UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Security collection for pro:

βœ…Worm Infection: https://lnkd.in/ez-kq98Y
βœ…Social Engineering: https://lnkd.in/e_FJbxDP
βœ…Information Leakage: https://lnkd.in/eeN8KX8g
βœ…Insider Abuse: https://lnkd.in/ep4p_THk
βœ…Customer Phishing: https://lnkd.in/ekTfY7vz
βœ…Scam: https://lnkd.in/eUHwG3fF
βœ…Trademark infringement: https://lnkd.in/e3P3xfeb
βœ…Phishing: https://lnkd.in/eYTi3RQ8
βœ…Ransomware: https://lnkd.in/eRkctdQn
βœ…Large_scale_compromise: https://lnkd.in/eYFF43b4
βœ…3rd-party_compromise: https://lnkd.in/e8SAu5MT
βœ…Windows Intrusion: https://lnkd.in/eXCpcx9V
βœ…Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
βœ…DDOS: https://lnkd.in/eQ7zZzVt
βœ…MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
βœ…Website-Defacement: https://lnkd.in/eraNiHcH
βœ…WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
βœ…Blackmail: https://lnkd.in/eW3zGcPs
βœ…SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9

Ref: Mohamad Hamadi
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (UNDERCODER)
We had a hardware issue recently, and it's fixed. πŸ™‚β€β†”οΈ
Forwarded from UNDERCODE TESTING
Media is too big
VIEW IN TELEGRAM
πŸ¦‘Takeover poc Video dem:

Password Reset Link not expiring after changing the email Leads To Account Takeover poc 🚨

πŸ“ Description:
In this video, I’ll demonstrate a critical vulnerability where a password reset link remains active even after changing the registered email, leading to a potential account takeover exploit. This live PoC showcases the risk and offers insights into preventing such flaws.
Forwarded from UNDERCODE TESTING
πŸ¦‘Top Free Java Projects:

1. Airline Reservation System:
- https://lnkd.in/dRFK2vPh

2. Data Visualization Software:
- https://lnkd.in/dVWVU8xn

3. Electricity Billing System:
- https://lnkd.in/dekycNXQ

4. E-Healthcare Management System:
- https://lnkd.in/dEkE2raN

5. Email Client Software:
- https://lnkd.in/d_qz7U9E

6. Library Management System:
- https://lnkd.in/dY7bDjFn

7. Network Packet Sniffer:
- https://lnkd.in/dXPtyzz4

8. Online Bank Management System:
- https://lnkd.in/d4Qzy8fN

9. Online Medical Management System:
- https://lnkd.in/dHciHGGz

10. Online Quiz Management System:
- https://lnkd.in/djKs3DJq

11. Online Survey System:
- https://lnkd.in/dw9Cmhix

12. RSS Feed Reader:
- https://lnkd.in/dupDQPnG

13. Smart City Project:
- https://lnkd.in/d3YT36aJ

14. Stock Management System:
- https://lnkd.in/dTb3hikj

15. Supply Chain Management System:
- https://lnkd.in/dAzJthMQ

16. Virtual Private Network:
- https://lnkd.in/dyEcgrFC

Ref: Rajat Gajbhiye
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
1733811306699.pdf
23.6 MB
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘How Was the TOR Attacker Caught? πŸ•΅οΈβ™‚οΈ

🌐 The Dark Web often seems like an untraceable haven for anonymity. But even in the world of TOR (The Onion Router), attackers can be caught! Here’s how:

1️⃣ Human Error: Attackers often make small mistakes, like logging in from a non-TOR connection or revealing identifying details in their communications. Even a single misstep can be critical.

2️⃣ Traffic Analysis: TOR masks your identity by routing traffic through multiple nodes. However, law enforcement can use advanced traffic correlation techniques to identify entry and exit points, especially when they control some TOR nodes.

3️⃣ Compromised Nodes: Investigators may run malicious TOR nodes to intercept traffic. They analyze the data flowing through them, narrowing down potential suspects.

4️⃣ Exploits: Vulnerabilities in TOR or the user’s device/browser can be exploited to reveal real IP addresses. For example, Operation Onymous used malware to expose hidden server locations.

5️⃣ Metadata Tracking: Even encrypted communications leave traces. Authorities piece together patterns, times, and behaviors to zero in on suspects.

πŸ’‘ Key Takeaway: No system is 100% secure. Cybercriminals often underestimate the combination of technical expertise and human ingenuity behind modern investigations.

Ref: Mahesh Girhe
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘Xss
#tips
1. Get endpoints from wayback.
2. And then knoxnl -i endpoints.txt -afb -sb 1