UNDERCODE COMMUNITY
2.7K subscribers
1.24K photos
31 videos
2.65K files
81.2K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
🦑𝐅𝐑𝐄𝐄 100% off #cybersecurity udemy course.
🆓 Total 100+ hours learning content.

🚨coupon code limit 100 or 1000 enrolments only.

CompTIA IT Fundamentals Exam FC0-U61 Simplified
(coupon code: AD897D891A9EF032AC18)
https://lnkd.in/gAbDPmr3

The #ISO 26000 Master Class: Empowering Ethical Leadership (coupon code: 0EBD8F6DFC2FF2DD905C)
https://lnkd.in/gt-_n2sy

IP Addressing and Subnetting - Hands-on Learning Approach (coupon code: 50A2C30D761734BE585A)
https://lnkd.in/gvTMBrKK

#CompTIA A+ (220-1102) Core 2 Practice Exams (coupon code: B3CA5A52F5C136D00A0E)
https://lnkd.in/gdMWx2cU

CompTIA A+ (220-1101) Core 1 Practice Exams (coupon code: DEA036405FE7E1908703)
https://lnkd.in/gnfwPir5

The Complete ISO 9001:2015 Master Class (coupon code: C2EC38DEDFFCED88471C)
https://lnkd.in/gKEBXYBN

Ref: Ahmad Parvez
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
🦑Video Link Injection Vulnerability:

The application is vulnerable to a link injection attack in the email content generated from the contact form. This vulnerability allows an attacker to inject malicious links into form fields, such as the "First Name" field, which are then included in the system-generated email. A successful exploitation can lead to phishing attacks, where users are redirected to fraudulent websites that may steal sensitive information like login credentials.

Ref: Aditay Kumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
🦑FREE LABS RED TEAM/BLUE TEAM and CTF SKILLS TO 2025:

Share with your network and friends.
· Attack-Defense - https://attackdefense.com
· Alert to win - https://alf.nu/alert1
· Buffer Overflow Labs - https://lnkd.in/eNbEWYh
· CryptoHack - https://cryptohack.org/
· CMD Challenge - https://cmdchallenge.com
· Cyberdefenders - https://lnkd.in/dVcmjEw8
· Damn Vulnerable Repository - https://lnkd.in/dEitQx6H
· Defend The Web - https://defendtheweb.net/
· Exploitation Education - https://exploit.education
· Google CTF - https://lnkd.in/e46drbz8
· HackTheBox - https://www.hackthebox.com
· Hacker101 - https://ctf.hacker101.com
· Hacking-Lab - https://hacking-lab.com/
· ImmersiveLabs - https://immersivelabs.com
· Infinity Learning CWL - https://lnkd.in/dbx-VhXu
· LetsDefend- https://letsdefend.io/
· NewbieContest - https://lnkd.in/ewBk6fU5
· OverTheWire - http://overthewire.org
· Practical Pentest Labs - https://lnkd.in/esq9Yuv5
· Pentestlab - https://pentesterlab.com
· Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
· PentestIT LAB - https://lab.pentestit.ru
· PicoCTF - https://picoctf.com
· PWNABLE - https://lnkd.in/eMEwBJzn
· Root-Me - https://www.root-me.org
· Red Team Exercises - https://lnkd.in/dMBfz-Sp
· Root in Jail - http://rootinjail.com
· SANS Challenger - https://lnkd.in/e5TAMawK
· SmashTheStack - https://lnkd.in/eVn9rP9p
· The Cryptopals Crypto Challenges - https://cryptopals.com
· Try Hack Me - https://tryhackme.com
· Vulnhub - https://www.vulnhub.com
· Vulnmachine - https://lnkd.in/eJ2e_kD
· W3Challs - https://w3challs.com
· WeChall - http://www.wechall.net
· Websploit - https://websploit.org/
· Zenk-Security - https://lnkd.in/ewJ5rNx2

Ref: Joas A Santos
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
🦑🎄CyberAdvent Day 21: pyDescribeSDDL - Simplify Windows SDDL Analysis

🔐 Ever struggled with decoding SDDL strings during audits or pentests? With pyDescribeSDDL, you can transform Security Descriptor Definition Language (SDDL) strings into readable insights effortlessly!

🛠 What is pyDescribeSDDL?
pyDescribeSDDL is a Python tool designed to parse and describe the contents of SDDL strings, making it easier to analyze Access Control Entries (ACEs), Access Control Lists (ACLs), and associated SIDs and GUIDs.

🔑 Key Features
1️⃣ Human-readable summaries: Use the --summary option to output clear and concise access information.
2️⃣ ACE Parsing: Supports detailed analysis of all major ACE types
3️⃣ SID Resolution: Automatically resolve well-known SIDs to their human-readable names.
4️⃣ GUID Parsing: Decode well-known GUIDs for easier interpretation.

📂 Check out pyDescribeSDDL here: https://github.com/p0dalirius/pyDescribeSDDL

Ref: Rémi Gascou (Podalirius)Rémi Gascou
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁