UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘WEB APPLICATION PENTESTING TOOLKIT

Whether you're focusing on APIs, SSL, or directory fuzzing, this toolkit has you covered!

Ref: Rahul Raj V K
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โšก๏ธ A New Social Media App Focused on Real-World Connections

https://undercodenews.com/a-new-social-media-app-focused-on-real-world-connections/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘#Tips Palo Alto Firewall: Packet Flow Sequence:

In the Firewall understanding the Packet Flow Sequence is essential for troubleshooting traffic issues!

๐Ÿ”ด Inside to Outside Traffic ๐Ÿ”ด

๐Ÿ”ด First: Security Policy โ€“ Checks if traffic is allowed.
๐Ÿ”ด Second: NAT Policy โ€“ Translates source IP if matched.
๐Ÿ”ด Third: Routing Table โ€“ Determines the next-hop to the destination.

๐Ÿ”ต Outside to Inside Traffic

๐Ÿ”ต First: NAT Policy โ€“ Translates destination IP to internal IP.
๐Ÿ”ต Second: Security Policy โ€“ Validates access to the internal resource.
๐Ÿ”ต Third: Routing Table โ€“ Finds the path to the internal destination.

๐Ÿ’ก Pro Tip: Mastering this sequence is a game-changer for resolving connectivity and NAT issues quickly! ๐Ÿš€

Ref: Dahri A.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐…๐ซ๐ž๐ž ๐‹๐š๐›๐ฌ ๐ญ๐จ ๐“๐ž๐ฌ๐ญ ๐˜๐จ๐ฎ๐ซ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ/๐‚๐“๐… ๐’๐ค๐ข๐ฅ๐ฅ๐ฌ
๐ŸŽฒ Must-Try Platforms
1. HackTheBox: A gamified approach to pentesting with challenges ranging from easy to advanced.
๐Ÿ”— [https://hackthebox.com](https://hackthebox.com)
2. PicoCTF: Beginner-friendly CTF platform ideal for building foundational skills.
๐Ÿ”— [https://picoctf.com](https://picoctf.com)
3. OverTheWire: Focuses on building your Linux and networking fundamentals.
๐Ÿ”— [http://overthewire.org](http://overthewire.org)
4. PentesterLab: Offers guided exercises for learning web app security.
๐Ÿ”— [https://pentesterlab.com](https://pentesterlab.com)
5. Google CTF: Curated by Google, this platform provides top-notch CTF challenges.
๐Ÿ”— [https://lnkd.in/gs89f_zU)
6. Immersive Labs: Perfect for hands-on practice across various cybersecurity domains.
๐Ÿ”— https://immersivelabs.com

7. Hacker101: A free resource from HackerOne to learn and practice ethical hacking.
๐Ÿ”— https://ctf.hacker101.com


Ref: G.M. Faruk
@Undercodecommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘30 MUST USE CYBERSECURITY SEARCH ENGINES

This list showcases 30 must-use cybersecurity search engines, each specializing in a specific aspect of threat intelligence, vulnerability assessment, or data reconnaissance. These tools cater to professionals seeking information about exposed credentials, vulnerabilities, DNS records, attack surfaces, public repositories, and devices on the internet.

Dehashed: Focuses on finding leaked credentials.
Security Trails: Provides DNS and domain intelligence.
DorkSearch: Enables Google Dorking for open-source intelligence.
ExploitDB: Offers a database of publicly available exploits.
ZoomEye: Scans for information about internet-connected devices and services.
Pulsedive: Centralizes threat intelligence data.
GrayHatWarfare: Specializes in indexing public S3 buckets.
PolySwarm: Scans files and URLs for malware.
FoFa: Analyzes internet-wide threat intelligence.
LeakIX: Tracks leaked and exposed web servers.
DNSDumpster: Examines DNS data for domain reconnaissance.
FullHunt: Maps attack surfaces of internet-facing systems.
AlienVault: Collects and correlates threat intelligence.
Onyphe: Aggregates cyber-threat data and intelligence.
Grep App: Searches for sensitive information in Git repositories.
URL Scan: Investigates websites for potential malicious behavior.
Vulners: Hosts a comprehensive vulnerability database.
WayBackMachine: Provides historical archived internet content.
Shodan: Lists internet-connected devices and their security risks.
Netlas: Scans devices and services exposed on the internet.
CRT.sh: Monitors SSL/TLS certificates.
Wigle: Maps wireless networks.
PublicWWW: Conducts marketing and web analysis.
Binary Edge: Delivers threat intelligence about internet assets.
GreyNoise: Analyzes internet noise for threat detection.
Hunter: Finds and verifies email addresses.
Censys: Tracks internet-facing devices and vulnerabilities.
IntelligenceX: Searches for data leaks on Tor, I2P, and other darknets.
Packet Storm: A repository for vulnerabilities and exploits.
SearchCode: Facilitates source code searches for developers.

Ref: Rahul Raj V K
@Undercodecommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘5 domains a Cloud Engineer should know:


1. ๐Ÿ”’ Security
2. ๐Ÿ’ป Compute
3. ๐Ÿ’พ Storage
4. ๐Ÿ—‚ Database
5. ๐ŸŒ Networking

๐Ÿ“š Starting Training ๐Ÿ†“ NOW:

๐Ÿ”ถ Security Learning Plan
https://lnkd.in/eNiTnyRN

๐Ÿ”ถ AWS Compute Services Overview
https://lnkd.in/eSiFN88Y

๐Ÿ”ถ AWS Storage Learning Plan
https://lnkd.in/eFcuArhG

๐Ÿ”ถ AWS Database Offering
https://lnkd.in/gSbjZQhQ

๐Ÿ”ถ AWS Networking Core
https://lnkd.in/eUwRdA2f

Ref: Greg Powell
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)