UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Game changer. Microsoft open-sourced bitnet.cpp, you can now run 100B LLMs locally without a GPU needed.

The framework quantizes LLMs to 1-bit precision and runs inference directly on CPUs, making large language models accessible on standard hardware.

Technical details:
▸ Forked from llama.cpp with optimizations for 1-bit inference
▸ Handles models up to 100B parameters locally
▸ Achieves 6.17x speedup compared to standard inference
▸ Reduces energy consumption by 82.2%
▸ Works on standard CPUs without specialized hardware

Repo: https://lnkd.in/guEhH8ad

Are you an AI developer? Check out https://AlphaSignal.ai to get a daily summary of breakthrough models, repos and papers in AI. Read by 200,000+ devs.
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Monitoring: BloodHound is a powerful tool for analyzing and visualizing Active Directory environments. It assists penetration testers and system administrators in identifying weak permissions, potential attack paths, and privilege escalation opportunities within a Windows domain.

---

### GitHub Repository:
[BloodHound GitHub](https://github.com/BloodHoundAD/BloodHound)

---

### Features:
1. Active Directory Enumeration:
- Maps domain trust relationships.
- Identifies paths to high-value targets like Domain Admins.
- Highlights risky ACLs and misconfigurations.

2. Graph Visualization:
- Displays a clear graph of domain objects and their relationships.
- Uses queries to highlight exploitable paths and vulnerabilities.

3. Neo4j Database Integration:
- Stores collected AD data for analysis.
- Allows querying via Cypher language for complex insights.

4. Cross-Platform Support:
- Runs on Windows, macOS, and Linux.

---

### Use Cases:
1. Privilege Escalation:
- Identifies attack paths from low-privileged users to domain administrators.

2. Lateral Movement:
- Maps routes through machines, groups, and users for lateral traversal.

3. Audit & Mitigation:
- Assists administrators in identifying weak spots and tightening security.

---

### How It Works:
1. Data Collection:
Use SharpHound, the data collector, to gather information from the domain.

Example:

   SharpHound.exe -c All

This collects data about users, groups, permissions, trusts, and ACLs.

2. Data Import:
Import the collected JSON files into BloodHound.

3. Querying:
Use predefined or custom Cypher queries to identify attack paths.

Example Query:

   MATCH (n:User {name:"John"})-[r:AdminTo]->(m:Computer) RETURN n,m

This finds all computers where "John" has administrative rights.

---

### Visualization Example:
A graphical representation might show:
- Nodes: Users, groups, computers, and domains.
- Edges: Relationships like group memberships, session hosts, and admin rights.

---

### Installation:
1. Neo4j Database:
- Download and install from [Neo4j](https://neo4j.com/).
- Start the database service.
2. BloodHound:
- Clone the repository or download the release binaries.
- Run the BloodHound GUI.

---

### Additional Tools:
- SharpHound: Data collection tool for Windows environments.
- AzureHound: Gathers data for Azure AD.

This tool is essential for auditing AD security and simulating attacker behavior in penetration testing engagements.