UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Bypass Virustotal detection

>> Narashima is designed to bypass both Microsoft Defender and AMSI, as well as every available AV software in VirusTotal, achieving a 0% detection rate and no high malicious behaviour rate.

This tool provides a reverse shell with unmatched stealth, making it an essential asset for cybersecurity professionals focused on security research, ethical hacking, and penetration testing.

πŸ’‘ Key Highlights:

- Bypass Detection: Successfully bypasses Microsoft Defender, AMSI, and all available AV softwares with 0 detections including Google, SentinelOne, Kaspersky, Sophos.

- Zero Malicious Behavior Rate: Narashima operates without triggering any suspicious alerts.

>> Tested on : Win11 Pro

I’ve spent considerable time studying and implementing this obfuscation methodology and am thrilled with the results. Looking forward to collaborating with the community to enhance its capabilities further!

@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚑️ CharacterAI Gets Safer: New #AI Model for Kids and Parental Controls

https://undercodenews.com/characterai-gets-safer-new-ai-model-for-kids-and-parental-controls/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Cloudflare_WAF_Bypass by xss0r: NEW Meth !!!


>> Payload: <details open ontoggle​=alert('xss0r')>


@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘14 FREE AWS Knowledge Learning Badges! 😱

What better way to strut πŸ•ΊπŸ» your AWS skills than by earning and flaunting πŸ’ƒ these badges?

Here you can dive into what each badge entails, and YES, the training is absolutely FREE on AWS Skill Builder! πŸ†“

πŸ’Ž Dive into Cloud Essentials here:
https://lnkd.in/gzYfiR5W
πŸ’Ž Enhance Architecting skills here:
https://lnkd.in/gxQTERJQ
πŸ’Ž Learn Serverless with this:
https://lnkd.in/g_q_mChp
πŸ’Ž Learn about Kubernetes on AWS:
https://lnkd.in/g9h4gzEe
πŸ’Ž File Storage expertise awaits here:
https://lnkd.in/gadMBhmK
πŸ’Ž Data Protection & Disaster Recovery training:
https://lnkd.in/gX_we9Gv
πŸ’Ž AWS Networking Core:
https://lnkd.in/g3u_JTfK
πŸ’Ž Migration lessons here:
https://lnkd.in/gKaqyA3f
πŸ’Ž AWS Compute Knowledge:
https://lnkd.in/gptkhZjh
πŸ’Ž AWS Data Migration Training:
https://lnkd.in/gBjaht2n
πŸ’Ž Get into Cloud Game Development:
https://lnkd.in/ghz4jyKX
πŸ’Ž AWS Events and Workflows here:
https://lnkd.in/gEi78XcX
πŸ’Ž Dive into Media & Entertainment foundations:
https://lnkd.in/gjHBP_SF
πŸ’Ž Amazon Braket at:
https://lnkd.in/gGKHpQGf

Ref: Greg Powell
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Understanding Cybersecurity Layers: A Comprehensive Overview

Cybersecurity is not just about implementing one solution; it’s about building multiple layers of defense to protect against various threats.

@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘How to Find Email and Phone Number of Any Instagram Account (Ethically) πŸ•΅οΈβ™‚οΈπŸ’»

πŸ”§ Tool Used: Burp Suite

🌟 Disclaimer:

This content is strictly for educational and informational purposes πŸŽ“πŸ“š, aimed at raising awareness about cybersecurity vulnerabilities and ethical hacking practices. 🚨 Unauthorized access to systems is both illegal ❌ and unethical. Always act responsibly and within the bounds of the law. βš–οΈ

πŸ’‘ Learn About:

βœ… Exploring hacking techniques for ethical purposes.
βœ… Identifying vulnerabilities in online platforms.
βœ… Strengthening your knowledge of cyber defense strategies.

πŸ”’ Cybersecurity Tip: Ethical hacking isn't about exploitationβ€”it's about protecting systems and understanding how to safeguard digital spaces. πŸ›‘οΈπŸ’‘

Ref: Vyankatesh Shinde
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘WEB APPLICATION PENTESTING TOOLKIT

Whether you're focusing on APIs, SSL, or directory fuzzing, this toolkit has you covered!

Ref: Rahul Raj V K
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚑️ A New Social Media App Focused on Real-World Connections

https://undercodenews.com/a-new-social-media-app-focused-on-real-world-connections/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘#Tips Palo Alto Firewall: Packet Flow Sequence:

In the Firewall understanding the Packet Flow Sequence is essential for troubleshooting traffic issues!

πŸ”΄ Inside to Outside Traffic πŸ”΄

πŸ”΄ First: Security Policy – Checks if traffic is allowed.
πŸ”΄ Second: NAT Policy – Translates source IP if matched.
πŸ”΄ Third: Routing Table – Determines the next-hop to the destination.

πŸ”΅ Outside to Inside Traffic

πŸ”΅ First: NAT Policy – Translates destination IP to internal IP.
πŸ”΅ Second: Security Policy – Validates access to the internal resource.
πŸ”΅ Third: Routing Table – Finds the path to the internal destination.

πŸ’‘ Pro Tip: Mastering this sequence is a game-changer for resolving connectivity and NAT issues quickly! πŸš€

Ref: Dahri A.
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁