UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘METASPLOIT Exploits/ basic & Advanced tutorials :

Http://www.indepthdefense.com/2009/02/reverse-pivots-with-metasploit-how-not.html

http://code.google.com/p/msf-hack/wiki/WmapNikto

Http://www.indepthdefense.com/2009/01/metasploit-visual-basic-payloads-in.html

Http://seclists.org/metasploit/

Http://pauldotcom.com/2010/03/nessus-scanning-through-a-meta.html

Http://meterpreter.illegalguy.hostzi.com/

Http://blog.metasploit.com/2010/03/automating-metasploit-
console.html

Http://www.workrobot.com/sansfire2009/561.html

Http://www.securitytube.net/video/711

http://en.wikibooks.org/wiki/Metasploit/MeterpreterClient#download

Http://vimeo.com/16852783

Http://milo2012.wordpress.com/2009/09/27/xlsinjector/

Http://www.fastandeasyhacking.com/

Http://trac.happypacket.net/

http://www.blackhat.com/presentations/bh-dc-10/Ames_Colin/BlackHat-DC-2010-colin-david-neurosurgery-with-meterpreter-wp.pdf

http://www.blackhat.com/presentations/bh-dc-10/Egypt/BlackHat-DC-2010-Egypt-UAV-slides.pdf

http://www.offensive-security.com/metasploit-unleashed/Metasploit_Unleashed_Information_Security_Training

Http://www.irongeek.com/i.php?page=videos/metasploit-class

Http://www.ethicalhacker.net/component/option,com_smf/Itemid,54/topic,6158.0/

Http://vimeo.com/16925188

Http://www.ustream.tv/recorded/13396511

Http://www.ustream.tv/recorded/13397426

Http://www.ustream.tv/recorded/13398740

enjoyβ€οΈπŸ‘πŸ»
βœ…git 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
X11 penetration testing.pdf
1.8 MB
Penetration Testing on X11 Server Full tutorial
enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MSF Exploits List :

Http://www.nessus.org/plugins/index.php?view=single&id=12204 Http://www.nessus.org/plugins/index.php?view=single&id=11413 Http://www.nessus.org/plugins/index.php?view=single&id=18021 Http://www.nessus.org/plugins/index.php?view=single&id=26918 Http://www.nessus.org/plugins/index.php?view=single&id=34821 Http://www.nessus.org/plugins/index.php?view=single&id=22194 Http://www.nessus.org/plugins/index.php?view=single&id=34476 Http://www.nessus.org/plugins/index.php?view=single&id=25168 Http://www.nessus.org/plugins/index.php?view=single&id=19408 Http://www.nessus.org/plugins/index.php?view=single&id=21564 Http://www.nessus.org/plugins/index.php?view=single&id=10862 Http://www.nessus.org/plugins/index.php?view=single&id=26925 Http://www.nessus.org/plugins/index.php?view=single&id=29314 Http://www.nessus.org/plugins/index.php?view=single&id=23643 Http://www.nessus.org/plugins/index.php?view=single&id=12052 Http://www.nessus.org/plugins/index.php?view=single&id=12052 Http://www.nessus.org/plugins/index.php?view=single&id=34477 Http://www.nessus.org/plugins/index.php?view=single&id=15962 Http://www.nessus.org/plugins/index.php?view=single&id=42106 Http://www.nessus.org/plugins/index.php?view=single&id=15456 Http://www.nessus.org/plugins/index.php?view=single&id=21689 Http://www.nessus.org/plugins/index.php?view=single&id=12205 Http://www.nessus.org/plugins/index.php?view=single&id=22182 Http://www.nessus.org/plugins/index.php?view=single&id=26919 Http://www.nessus.org/plugins/index.php?view=single&id=26921 Http://www.nessus.org/plugins/index.php?view=single&id=21696 Http://www.nessus.org/plugins/index.php?view=single&id=40887 Http://www.nessus.org/plugins/index.php?view=single&id=10404 Http://www.nessus.org/plugins/index.php?view=single&id=18027 Http://www.nessus.org/plugins/index.php?view=single&id=19402 Http://www.nessus.org/plugins/index.php?view=single&id=11790 Http://www.nessus.org/plugins/index.php?view=single&id=12209 Http://www.nessus.org/plugins/index.php?view=single&id=10673

enjoyβ€οΈπŸ‘πŸ»
βœ…git 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Malicious Input_ How Hackers Use Shellcode.pdf
1 MB
Malicious Input_ How Hackers Use Shellcode FullTutorial for beginers
#Rquested
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEB VECTORS SQLI Tools & Resources :

Http://pentestmonkey.net/blog/mssql-sql-injection-cheat-sheet/

Http://isc.sans.edu/diary.html?storyid=9397

Http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/

Http://www.evilsql.com/main/index.php

Http://xd-blog.com.ar/descargas/manuales/bugs/full-mssql-
injection-pwnage.html

http://securityoverride.com/articles.php?
article_id=1&article=The_Complete_Guide_to_SQL_Injections

Http://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/

Http://sqlzoo.net/hack/

Http://www.sqlteam.com/article/sql-server-versions

Http://www.krazl.com/blog/?p=3

http://www.owasp.org/index.php/Testing_for_MS_Access

http://web.archive.org/web/20101112061524/http://seclists.org/pen-test/2003/May/0074.html

http://web.archive.org/web/20080822123152/http://
www.webapptest.org/ms-access-sql-injection-cheat-sheet-EN.html

http://www.youtube.com/watch?v=WkHkryIoLD0

http://layerone.info/archives/2009/Joe%20McCray%20-%20Advanced%20SQL%20Injection%20-%20L1%202009.pdf

Http://vimeo.com/3418947

Http://sla.ckers.org/forum/read.php?24,33903

Http://websec.files.wordpress.com/2010/11/sqli2.pdf

Http://old.justinshattuck.com/2007/01/18/mysql-injection-cheat-sheet/

Http://ha.ckers.org/sqlinjection/

http://lab.mediaservice.net/notes_more.php?id=MSSQL

enjoyβ€οΈπŸ‘πŸ»
βœ…git 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
XSS Filter Evasion Cheat Sheet.pdf
904.9 KB
Forwarded from WEB UNDERCODE - PRIVATE
XSS_Payloads.pdf
304.8 KB
Forwarded from WEB UNDERCODE - PRIVATE
xss_payloads_2016.pdf
150.4 KB
Forwarded from WEB UNDERCODE - PRIVATE
xss-d3adend.org.txt.pdf
120.1 KB
related to XSS
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Improper infrastructure configuration caused dozens of corporate database sources to run naked on the Internet :

> Developer and reverse engineer Tillie Kottmann discovered through recent data collection: due to improper configuration of the infrastructure, the source code of the public database of dozens of companies from the technology, finance, retail, video, e-commerce, manufacturing and other industries has been Be exposed on the Internet.

> The leaked code in public repositories has spread to well-known companies such as Microsoft, Adobe, Lenovo, AMD, Qualcomm, Motorola, HiSilicon (owned by Huawei), MediaTek, GE Appliances, Nintendo, Roblox, Disney, Johnson Controls, etc.
> With the help of developer tools, Tillie Kottmann collected the aforementioned leaked source code. Even if some are marked as "confidential and proprietary," they can still be found in large numbers on code hosting and public repository platforms such as GitLab.

> Bank Security, which focuses on research on banking threats and fraud incidents, pointed out that the library contains source code from more than 50 companies. Although not all folders were exposed, in some cases sensitive credentials were leaked.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁