UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.8K links
๐Ÿฆ‘ Undercode World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE


โœจ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐ŸŽ„CyberAdvent Day 21: pyDescribeSDDL - Simplify Windows SDDL Analysis

๐Ÿ” Ever struggled with decoding SDDL strings during audits or pentests? With pyDescribeSDDL, you can transform Security Descriptor Definition Language (SDDL) strings into readable insights effortlessly!

๐Ÿ›  What is pyDescribeSDDL?
pyDescribeSDDL is a Python tool designed to parse and describe the contents of SDDL strings, making it easier to analyze Access Control Entries (ACEs), Access Control Lists (ACLs), and associated SIDs and GUIDs.

๐Ÿ”‘ Key Features
1๏ธโƒฃ Human-readable summaries: Use the --summary option to output clear and concise access information.
2๏ธโƒฃ ACE Parsing: Supports detailed analysis of all major ACE types
3๏ธโƒฃ SID Resolution: Automatically resolve well-known SIDs to their human-readable names.
4๏ธโƒฃ GUID Parsing: Decode well-known GUIDs for easier interpretation.

๐Ÿ“‚ Check out pyDescribeSDDL here: https://github.com/p0dalirius/pyDescribeSDDL

Ref: Rรฉmi Gascou (Podalirius)Rรฉmi Gascou
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Web Vulnerability Resource - XSS

Unferstanding XSS Attack
https://lnkd.in/dg9THu25

XSS Filter Evasion by johnermac
https://lnkd.in/dk_gpSRP

Payloads XSs Evasion by citybasebrooks
https://lnkd.in/d4YQjBxE

XSS Resource by BruteLogic
https://lnkd.in/dcVG-RSX

XSS Challegens
https://lnkd.in/dhcbNe6d
https://lnkd.in/dif8SVjK

How to Find XSS by HackerOne
https://lnkd.in/dvqNm5bT

Learning about Cross Site Scripting (XSS)
https://lnkd.in/dYETX2VV

XSS CheatSheet by Portswigger Labs
https://lnkd.in/dAxxwj4

Hacktivity XSS by HackerOne
https://lnkd.in/dNNM86wx

XSS Explained by NahamSec
https://lnkd.in/dJiTs2td

XSS Stored, Blind, Reflected and DOM by InsiderPhD
https://lnkd.in/d9KzwBfd

Web Hacking Beyond Alert by Wild West
https://lnkd.in/djbgjFS8

XSS Tools
XSSTRIKE https://lnkd.in/dJkuhQ4X
Dalfox https://lnkd.in/dp_UnjGM
XSSMap https://lnkd.in/dgfqdEhj
FinDOM XSS https://lnkd.in/dffQm67D

Ref: Joas A SantosJoas A Santos
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘[๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐€๐‚๐“๐ˆ๐•๐„ ๐ƒ๐ˆ๐‘๐„๐‚๐“๐Ž๐‘๐˜ ๐๐„๐๐“๐„๐’๐“]

Whether you are preparing for a certification or need to sharpen your skills for your pentests.

๐Ÿค“Here is a list of resources ๐Ÿค“:

๐๐ž๐ž๐ ๐ญ๐จ ๐ฉ๐ซ๐š๐œ๐ญ๐ข๐œ๐ž?
๐Ÿ‘‰Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA

๐Ÿ‘‰You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr

๐Ÿ‘‰ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt

๐Ÿ‘‰Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM

๐Ÿ‘‰Julien Provenzano โ˜๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3

๐Ÿ‘‰Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT

Resources Credit : Gabrielle
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
security_SOC_2025.pdf
647.9 KB
๐Ÿฆ‘ SOC Architectures & Frameworks: Key to Cybersecurity! ๐Ÿšจ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโ€™s a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!

Ref: in pdf
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
๐‹๐€๐ 15 ๐๐ซ๐š๐œ๐ญ๐ข๐œ๐š๐ฅ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: ๐ƒ๐ข๐ฌ๐œ๐จ๐ฏ๐ž๐ซ ๐€๐ง๐ญ๐ข-๐ƒ๐ข๐ฌ๐š๐ฌ๐ฌ๐ž๐ฆ๐›๐ฅ๐ฒ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Webshell Testing for Defenders ๐Ÿ’ก

Having automated tools to spin up web servers isnโ€™t just convenientโ€”itโ€™s a game-changer for defenders. Here's why:

๐Ÿ” Detection Opportunities:
Use these servers to validate analytic coverage for:

๐Ÿ—‚ File modifications (webshell uploads)
โš™๏ธ Process executions (commands from shells)
๐ŸŽฏ Suspicious behaviors triggered by shells

๐Ÿ’ป How to Use:

1๏ธโƒฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโƒฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโƒฃObserve logs, alerts, and behaviors to identify gaps in your coverage.

๐Ÿ”ฅ Tools for Testing:

โžก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โžก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder

Ref: Michael H.Michael H.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–