UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐œ๐š๐ซ๐ž๐ž๐ซ๐ฌ ๐๐š๐ญ๐ก.

1) Security certification roadmap https://lnkd.in/ghvqfZ3z & https://lnkd.in/eFU8WC29

2) Domains of cyber security https://lnkd.in/eXsfxkTs

3) Cyber career map https://lnkd.in/evTUCgas

4) Cyber career map https://dsci.in

Suggestion on how to use these: ask yourself
๐Ÿ‘‰ What domain of security interests you (offensive? Policy? Defence?),
๐Ÿ‘‰ What job you want (pentester? CISO?),
๐Ÿ‘‰ What certifications you might need (OSCP? CEH?)
๐Ÿ‘‰ What level they are at, build up a plan of how to get there?
Thank you Katie Paxton-Fear for nice sharing.

Ref: G M Faruk Ahmed, CISSP, CISA

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODER
๐Ÿฆ‘DeepfakeOSโ„ข, the first-of-its-kind Linux-based toolkit designed exclusively for ethical deepfake penetration testing and advancing cognitive security.

DeepfakeOSโ„ข is a cutting-edge Linux operating system preloaded with open-source tools for ethically creating synthetic media, including video, audio, and text. As synthetic media becomes more advanced, so do the threats it poses. DeepfakeOSโ„ข empowers security professionals and researchers to understand, test, and defend against these emerging threats by providing a comprehensive, preloaded toolkit for ethical purposes.


https://deepfakedashboard.com/deepfakeos

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘New evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions arenโ€™t armed with any file recovery techniques and would fail to detect this attack vector.

>> Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header.

>> Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

Ref: Chadi S.

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–