UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.6K links
๐Ÿฆ‘ Undercode World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE


โœจ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Web Vulnerability Resource - XSS

Unferstanding XSS Attack
https://lnkd.in/dg9THu25

XSS Filter Evasion by johnermac
https://lnkd.in/dk_gpSRP

Payloads XSs Evasion by citybasebrooks
https://lnkd.in/d4YQjBxE

XSS Resource by BruteLogic
https://lnkd.in/dcVG-RSX

XSS Challegens
https://lnkd.in/dhcbNe6d
https://lnkd.in/dif8SVjK

How to Find XSS by HackerOne
https://lnkd.in/dvqNm5bT

Learning about Cross Site Scripting (XSS)
https://lnkd.in/dYETX2VV

XSS CheatSheet by Portswigger Labs
https://lnkd.in/dAxxwj4

Hacktivity XSS by HackerOne
https://lnkd.in/dNNM86wx

XSS Explained by NahamSec
https://lnkd.in/dJiTs2td

XSS Stored, Blind, Reflected and DOM by InsiderPhD
https://lnkd.in/d9KzwBfd

Web Hacking Beyond Alert by Wild West
https://lnkd.in/djbgjFS8

XSS Tools
XSSTRIKE https://lnkd.in/dJkuhQ4X
Dalfox https://lnkd.in/dp_UnjGM
XSSMap https://lnkd.in/dgfqdEhj
FinDOM XSS https://lnkd.in/dffQm67D

Ref: Joas A SantosJoas A Santos
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘[๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐€๐‚๐“๐ˆ๐•๐„ ๐ƒ๐ˆ๐‘๐„๐‚๐“๐Ž๐‘๐˜ ๐๐„๐๐“๐„๐’๐“]

Whether you are preparing for a certification or need to sharpen your skills for your pentests.

๐Ÿค“Here is a list of resources ๐Ÿค“:

๐๐ž๐ž๐ ๐ญ๐จ ๐ฉ๐ซ๐š๐œ๐ญ๐ข๐œ๐ž?
๐Ÿ‘‰Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA

๐Ÿ‘‰You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr

๐Ÿ‘‰ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt

๐Ÿ‘‰Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM

๐Ÿ‘‰Julien Provenzano โ˜๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3

๐Ÿ‘‰Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT

Resources Credit : Gabrielle
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
security_SOC_2025.pdf
647.9 KB
๐Ÿฆ‘ SOC Architectures & Frameworks: Key to Cybersecurity! ๐Ÿšจ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโ€™s a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!

Ref: in pdf
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
๐‹๐€๐ 15 ๐๐ซ๐š๐œ๐ญ๐ข๐œ๐š๐ฅ ๐Œ๐š๐ฅ๐ฐ๐š๐ซ๐ž ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: ๐ƒ๐ข๐ฌ๐œ๐จ๐ฏ๐ž๐ซ ๐€๐ง๐ญ๐ข-๐ƒ๐ข๐ฌ๐š๐ฌ๐ฌ๐ž๐ฆ๐›๐ฅ๐ฒ ๐“๐ž๐œ๐ก๐ง๐ข๐ช๐ฎ๐ž๐ฌ
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Webshell Testing for Defenders ๐Ÿ’ก

Having automated tools to spin up web servers isnโ€™t just convenientโ€”itโ€™s a game-changer for defenders. Here's why:

๐Ÿ” Detection Opportunities:
Use these servers to validate analytic coverage for:

๐Ÿ—‚ File modifications (webshell uploads)
โš™๏ธ Process executions (commands from shells)
๐ŸŽฏ Suspicious behaviors triggered by shells

๐Ÿ’ป How to Use:

1๏ธโƒฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโƒฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโƒฃObserve logs, alerts, and behaviors to identify gaps in your coverage.

๐Ÿ”ฅ Tools for Testing:

โžก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โžก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder

Ref: Michael H.Michael H.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–