UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
30 Best Courses For Network Engineer on Youtube:
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U

2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj

3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN

4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA

5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2

6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u

7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae

8. Small Companies Network
https://lnkd.in/d9ffBAKM

9. Switching Technology
https://lnkd.in/dPUCnr86

10. Real Devices Configuration
https://lnkd.in/dMj-HkCA

11. Live Training
https://lnkd.in/dZeX7UdX

12. EIGRP
https://lnkd.in/dMVp98a4

13. Wireless
https://lnkd.in/djjQZPJA

14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE

15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V

16. Important Networking Topics
https://lnkd.in/dTsd-h_k

17. OSPF
https://lnkd.in/dUYZME73

18. CCNA 200-301
https://lnkd.in/d8WtGDk6

19. VPN
https://lnkd.in/d7shGyZ6

20. STP
https://lnkd.in/dfVQqetM

21. Basic Configurations
https://lnkd.in/dSybFbZr

22. BGP
https://lnkd.in/dRNCvUgn

23. MPLS
https://lnkd.in/d7ekXYm8

24. IPv6
https://lnkd.in/dGNKcyKT

25. VRF
https://lnkd.in/dxSXx2sK

26. PBR
https://lnkd.in/du4k2BUX

27. EtherChannel
https://lnkd.in/dhxYtpwY

28. FHRP Full Course
https://lnkd.in/d3rzcCfc

29. Subnetting QnA
https://lnkd.in/dZyJjkc5

30. Packet Flow
https://lnkd.in/ddtQ2YJz
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
π“πŽπ 𝟐𝟎 π•πˆπ‘π“π”π€π‹ πŒπ€π‚π‡πˆππ„π’ π…πŽπ‘ π‚π˜ππ„π‘π’π„π‚π”π‘πˆπ“π˜ ππ‘πŽπ…π„π’π’πˆπŽππ€π‹π’

ℹ️ Here’s a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:

πŸ’Ώ Predator-OS (Pentesting):
https://predator-os.ir/

πŸ’Ώ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK

πŸ’Ώ BackBox (Pentesting):
https://www.backbox.org/

πŸ’Ώ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97

πŸ’Ώ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/

πŸ’Ώ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B

πŸ’Ώ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f

πŸ’Ώ Tails (Privacy and Anonymity):
https://tails.net/

πŸ’Ώ Qubes OS (Hypervisor):
https://www.qubes-os.org/

πŸ’Ώ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x

πŸ’Ώ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB

πŸ’Ώ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP

πŸ’Ώ CSI Linux (Digital Forensics):
https://csilinux.com/

πŸ’Ώ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs

πŸ’Ώ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3

πŸ’Ώ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz

πŸ’Ώ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/

πŸ’Ώ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG

πŸ’Ώ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
Forwarded from UNDERCODE TESTING
Complete Chart of Neural Networks
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Cloudflare Bypass:

CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs

CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.

---

Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).

---

Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.

---

Installation:

#### Prerequisites:
1. PHP and php-curl must be installed.
Install on Ubuntu:

   sudo apt install php php-curl

#### Clone the Repository:
git clone https://github.com/zidansec/CloudPeler.git
cd CloudPeler

#### Run the Script:
To reveal the real IP behind a domain:
php crimeflare.php example.com

#### Easy Installation:
For quick execution from anywhere on Linux:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare

Now you can run CrimeFlare with:
crimeflare example.com

---

### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)

---

### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.

---

### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)

---

### Quick Commands:
- Clone repository:

  git clone https://github.com/zidansec/CloudPeler.git

- Execute the script:

  php crimeflare.php example.com

- Install for system-wide access:

  sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare

- Run directly:

  crimeflare example.com

---

### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Largest and most advanced AI models available on Hugging Face in 2024:

1. DeepSeek LLM 67B Base
- Parameters: 67 billion
- Highlights: Exceptional at reasoning, coding, and mathematics, surpassing GPT-3.5 and Llama2-70B.
- Official URL: [DeepSeek LLM 67B Base on Hugging Face](https://huggingface.co/models).

2. Yi-34B-Llama
- Parameters: 34 billion
- Highlights: Multi-modal processing for text, code, and images, with zero-shot learning capabilities.
- Official URL: [Yi-34B-Llama on Hugging Face](https://huggingface.co/models).

3. Qwen/Qwen2.5-72B-Instruct
- Parameters: 72 billion
- Highlights: Advanced role-playing, long text generation, and structured data understanding.
- Official URL: [Qwen2.5-72B-Instruct](https://huggingface.co/Qwen/Qwen2.5-72B-Instruct).

4. Llama 3.3-70B-Instruct
- Parameters: 70 billion
- Highlights: Ideal for daily use with highly capable instruction-following capabilities.
- Official URL: [Llama 3.3-70B-Instruct](https://huggingface.co/meta-llama/Llama-3.3-70B-Instruct).

5. Nyxene-v2-11B
- Parameters: 11 billion
- Highlights: Efficient processing and high fluency in text generation and question answering.
- Official URL: [Nyxene-v2-11B](https://huggingface.co/models).

For a comprehensive list of models and their detailed capabilities, visit [Hugging Face's model hub](https://huggingface.co/models).