UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 AI-powered ethical hacking :

: Features

- Natural Language Processing : Executes commands based on user input, translating intent into action seamlessly.
- Command Search Engine : Facilitates the search for services, ports, or specific terms, providing curated command suggestions to identify vulnerabilities.

» Supported Ethical Hacking Tools :

1. NMAP : Network discovery and security auditing.
2. OWASP ZAP (Full Scan Only) : Web application security scanner.
3. Crackmapexec : Network information gathering.
4. Nuclei : Template-based fast scanning with zero false positives.

» Compatibility
- Optimized for Linux : Fully functional on Linux platforms.
- Limited/No Support : Functionality on Windows or macOS is not guaranteed.



System Requirements
Non-Docker Installation
- Storage : 50GB
- RAM : 16GB minimum
- GPU : 8GB recommended for optimal performance.

» Dependencies
- Linux (Debian-based) :
- Installations:
    sudo apt -y install exploitdb libreadline-dev wget nmap crackmapexec nuclei

- Git-based exploitdb:
    sudo git clone https://gitlab.com/exploit-database/exploitdb.git /opt/exploitdb
sudo ln -sf /opt/exploitdb/searchsploit /usr/local/bin/searchsploit

»Installation
Docker Installation
1. Pulling the image :
   docker pull berylliumsec/nebula:latest

2. Running without GPU :
   docker run --rm -it berylliumsec/nebula:latest

3. Running with GPU :
   docker run --rm --gpus all -v "$(pwd)":/app/unified_models_no_zap -it berylliumsec/nebula:latest

4. Autonomous mode :
- Default vulnerability scan:
     docker run --rm --gpus all -v "$(pwd)/targets.txt":/app/targets.txt -v "$(pwd)"/unified_models:/app/unified_models -it nebula:latest --autonomous_mode True --targets_list /app/targets.txt

- Custom NMAP vulnerability scan:
     docker run --rm --gpus all -v "$(pwd)/targets.txt":/app/targets.txt -v "$(pwd)"/unified_models:/app/unified_models -it nebula:latest --autonomous_mode True --nmap_vuln_scan_command="nmap -Pn -sV --exclude-ports 21 --script=vulscan/vulscan.nse" --targets_list /app/targets.txt


PIP Installation
1. Install:
   pip install nebula-ai

2. Run:
   nebula

3. For elevated privileges:
   sudo pip install nebula-ai
sudo nebula

» Linux Post-Installation
1. Add the installation path to your .zshrc:
   export PATH="$HOME/.local/bin:$PATH"




Nebula-Watcher (Optional Component)
PIP Installation
pip3 install nebula-watcher


Docker Installation
1. Pull the image:
   docker pull berylliumsec/nebula_watcher:latest

2. Run:
   docker run --network host -v /path/to/nmap_results:/app/results -v /path/to/output:/app/output berylliumsec/nebula_watcher:latest

Customize diagram name:
   docker run --network host -v /path/to/nmap_results:/app/results -v /path/to/output:/app/output berylliumsec/nebula_watcher:latest python3 nebula_watcher.py --diagram_name /app/your_diagram_name


@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 Bitcoin Core Integration and Development:

>> What is Bitcoin Core?
Bitcoin Core is the reference implementation of Bitcoin, connecting to the peer-to-peer Bitcoin network. Its primary functions include:
- Downloading and fully validating blocks and transactions.
- Serving as a wallet.
- Providing an optional graphical user interface (GUI).

Binary versions are available for immediate use at [Bitcoin Core Downloads](https://bitcoincore.org/en/download/).

>> Licensing
Bitcoin Core is licensed under the MIT License, allowing free use and modification. Details can be found in the COPYING file or at the [MIT License site](https://opensource.org/licenses/MIT).

>> Development Process
- Master Branch: Continuously built and tested but may not always be stable.
- Release Branches and Tags: Created regularly to mark stable releases.
- GUI Development: Exclusively managed in the [bitcoin-core/gui repository](https://github.com/bitcoin-core/gui). This repository mirrors the monotree's master branch and does not have release branches or tags.

>># Contribution
Developers can follow the workflow in CONTRIBUTING.md. Additional insights and guidelines are in doc/developer-notes.md.

>> Testing and Quality Assurance
>># Automated Testing:
1. Unit Tests: Recommended for all new code and improvements to existing code. Use ctest to compile and run unit tests.
2. Regression and Integration Tests: Written in Python, executed with:
   build/test/functional/test_runner.py

3. CI Systems: Automatically test pull requests across Windows, Linux, and macOS platforms.

>># Manual Testing:
- Requires a reviewer distinct from the code author, particularly for substantial or high-risk changes.
- Adding a clear test plan in pull request descriptions is encouraged for complex changes.


@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑100% FREE classes for a pathway into cybersecurity and ethical hacking

Foundations:
Help Desk
➡️TCM Security Academy – Practical Help Desk (https://lnkd.in/geDEvt6d)
➡️Professor Messer – 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)

Networking
➡️Professor Messer – N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
➡️Cisco Networking Academy – Packet Tracer (https://lnkd.in/guGibYx6)

Linux
➡️TCM Security Academy – Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
➡️Linux Journey (https://linuxjourney.com/)
➡️OverTheWire – Bandit (https://lnkd.in/gRwPsump)

Programming
➡️TCM Security – Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
➡️FreeCodeCamp (https://lnkd.in/gbaHhV34)
➡️Codecademy (https://lnkd.in/gxAHnTFD)

Security Essentials
➡️Professor Messer – SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)

Hacking Essentials
➡️Ethical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
➡️Ethical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
➡️TryHackMe (https://tryhackme.com/)

Active Directory Hacking
➡️How to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
➡️Hacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)

Web Application Hacking
➡️PortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
➡️Hacker101 (https://www.hacker101.com/)
➡️Bugcrowd University (https://lnkd.in/g_aPUcD8)

Ref: Heath Adams
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
CVE-2024-20356.py
10.5 KB
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Command Injection vulnerability in Cisco's CIMC:

>> Use it for testing purposes only !!!

CVE-2024-20356.py [-h] -t HOST -u USERNAME -p PASSWORD [-a ACTION] [-c CMD] [-v]
options:
-h, --help Show this help message and exit
-t HOST, --host HOST Target hostname or IP address (format 10.0.0.1 or 10.0.0.2:1337)
-u USERNAME, --username USERNAME
Username (default: admin)
-p PASSWORD, --password PASSWORD
Password (default: cisco)
-a ACTION, --action ACTION
Action: test, cmd, shell, dance (default: test)
-c CMD, --cmd CMD OS command to run (Default: NONE)
-v, --verbose Displays more information about cimc


Example commands:

CVE-2024-20356.py --host 192.168.x.x -u admin -p your_password -v

CVE-2024-20356.py --host 192.168.x.x -u admin -p your_password -c 'id'

CVE-2024-20356.py --host 192.168.x.x -u admin -p your_password -a shell


CVE-2024-20356.py --host 192.168.x.x -u admin -p your_password -a dance


@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁