Forwarded from UNDERCODE TESTING
π¦Cheat Sheets for AI, Neural Networks, Machine Learning, Deep Learning & Big Data
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Phishing Campaign Targets "Convert Word to PDF" Websites
https://undercodenews.com/phishing-campaign-targets-convert-word-to-pdf-websites/
@Undercode_News
https://undercodenews.com/phishing-campaign-targets-convert-word-to-pdf-websites/
@Undercode_News
UNDERCODE NEWS
Phishing Campaign Targets "Convert Word to PDF" Websites - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π§ Sarcoma #Ransomware Group Targets Gulf Petrochemical Services & Trading
https://undercodenews.com/sarcoma-ransomware-group-targets-gulf-petrochemical-services-amp-trading/
@Undercode_News
https://undercodenews.com/sarcoma-ransomware-group-targets-gulf-petrochemical-services-amp-trading/
@Undercode_News
Forwarded from UNDERCODE TESTING
π¦AI security related frameworks, attacks, tools and papers:
https://github.com/ottosulin/awesome-ai-security
https://github.com/ottosulin/awesome-ai-security
GitHub
GitHub - ottosulin/awesome-ai-security: A collection of awesome resources related AI security
A collection of awesome resources related AI security - ottosulin/awesome-ai-security
Forwarded from Exploiting Crew (Pr1vAt3)
30 Best Courses For Network Engineer on Youtube:
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U
2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj
3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN
4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA
5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2
6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u
7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae
8. Small Companies Network
https://lnkd.in/d9ffBAKM
9. Switching Technology
https://lnkd.in/dPUCnr86
10. Real Devices Configuration
https://lnkd.in/dMj-HkCA
11. Live Training
https://lnkd.in/dZeX7UdX
12. EIGRP
https://lnkd.in/dMVp98a4
13. Wireless
https://lnkd.in/djjQZPJA
14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE
15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V
16. Important Networking Topics
https://lnkd.in/dTsd-h_k
17. OSPF
https://lnkd.in/dUYZME73
18. CCNA 200-301
https://lnkd.in/d8WtGDk6
19. VPN
https://lnkd.in/d7shGyZ6
20. STP
https://lnkd.in/dfVQqetM
21. Basic Configurations
https://lnkd.in/dSybFbZr
22. BGP
https://lnkd.in/dRNCvUgn
23. MPLS
https://lnkd.in/d7ekXYm8
24. IPv6
https://lnkd.in/dGNKcyKT
25. VRF
https://lnkd.in/dxSXx2sK
26. PBR
https://lnkd.in/du4k2BUX
27. EtherChannel
https://lnkd.in/dhxYtpwY
28. FHRP Full Course
https://lnkd.in/d3rzcCfc
29. Subnetting QnA
https://lnkd.in/dZyJjkc5
30. Packet Flow
https://lnkd.in/ddtQ2YJz
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U
2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj
3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN
4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA
5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2
6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u
7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae
8. Small Companies Network
https://lnkd.in/d9ffBAKM
9. Switching Technology
https://lnkd.in/dPUCnr86
10. Real Devices Configuration
https://lnkd.in/dMj-HkCA
11. Live Training
https://lnkd.in/dZeX7UdX
12. EIGRP
https://lnkd.in/dMVp98a4
13. Wireless
https://lnkd.in/djjQZPJA
14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE
15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V
16. Important Networking Topics
https://lnkd.in/dTsd-h_k
17. OSPF
https://lnkd.in/dUYZME73
18. CCNA 200-301
https://lnkd.in/d8WtGDk6
19. VPN
https://lnkd.in/d7shGyZ6
20. STP
https://lnkd.in/dfVQqetM
21. Basic Configurations
https://lnkd.in/dSybFbZr
22. BGP
https://lnkd.in/dRNCvUgn
23. MPLS
https://lnkd.in/d7ekXYm8
24. IPv6
https://lnkd.in/dGNKcyKT
25. VRF
https://lnkd.in/dxSXx2sK
26. PBR
https://lnkd.in/du4k2BUX
27. EtherChannel
https://lnkd.in/dhxYtpwY
28. FHRP Full Course
https://lnkd.in/d3rzcCfc
29. Subnetting QnA
https://lnkd.in/dZyJjkc5
30. Packet Flow
https://lnkd.in/ddtQ2YJz
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Urgent Patch Needed: Palo Alto Networks PAN-#OS Vulnerability (#CVE-2024-9474) Grants Root Access
https://undercodenews.com/urgent-patch-needed-palo-alto-networks-pan-os-vulnerability-cve-2024-9474-grants-root-access/
@Undercode_News
https://undercodenews.com/urgent-patch-needed-palo-alto-networks-pan-os-vulnerability-cve-2024-9474-grants-root-access/
@Undercode_News
UNDERCODE NEWS
Urgent Patch Needed: Palo Alto Networks PAN-OS Vulnerability (CVE-2024-9474) Grants Root Access - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ #GitHub's Latest Updates: A Closer Look
https://undercodenews.com/githubs-latest-updates-a-closer-look/
@Undercode_News
https://undercodenews.com/githubs-latest-updates-a-closer-look/
@Undercode_News
UNDERCODE NEWS
GitHub's Latest Updates: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Improved Merge Experience on #GitHub Pull Requests
https://undercodenews.com/improved-merge-experience-on-github-pull-requests/
@Undercode_News
https://undercodenews.com/improved-merge-experience-on-github-pull-requests/
@Undercode_News
UNDERCODE NEWS
Improved Merge Experience on GitHub Pull Requests - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Enhanced Code Scanning Audit Logs: A Deeper Dive
https://undercodenews.com/enhanced-code-scanning-audit-logs-a-deeper-dive/
@Undercode_News
https://undercodenews.com/enhanced-code-scanning-audit-logs-a-deeper-dive/
@Undercode_News
UNDERCODE NEWS
Enhanced Code Scanning Audit Logs: A Deeper Dive - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Critical RCE Vulnerability Found in CyberPanel: #Update Now!
https://undercodenews.com/critical-rce-vulnerability-found-in-cyberpanel-update-now/
@Undercode_News
https://undercodenews.com/critical-rce-vulnerability-found-in-cyberpanel-update-now/
@Undercode_News
UNDERCODE NEWS
Critical RCE Vulnerability Found in CyberPanel: Update Now! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Informative Critical Vulnerability in Metabase: Potential for Remote Code Execution
https://undercodenews.com/informative-critical-vulnerability-in-metabase-potential-for-remote-code-execution/
@Undercode_News
https://undercodenews.com/informative-critical-vulnerability-in-metabase-potential-for-remote-code-execution/
@Undercode_News
UNDERCODE NEWS
Informative Critical Vulnerability in Metabase: Potential for Remote Code Execution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π₯οΈ Vulnerable Zyxel Devices Exposed to Remote Code Execution
https://undercodenews.com/vulnerable-zyxel-devices-exposed-to-remote-code-execution/
@Undercode_News
https://undercodenews.com/vulnerable-zyxel-devices-exposed-to-remote-code-execution/
@Undercode_News
UNDERCODE NEWS
Vulnerable Zyxel Devices Exposed to Remote Code Execution - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ Urgent #Update: Proself #Software Vulnerable to XXE Attacks - Take Action Now!
https://undercodenews.com/urgent-update-proself-software-vulnerable-to-xxe-attacks-take-action-now/
@Undercode_News
https://undercodenews.com/urgent-update-proself-software-vulnerable-to-xxe-attacks-take-action-now/
@Undercode_News
UNDERCODE NEWS
Urgent Update: Proself Software Vulnerable to XXE Attacks - Take Action Now! - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Improved A Critical Vulnerability in #Apple Products
https://undercodenews.com/improved-a-critical-vulnerability-in-apple-products/
@Undercode_News
https://undercodenews.com/improved-a-critical-vulnerability-in-apple-products/
@Undercode_News
UNDERCODE NEWS
Improved A Critical Vulnerability in Apple Products - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ vCenter Server Privilege Escalation Vulnerability (#CVE-2023-20867)
https://undercodenews.com/vcenter-server-privilege-escalation-vulnerability-cve-2023-20867/
@Undercode_News
https://undercodenews.com/vcenter-server-privilege-escalation-vulnerability-cve-2023-20867/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π¨ Warning: Patch Your #Cisco ASA Now - Decade-Old WebVPN Flaw Actively Exploited
https://undercodenews.com/warning-patch-your-cisco-asa-now-decade-old-webvpn-flaw-actively-exploited/
@Undercode_News
https://undercodenews.com/warning-patch-your-cisco-asa-now-decade-old-webvpn-flaw-actively-exploited/
@Undercode_News
UNDERCODE NEWS
Warning: Patch Your Cisco ASA Now - Decade-Old WebVPN Flaw Actively Exploited - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
πππ ππ πππππππ ππππππππ π
ππ πππππππππππππ ππππ
πππππππππ
βΉοΈ Hereβs a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:
πΏ Predator-OS (Pentesting):
https://predator-os.ir/
πΏ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK
πΏ BackBox (Pentesting):
https://www.backbox.org/
πΏ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97
πΏ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/
πΏ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B
πΏ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f
πΏ Tails (Privacy and Anonymity):
https://tails.net/
πΏ Qubes OS (Hypervisor):
https://www.qubes-os.org/
πΏ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x
πΏ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB
πΏ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP
πΏ CSI Linux (Digital Forensics):
https://csilinux.com/
πΏ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs
πΏ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3
πΏ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz
πΏ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/
πΏ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG
πΏ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
βΉοΈ Hereβs a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:
πΏ Predator-OS (Pentesting):
https://predator-os.ir/
πΏ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK
πΏ BackBox (Pentesting):
https://www.backbox.org/
πΏ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97
πΏ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/
πΏ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B
πΏ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f
πΏ Tails (Privacy and Anonymity):
https://tails.net/
πΏ Qubes OS (Hypervisor):
https://www.qubes-os.org/
πΏ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x
πΏ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB
πΏ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP
πΏ CSI Linux (Digital Forensics):
https://csilinux.com/
πΏ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs
πΏ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3
πΏ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz
πΏ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/
πΏ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG
πΏ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
Penetration testing and Ethical hacking
mainpage
What is Predator-OS   v3.5 01-01-2025 Polymorphic Security Platform Predator-OS is an advanced Linux distribution developed in 2021 by Hossein Seilani, the creator of other well-known [β¦]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π‘οΈ #Ransomware Targets National Center for Financial Education: A Wake-Up Call for Cybersecurity Preparedness
https://undercodenews.com/ransomware-targets-national-center-for-financial-education-a-wake-up-call-for-cybersecurity-preparedness/
@Undercode_News
https://undercodenews.com/ransomware-targets-national-center-for-financial-education-a-wake-up-call-for-cybersecurity-preparedness/
@Undercode_News
UNDERCODE NEWS
Ransomware Targets National Center for Financial Education: A Wake-Up Call for Cybersecurity Preparedness - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Cloudflare Bypass:
CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs
CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.
---
Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).
---
Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.
---
Installation:
#### Prerequisites:
1. PHP and
Install on Ubuntu:
#### Clone the Repository:
#### Run the Script:
To reveal the real IP behind a domain:
#### Easy Installation:
For quick execution from anywhere on Linux:
Now you can run CrimeFlare with:
---
### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)
---
### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.
---
### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)
---
### Quick Commands:
- Clone repository:
- Execute the script:
- Install for system-wide access:
- Run directly:
---
### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs
CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.
---
Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).
---
Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.
---
Installation:
#### Prerequisites:
1. PHP and
php-curl must be installed. Install on Ubuntu:
sudo apt install php php-curl
#### Clone the Repository:
git clone https://github.com/zidansec/CloudPeler.git
cd CloudPeler
#### Run the Script:
To reveal the real IP behind a domain:
php crimeflare.php example.com
#### Easy Installation:
For quick execution from anywhere on Linux:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare
Now you can run CrimeFlare with:
crimeflare example.com
---
### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)
---
### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.
---
### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)
---
### Quick Commands:
- Clone repository:
git clone https://github.com/zidansec/CloudPeler.git
- Execute the script:
php crimeflare.php example.com
- Install for system-wide access:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare
- Run directly:
crimeflare example.com
---
### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
GitHub
GitHub - zidansec/CloudPeler: CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool youβ¦
CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting infor...