UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 USB Rubber Ducky Payload

The [USB Rubber Ducky Payload Repository](https://github.com/hak5/usbrubberducky-payloads) by Hak5 provides a collection of ready-to-use payloads for the USB Rubber Ducky—a keystroke injection tool often used for penetration testing and red teaming. These payloads simulate fast and stealthy input for various exploits and tasks.

---

### GitHub Repository:
[Hak5 USB Rubber Ducky Payloads](https://github.com/hak5/usbrubberducky-payloads)

---

### Example Payload Structure:

#### Payload Documentation
All payloads start with comments that describe their purpose, author, target, and configuration.

REM Title: Example Payload
REM Author: Korben Dallas
REM Description: Opens hidden PowerShell
REM Target: Windows 10
REM Props: Hak5, Darren Kitchen
REM Version: 1.0
REM Category: General

---

#### Payload Example: URL Opening Script
This payload opens a URL after a brief delay.

BEGINNING OF PAYLOAD

REM CONFIGURATION
REM REQUIRED - Provide URL
DEFINE #MY_TARGET_URL example.com

REM OPTIONAL - Set boot delay; default is 5 seconds
DEFINE #BOOT_DELAY 5000

DELAY #BOOT_DELAY

STRING start chrome.exe #MY_TARGET_URL
ENTER

---

### Features:
1. Preconfigured Payloads:
- Password exfiltration
- Reverse shells
- Network reconnaissance
- Drive-by downloads

2. Customizable Payloads:
- DEFINE statements for reusable parameters.
- DELAY statements to time operations precisely.

3. Cross-Platform Targeting:
- Payloads can be customized for Windows, macOS, and Linux.

---

### Key Payload Categories:
1. Information Gathering:
- Automated reconnaissance.
- Exporting network details.

2. Exploitation:
- Privilege escalation.
- Exploiting vulnerabilities via automated commands.

3. Post-Exploitation:
- Extracting data or installing backdoors.

4. Social Engineering:
- Simulating user activity or spoofing actions.

---

### Notable Use Case:
#### Hidden PowerShell Script Execution
REM Title: Hidden PowerShell Execution
REM Author: Hak5
REM Description: Launches a hidden PowerShell instance.
REM Target: Windows 10
REM Category: Post-Exploitation

DELAY 5000
STRING powershell -windowstyle hidden
ENTER

---

### Usage:
1. Select a payload from the repository.
2. Edit the payload as per your target's configuration.
3. Load the payload onto the USB Rubber Ducky.
4. Deploy and execute the payload by plugging it into the target system.

This repository is a must-have for penetration testers aiming to automate tasks, test security defenses, or explore advanced attack vectors. Ensure proper authorization when using these tools.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Game changer. Microsoft open-sourced bitnet.cpp, you can now run 100B LLMs locally without a GPU needed.

The framework quantizes LLMs to 1-bit precision and runs inference directly on CPUs, making large language models accessible on standard hardware.

Technical details:
▸ Forked from llama.cpp with optimizations for 1-bit inference
▸ Handles models up to 100B parameters locally
▸ Achieves 6.17x speedup compared to standard inference
▸ Reduces energy consumption by 82.2%
▸ Works on standard CPUs without specialized hardware

Repo: https://lnkd.in/guEhH8ad

Are you an AI developer? Check out https://AlphaSignal.ai to get a daily summary of breakthrough models, repos and papers in AI. Read by 200,000+ devs.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Monitoring: BloodHound is a powerful tool for analyzing and visualizing Active Directory environments. It assists penetration testers and system administrators in identifying weak permissions, potential attack paths, and privilege escalation opportunities within a Windows domain.

---

### GitHub Repository:
[BloodHound GitHub](https://github.com/BloodHoundAD/BloodHound)

---

### Features:
1. Active Directory Enumeration:
- Maps domain trust relationships.
- Identifies paths to high-value targets like Domain Admins.
- Highlights risky ACLs and misconfigurations.

2. Graph Visualization:
- Displays a clear graph of domain objects and their relationships.
- Uses queries to highlight exploitable paths and vulnerabilities.

3. Neo4j Database Integration:
- Stores collected AD data for analysis.
- Allows querying via Cypher language for complex insights.

4. Cross-Platform Support:
- Runs on Windows, macOS, and Linux.

---

### Use Cases:
1. Privilege Escalation:
- Identifies attack paths from low-privileged users to domain administrators.

2. Lateral Movement:
- Maps routes through machines, groups, and users for lateral traversal.

3. Audit & Mitigation:
- Assists administrators in identifying weak spots and tightening security.

---

### How It Works:
1. Data Collection:
Use SharpHound, the data collector, to gather information from the domain.

Example:

   SharpHound.exe -c All

This collects data about users, groups, permissions, trusts, and ACLs.

2. Data Import:
Import the collected JSON files into BloodHound.

3. Querying:
Use predefined or custom Cypher queries to identify attack paths.

Example Query:

   MATCH (n:User {name:"John"})-[r:AdminTo]->(m:Computer) RETURN n,m

This finds all computers where "John" has administrative rights.

---

### Visualization Example:
A graphical representation might show:
- Nodes: Users, groups, computers, and domains.
- Edges: Relationships like group memberships, session hosts, and admin rights.

---

### Installation:
1. Neo4j Database:
- Download and install from [Neo4j](https://neo4j.com/).
- Start the database service.
2. BloodHound:
- Clone the repository or download the release binaries.
- Run the BloodHound GUI.

---

### Additional Tools:
- SharpHound: Data collection tool for Windows environments.
- AzureHound: Gathers data for Azure AD.

This tool is essential for auditing AD security and simulating attacker behavior in penetration testing engagements.