Make it harder for attackers to misuse credentials.
4๏ธโฃ Monitor Activity โ Track unusual behavior to catch threats early.
5๏ธโฃ Encrypt Data โ Protect information from eavesdropping.
6๏ธโฃ Restrict Access โ Provide data access on a need-to-know basis.
๐ Insider Threats: A Wake-Up Call
Insider threats remind us that cybersecurity isnโt just about firewalls; itโs about people. Building a security-first culture and using advanced tools can keep your organization safe.
Ref: Murtuza Lokhandwala
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ก "The biggest threats often come from within."
When it comes to cybersecurity, insider threats are the silent saboteurs that can cause more damage than any external attack. Whether intentional or accidental, these threats are closer than you think.
Letโs explore how insider threats interact with the most common cyberattacks and, more importantly, how to combat them effectively.
๐ What Are Insider Threats?
Insider threats come in three forms:
1๏ธโฃ Malicious insiders โ Those intentionally harming the organization.
2๏ธโฃ Negligent insiders โ Carelessly exposing vulnerabilities.
3๏ธโฃ Compromised insiders โ Falling prey to external attackers, such as phishing schemes.
๐ How Do Insider Threats Amplify Cyberattacks?
Hereโs how insiders can make common cyberattacks even more dangerous:
Phishing: One wrong click can give attackers access to your systems.
Malware: Unintentional downloads can lead to system-wide infections.
Ransomware: A simple mistake can lock down your entire organization.
Credential Stuffing: Weak or reused passwords make attackersโ jobs easier.
Man-in-the-Middle (MitM) Attacks: Insiders might unknowingly allow sensitive communications to be intercepted.
SQL Injection & Cross-Site Scripting (XSS): Weak development or security practices can leave loopholes.
๐จ How Can Organizations Combat Insider Threats?
1๏ธโฃ Adopt Zero Trust โ Verify every user and device before granting access.
2๏ธโฃ Educate Employees โ Awareness is the first line of defense.
3๏ธโฃ Implement MFA โ Make it harder for attackers to misuse credentials.
4๏ธโฃ Monitor Activity โ Track unusual behavior to catch threats early.
5๏ธโฃ Encrypt Data โ Protect information from eavesdropping.
6๏ธโฃ Restrict Access โ Provide data access on a need-to-know basis.
๐ Insider Threats: A Wake-Up Call
Insider threats remind us that cybersecurity isnโt just about firewalls; itโs about people. Building a security-first culture and using advanced tools can keep your organization safe.
Ref: Murtuza Lokhandwala
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โ ๏ธ Hundreds of Thousands of Prometheus Instances Exposed, Posing Security Risks
https://undercodenews.com/hundreds-of-thousands-of-prometheus-instances-exposed-posing-security-risks/
@Undercode_News
https://undercodenews.com/hundreds-of-thousands-of-prometheus-instances-exposed-posing-security-risks/
@Undercode_News
UNDERCODE NEWS
Hundreds of Thousands of Prometheus Instances Exposed, Posing Security Risks - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ (Best Offensive Password Scrambler) is a powerful tool designed for targeted wordlist generation, ideal for penetration testers and cybersecurity professionals. Here's an overview:
ใ Key Features
1. Personalized Wordlist Creation:
- Combine target-specific words with additional transformations.
- Includes separators, numbers, and special characters for realistic passwords.
2. LyricPass Module:
- Search song lyrics by artist and integrate lines into the wordlist.
- Automatically adds artist names and initialisms for phrases.
3. Customizable Transforms:
- Define character sets and transformation patterns in a configuration file.
- New case transformation mode for extensive variations.
4. Two Interfaces:
- Interactive Mode: Guided input for creating tailored wordlists.
- One-Line Commands: Quick operations for power users.
5. Compatibility:
- Built with Python 3 (Python 2.7 support available in a secondary branch).
- Includes modules like
ใ Installation
ใ# From PyPI:
ใ# From GitHub:
ใ Usage Examples
ใ# Interactive Mode:
ใ# Non-Interactive Mode:
ใ# LyricPass Integration:
ใ# Full Options:
ใ Latest Version (2.4.7) Updates:
- Improved speed and performance.
- Advanced case transformations for generating all case variants.
ใ Advanced Features
1. Combine common symbols (
2. Use leet transformations (e.g.,
3. Save and customize configurations using
For further details, check the repository: [Bopscrk GitHub](https://github.com/r3nt0n/bopscrk).
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
ใ Key Features
1. Personalized Wordlist Creation:
- Combine target-specific words with additional transformations.
- Includes separators, numbers, and special characters for realistic passwords.
2. LyricPass Module:
- Search song lyrics by artist and integrate lines into the wordlist.
- Automatically adds artist names and initialisms for phrases.
3. Customizable Transforms:
- Define character sets and transformation patterns in a configuration file.
- New case transformation mode for extensive variations.
4. Two Interfaces:
- Interactive Mode: Guided input for creating tailored wordlists.
- One-Line Commands: Quick operations for power users.
5. Compatibility:
- Built with Python 3 (Python 2.7 support available in a secondary branch).
- Includes modules like
requests and alive-progress.ใ Installation
ใ# From PyPI:
pip install bopscrk
ใ# From GitHub:
git clone --recurse-submodules https://github.com/r3nt0n/bopscrk
cd bopscrk
pip install -r requirements.txt
ใ Usage Examples
ใ# Interactive Mode:
bopscrk -i
ใ# Non-Interactive Mode:
bopscrk -w "name,birthday,city" --min 6 --max 12 -c -l -o wordlist.txt
ใ# LyricPass Integration:
bopscrk -a "Eminem,Taylor Swift" -c -o lyrics_wordlist.txt
ใ# Full Options:
bopscrk -w "target,custom,info" -a "ArtistName" -c -l -n 3 --min 8 --max 16 -o final_list.txt
ใ Latest Version (2.4.7) Updates:
- Improved speed and performance.
- Advanced case transformations for generating all case variants.
ใ Advanced Features
1. Combine common symbols (
-, _, ., etc.) and numbers for realistic passwords.2. Use leet transformations (e.g.,
a -> @, e -> 3) to mimic user behavior.3. Save and customize configurations using
bopscrk.cfg.For further details, check the repository: [Bopscrk GitHub](https://github.com/r3nt0n/bopscrk).
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - r3nt0n/bopscrk: Generate smart and powerful wordlists
Generate smart and powerful wordlists. Contribute to r3nt0n/bopscrk development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #WhatsApp Beta Gets a New Dialer Feature
https://undercodenews.com/whatsapp-beta-gets-a-new-dialer-feature/
@Undercode_News
https://undercodenews.com/whatsapp-beta-gets-a-new-dialer-feature/
@Undercode_News
UNDERCODE NEWS
WhatsApp Beta Gets a New Dialer Feature - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #ChatGPT Gets Eyes: See What You Talk About with New Video Sharing Feature
https://undercodenews.com/chatgpt-gets-eyes-see-what-you-talk-about-with-new-video-sharing-feature/
@Undercode_News
https://undercodenews.com/chatgpt-gets-eyes-see-what-you-talk-about-with-new-video-sharing-feature/
@Undercode_News
UNDERCODE NEWS
ChatGPT Gets Eyes: See What You Talk About with New Video Sharing Feature - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ The Outer Worlds 2: A New Frontier
https://undercodenews.com/the-outer-worlds-2-a-new-frontier/
@Undercode_News
https://undercodenews.com/the-outer-worlds-2-a-new-frontier/
@Undercode_News
UNDERCODE NEWS
The Outer Worlds 2: A New Frontier - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฎ Xbox Game Pass: A Gamer's Dream
https://undercodenews.com/xbox-game-pass-a-gamers-dream/
@Undercode_News
https://undercodenews.com/xbox-game-pass-a-gamers-dream/
@Undercode_News
UNDERCODE NEWS
Xbox Game Pass: A Gamer's Dream - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Mafia: The Old Country - A Sicilian Odyssey
https://undercodenews.com/mafia-the-old-country-a-sicilian-odyssey/
@Undercode_News
https://undercodenews.com/mafia-the-old-country-a-sicilian-odyssey/
@Undercode_News
UNDERCODE NEWS
Mafia: The Old Country - A Sicilian Odyssey - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ