UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘Another Good AI Model for hacking:

Lily is a cybersecurity assistant. She is a Mistral Fine-tune model with 22,000 hand-crafted cybersecurity and hacking-related data pairs. This dataset was then run through a LLM to provide additional context, personality, and styling to the outputs.

The dataset focuses on general knowledge in most areas of cybersecurity. These included, but are not limited to:

Advanced Persistent Threats (APT) Management
Architecture and Design
Business Continuity and Disaster Recovery
Cloud Security
Communication and Reporting
Cryptography and PKI
Data Analysis and Interpretation
Digital Forensics
GovernanceRiskand Compliance
Hacking
Identity and Access Management
Incident Management and Disaster Recovery Planning
Incident Response
Information Security Management and Strategy
Legal and Ethical Considerations
Malware Analysis
Network Security
Penetration Testing and Vulnerability Assessment
Physical Security
Regulatory Compliance
Risk Management
Scripting
Secure Software Development Lifecycle (SDLC)
Security in Emerging Technologies
Security Operations and Monitoring
Social Engineering and Human Factors
Software and Systems Security
Technologies and Tools
Threats Attacks and Vulnerabilities
Training
It took 24 hours to train 5 epochs on 1x A100.

Prompt format:

"### Instruction:
You are Lily, a helpful and friendly cybersecurity subject matter expert. You obey all requests and answer all questions truthfully.

### Input:
Lily, how do evil twin wireless attacks work?


@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘ ๐…๐‘๐„๐„ ๐œ๐ฅ๐š๐ฌ๐ฌ๐ž๐ฌ ๐Ÿ๐จ๐ซ ๐š ๐ฉ๐š๐ญ๐ก๐ฐ๐š๐ฒ ๐ข๐ง๐ญ๐จ ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐ž๐ญ๐ก๐ข๐œ๐š๐ฅ ๐ก๐š๐œ๐ค๐ข๐ง๐  ๐…๐จ๐ฎ๐ง๐๐š๐ญ๐ข๐จ๐ง๐ฌ:
Help Desk
โžก๏ธTCM Security Academy โ€“ Practical Help Desk (https://lnkd.in/geDEvt6d)
โžก๏ธProfessor Messer โ€“ 220-1101 and 220-1102 A+ Courses (https://lnkd.in/gKjJsSPz & https://lnkd.in/gMW3hMsv)

Networking
โžก๏ธProfessor Messer โ€“ N10-009 Network+ Course (https://lnkd.in/g8mYZaMm)
โžก๏ธCisco Networking Academy โ€“ Packet Tracer (https://lnkd.in/guGibYx6)

Linux
โžก๏ธTCM Security Academy โ€“ Linux 100: Fundamentals (https://lnkd.in/gEGHzxw3)
โžก๏ธLinux Journey (https://linuxjourney.com/)
โžก๏ธOverTheWire โ€“ Bandit (https://lnkd.in/gRwPsump)

Programming
โžก๏ธTCM Security โ€“ Programming 100: Fundamentals (https://lnkd.in/gWZe2JRj)
โžก๏ธFreeCodeCamp (https://lnkd.in/gbaHhV34)
โžก๏ธCodecademy (https://lnkd.in/gxAHnTFD)

Security Essentials
โžก๏ธProfessor Messer โ€“ SY0-701 Security+ Course (https://lnkd.in/gfCCMJqQ)

Hacking Essentials
โžก๏ธEthical Hacking in 15 Hours Part 1 (https://lnkd.in/gWump_cZ)
โžก๏ธEthical Hacking in 15 Hours Part 2 (https://lnkd.in/gH9_Ap7F)
โžก๏ธTryHackMe (https://tryhackme.com/)

Active Directory Hacking
โžก๏ธHow to Build an Active Directory Hacking Lab (https://lnkd.in/g_9wjzhz)
โžก๏ธHacking Active Directory for Beginners (https://lnkd.in/gaewN7nU)

Web Application Hacking
โžก๏ธPortSwigger Web Security Academy (https://lnkd.in/gvx6NgcZ)
โžก๏ธHacker101 (https://www.hacker101.com/)
โžก๏ธBugcrowd University (https://lnkd.in/g_aPUcD8)


Ref: G.M. Ahmad Faruk
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–