UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.7K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
fn main() {
// Example string => lets name it as shellcode ie (placeholder)
let shellcode: &[u8] = b;"Hello, World!"

// Generate ECC key pair
let private_key = Scalar::random(&mut OsRng);
let public_key = (ProjectivePoint::generator() * private_key).to_affine();

println!("Private Key: {:?}", private_key);
println!("Public Key: {:?}", public_key);

// Convert AffinePoint to VerifyingKey (or PublicKey)
VerifyingKey::from_encoded_point(&EncodedPoint::from(public_key))
.expect("Invalid public key");

let (r, encrypted_shellcode) = encode_shellcode(shellcode, &public_key);

println!("Encrypted Shellcode: {:?}", encrypted_shellcode);

// Decode the shellcode
let decrypted_shellcode = decode_shellcode(&encrypted_shellcode, &r, &private_key);

println!(
"Decrypted Shellcode: {:?}",

Ref: github by Kavinarasu I
@undercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘10 awesome GitHub repos to learn and practice API Security

1. awesome-api-security
- https://lnkd.in/gKSX8Sj8

2. 30-API-security-tests
- https://lnkd.in/g-JShXbi

3. API-Security-Checklist
- https://lnkd.in/gdfGV6ev

4. api-security-study-plan
- https://lnkd.in/gkfrAnpK

5. API-Pentesting-Checklist
- https://lnkd.in/gx6Q549z

6. API-Security-Checklist
- https://lnkd.in/gKVUpzWe

7. API-SecurityEmpire
- https://lnkd.in/gZEkf2wB

8. 31-days-of-API-Security-Tips
- https://lnkd.in/g8SCiVAZ

9. APISecurityBestPractices
- https://lnkd.in/gBDWSBvK

10. apisecurityinaction
- https://lnkd.in/gUxJ8HCy

Ref: Ankita Gupta
@undercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘100 New Cybersecurity projects ranging from beginner to advanced level. This can be used for a portfolio, personal website, or resume.

ref: RUPESH KUMAR
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘In Active Directory Domain Services (ADDS), you can enforce Group Policy updates across all computers in your domain using the following command:

#security #tips

gpupdate /force


This ensures that any recent changes to Group Policies are applied immediately, enhancing security and compliance.

Ref: Milandeep kaur S.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top Malware Analysis Tools:

Ref: Harun Seker, CISSP
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘New (free) Course Launch- from the Open University Cisco ASC - focussing on UK Legislation for Digital and Cyber - it is currently a beta, however all educators and students may use this resource
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‡๐จ๐ฐ ๐ƒ๐จ๐ž๐ฌ ๐š ๐–๐€๐… ๐ฐ๐จ๐ซ๐ค?
A Web Application Firewall (WAF) functions by monitoring and filtering HTTP/HTTPS traffic to and from web applications.

๐Š๐ž๐ฒ ๐จ๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐œ๐จ๐ฆ๐ฉ๐จ๐ง๐ž๐ง๐ญ๐ฌ ๐ข๐ง๐œ๐ฅ๐ฎ๐๐ž: -

๐“๐ซ๐š๐Ÿ๐Ÿ๐ข๐œ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: It scrutinizes incoming and outgoing requests to pinpoint anomalies or potential threats.

๐‘๐ฎ๐ฅ๐ž ๐„๐ง๐Ÿ๐จ๐ซ๐œ๐ž๐ฆ๐ž๐ง๐ญ: Predefined rulesets are applied to identify and mitigate malicious activity. Analytical techniques employed by a WAF encompass:

๐๐ฅ๐š๐œ๐ค๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : This approach blocks requests from known malicious IP addresses, preventing unauthorized access.

๐–๐ก๐ข๐ญ๐ž๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : Only explicitly approved requests are allowed through, enhancing security by default.

๐’๐ข๐ ๐ง๐š๐ญ๐ฎ๐ซ๐ž-๐๐š๐ฌ๐ž๐ ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง**This method involves recognizing established attack patterns based on known signatures.

**๐๐ž๐ก๐š๐ฏ๐ข๐จ๐ซ๐š๐ฅ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ
: Leveraging machine learning algorithms, the WAF can identify suspicious behaviors that may deviate from normal activity. Unlike traditional antivirus solutions that rely solely on signature detection,
WAFs utilize more sophisticated detection mechanisms.

๐Ž๐ง๐œ๐ž ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ ๐š๐ซ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ž๐, ๐ญ๐ก๐ž ๐–๐€๐… ๐ข๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐ญ๐ก๐ž ๐Ÿ๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐  ๐ฆ๐ž๐š๐ฌ๐ฎ๐ซ๐ž๐ฌ:

๐‘๐ž๐ช๐ฎ๐ž๐ฌ๐ญ ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐ : Directly halting any identified malicious requests.

๐„๐ฏ๐ž๐ง๐ญ ๐‹๐จ๐ ๐ ๐ข๐ง๐ : Recording incidents for further investigation and analysis, facilitating continued improvement of security postures.

Image credit: Cyber Edition
Ref: Praveen Singh

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Free New Threat Hunting Resources Added! ๐Ÿšจ

๐Ÿ” What's New?

1๏ธโƒฃ Advanced Threat Hunting Queries (hashtag#KQL):
- Identify and monitor vulnerable assets for Known Exploited Vulnerabilities (hashtag#KEVs) by ransomware groups.
- Attack Vector: Network | Privileges Required: None

> Download <

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–