UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
7️⃣Start Install The Atomics Simulation Tool

IEX (IWR ‘https://raw.githubusercontent.com/redcanaryco/invoke-atomicredteam/master/install-atomicredteam.ps1' -UseBasicParsing); Install-AtomicRedTeam -getAtomics -Force
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
9️⃣Check Detail Technique

From a given technique number, you can check the detail with the command below. You can customize “T1003” with another code.

Invoke-AtomicTest T1003 -ShowDetailsBrief


ShowDetailsBrief

🔟 View All Simulation Test

Invoke-AtomicTest All -ShowDetailsBrief


ShowDetailsBrief

1️⃣1️⃣ Check Pre-Requisites

Invoke-AtomicTest T1485 -TestNumbers 1 -CheckPrereqs

> Get Pre-Requisites

Invoke-AtomicTest T1485 -TestNumbers 1 -GetPrereqs

1️⃣2️⃣ Execute The simulation

Invoke-AtomicTest T1027 -TestNumbers 7
Forwarded from Exploiting Crew (Pr1vAt3)
9️⃣Check Detail Technique

From a given technique number, you can check the detail with the command below. You can customize “T1003” with another code.

Invoke-AtomicTest T1003 -ShowDetailsBrief


ShowDetailsBrief

🔟 View All Simulation Test

Invoke-AtomicTest All -ShowDetailsBrief


ShowDetailsBrief

1️⃣1️⃣ Check Pre-Requisites

Invoke-AtomicTest T1485 -TestNumbers 1 -CheckPrereqs

> Get Pre-Requisites

Invoke-AtomicTest T1485 -TestNumbers 1 -GetPrereqs

1️⃣2️⃣ Execute The simulation

Invoke-AtomicTest T1027 -TestNumbers 7

Ref: Medium
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Testing_ATM_Cracking_Security.pdf
2.5 MB
Forwarded from UNDERCODE TESTING
🦑Bug bounty tips

Xss 💰 Methodology 💯

1- Pick a target

2- Do Full depth Subdomain enumeration using Subfinder( along API'S ) and use webcopilot or SubDomz and various subdomains finder tools in one liner and also ones perform subdomain bruteforicng and save it in a file.!!

3- subfinder -d example.com -all >> subs.txt

4- cat subs.txt | httpx -o alive-subs.txt



hashtag#Method-1 ( Using Dalfox )

1- katana -u alive-subs.txt -o endpoints-1.txt

2- waybackurls http://example.com | grep = | tee endpoints-2.txt

3- ./gau example.com >> endpoints-3.txt

4- paramspider -d example.com

5 - cat alive-subs.txt | hakrawler | tee -a endpoints-5.txt

6- cat endpoints.txt | uro | tee -a endpoints-uro.txt ( Combine all URLS )

7- cat endpoints-uro.txt | Gxss | dalfox pipe --multicast --skip-mining-all (Accurate also ) ( Here Gxss helps us when payload is injected is reflecting back ?? and I used skip mining because already we got urls nah ! if want remove it )

[ OR ]
8- dalfox url http://example.com --custom-payload payloads.txt ( Simple Scan )

Method-2 ( Using XSS_vibes )
1- katana -u alive-subs.txt -o endpoints-1.txt

2- waybackurls http://example.com | grep = | tee endpoints-2.txt

3- ./gau example.com >> endpoints-3.txt

4- paramspider -d example.com

5 - cat alive-subs.txt | hakrawler | tee -a endpoints-5.txt

6- cat endpoints.txt | uro | tee -a endpoints-uro.txt

7- cat endpoints-uro.txt | ./gf xss | sed 's/=.*/=/' -o output.txt

8- python3 main.py -f input.txt -o <output>

Note :- if u can use Alternative of xss automation Tool For better Result U can Use
Xssorv2 Ibrahim Husić Tool it's effective and 100 Acuracy 💯

Ref: Linkedin_stuffs
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁