π¦Free AI image to video + Offline models :
https://huggingface.co/collections/neox1969/image-to-video-65471876af5d7944323566f5
https://huggingface.co/collections/neox1969/image-to-video-65471876af5d7944323566f5
Forwarded from Exploiting Crew (Pr1vAt3)
π¦π π
π«ππ ππππ’π―π ππ’π«ππππ¨π«π² πππ§πππ¬π ππππ¬!
Game of Active Directory is an Open-Source project developed by Orange Cyber Defense that provides a vulnerable Active Directory environment.
It's designed for security professionals to practice and improve their skills in a controlled setting:
β’ Hands-on learning without risking a production environment.
β’ Opportunity to explore advanced attack and defense techniques.
β’ Offers a cost-effective way to build cybersecurity expertise.
β’ Facilitates a deeper understanding of AD security best practices.
Source: https://lnkd.in/gxN-_nTw
Kindly note that GOAD is intentionally designed to be highly vulnerable. It is strongly advised to refrain from replicating its configuration for production environments.
GOAD helps threat hunters simulate AD attacks, refine detection skills, and test response strategies in a safe, controlled environment.
Discover over 10+ essential data analysis techniques for effective threat hunting in my "Cyber Threat Hunt 101" YouTube series, explained simply: https://lnkd.in/gkVB6B2j
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Game of Active Directory is an Open-Source project developed by Orange Cyber Defense that provides a vulnerable Active Directory environment.
It's designed for security professionals to practice and improve their skills in a controlled setting:
β’ Hands-on learning without risking a production environment.
β’ Opportunity to explore advanced attack and defense techniques.
β’ Offers a cost-effective way to build cybersecurity expertise.
β’ Facilitates a deeper understanding of AD security best practices.
Source: https://lnkd.in/gxN-_nTw
Kindly note that GOAD is intentionally designed to be highly vulnerable. It is strongly advised to refrain from replicating its configuration for production environments.
GOAD helps threat hunters simulate AD attacks, refine detection skills, and test response strategies in a safe, controlled environment.
Discover over 10+ essential data analysis techniques for effective threat hunting in my "Cyber Threat Hunt 101" YouTube series, explained simply: https://lnkd.in/gkVB6B2j
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
π¦Free 3D models urls List:
https://sketchfab.com/
https://www.cgtrader.com/free-3d-models
https://www.turbosquid.com/
https://free3d.com/
https://www.thingiverse.com/
https://www.blendswap.com/
https://polyhaven.com/
https://threedscans.com/
https://grabcad.com/
https://3dwarehouse.sketchup.com/
https://archive3d.net/
https://www.models-resource.com/
https://clara.io/
https://3dsky.org/
https://www.renderhub.com/free-3d-models
https://www.sharecg.com/
https://3drt.com/
https://www.yeggi.com/
https://www.cadnav.com/
https://3dmdb.com/
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
https://sketchfab.com/
https://www.cgtrader.com/free-3d-models
https://www.turbosquid.com/
https://free3d.com/
https://www.thingiverse.com/
https://www.blendswap.com/
https://polyhaven.com/
https://threedscans.com/
https://grabcad.com/
https://3dwarehouse.sketchup.com/
https://archive3d.net/
https://www.models-resource.com/
https://clara.io/
https://3dsky.org/
https://www.renderhub.com/free-3d-models
https://www.sharecg.com/
https://3drt.com/
https://www.yeggi.com/
https://www.cadnav.com/
https://3dmdb.com/
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Sketchfab
Sketchfab - The best 3D viewer on the web
With a community of over one million creators, we are the worldβs largest platform to publish, share, and discover 3D content on web, mobile, AR, and VR.
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Real Ethical Hacking in 43 Hours: Your Fast-Track to Cybersecurity Mastery
Elevate your cybersecurity career with our comprehensive ethical hacking course.
Key Topics Covered:
* Ethical Hacking Foundations
* Introduction to Ethical Hacking
* Ethical Hacking Steps
* Creating Your Ethical Hacking Lab
* Operating System Fundamentals
* Vulnerability Assessment
* OSINT Techniques
* Storage Media
* Linux Basics
* Linux Shell
* Linux Processes
* Linux Permissions
* Network Security Concepts
* Packet Management Systems
* Network Security
* Linux File System
* Working with Archives
* Working with Processes
* Working with Users
* Networking Fundamentals
* Network Capture
* Network Scanning
* Advanced Networking Topics
* Information Gathering
* Web Application Hacking
* Detecting Web Vulnerabilities
* The Importance of Programming
* C++ and C
* SQL and Relational Databases
* Functions in C++
* Ethical Hacking for Data Scientists
* Ethical Hacking for SQL Datatypes
* Learning Python for Ethical Hacking
Gain hands-on experience with industry-standard tools like Kali Linux, Metasploit, and Nmap. Prepare for and ace certifications like CSEH and CEH.
Download Link: https://lnkd.in/dnXx6G6H
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Elevate your cybersecurity career with our comprehensive ethical hacking course.
Key Topics Covered:
* Ethical Hacking Foundations
* Introduction to Ethical Hacking
* Ethical Hacking Steps
* Creating Your Ethical Hacking Lab
* Operating System Fundamentals
* Vulnerability Assessment
* OSINT Techniques
* Storage Media
* Linux Basics
* Linux Shell
* Linux Processes
* Linux Permissions
* Network Security Concepts
* Packet Management Systems
* Network Security
* Linux File System
* Working with Archives
* Working with Processes
* Working with Users
* Networking Fundamentals
* Network Capture
* Network Scanning
* Advanced Networking Topics
* Information Gathering
* Web Application Hacking
* Detecting Web Vulnerabilities
* The Importance of Programming
* C++ and C
* SQL and Relational Databases
* Functions in C++
* Ethical Hacking for Data Scientists
* Ethical Hacking for SQL Datatypes
* Learning Python for Ethical Hacking
Gain hands-on experience with industry-standard tools like Kali Linux, Metasploit, and Nmap. Prepare for and ace certifications like CSEH and CEH.
Download Link: https://lnkd.in/dnXx6G6H
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
π¦Free Data Leak Checker:
πͺ CVEs scan
βοΈ Works with powerful APIs
π Works too with Google Dorks
π Checks your password in Word Lists
π Checks the last pastes in Pastebin
π Output to txt, docx, pdf, xlsx, json, html, xml, db
π Output to encrypted files
π¦ Sends result files to multiples Buckets S3
π Upload the result files to Google Drive
π‘ Cab send result files by SSH (work with EC2)
π’ Notify by Telegram and e-mail
π Includes option to hide passwords for demonstrations
π Works with scheduled scans
π Possible to execute loop scans
https://github.com/loseys/Oblivion
πͺ CVEs scan
βοΈ Works with powerful APIs
π Works too with Google Dorks
π Checks your password in Word Lists
π Checks the last pastes in Pastebin
π Output to txt, docx, pdf, xlsx, json, html, xml, db
π Output to encrypted files
π¦ Sends result files to multiples Buckets S3
π Upload the result files to Google Drive
π‘ Cab send result files by SSH (work with EC2)
π’ Notify by Telegram and e-mail
π Includes option to hide passwords for demonstrations
π Works with scheduled scans
π Possible to execute loop scans
https://github.com/loseys/Oblivion
π¦1)JS-Tap: Weaponizing JavaScript for Red Teams
https://lnkd.in/gKUUNrKN
2)Automating the Setup of a Bug Bounty Toolkit
https://lnkd.in/gkAN5KJh
3)VOIP Penetration Testing Checklist
https://lnkd.in/gz6iJqG8
4)Find Website Vulnerabilities with One Hacking Tool
https://lnkd.in/giNT2tGr
5)Easy Way To Root Your Virtual Device :)
https://lnkd.in/gTCX9_Zk
6)LetsDefend Walkthrough: Kernel Exploit Challenge
https://lnkd.in/gWjzjUaN
7)TryHackMe Writeup β Corridor
https://lnkd.in/g462KWdP
8)HTB: Editorial Writeup / Walkthrough
https://lnkd.in/gCQgrzy4
9)Lookup THM Walkthrough
https://lnkd.in/gk87hb_H
10)ITI + CyberTalents DFIR Bootcamp CTF Write ups
https://lnkd.in/gpTJuVim
Ref: Saumadip Mandal
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
https://lnkd.in/gKUUNrKN
2)Automating the Setup of a Bug Bounty Toolkit
https://lnkd.in/gkAN5KJh
3)VOIP Penetration Testing Checklist
https://lnkd.in/gz6iJqG8
4)Find Website Vulnerabilities with One Hacking Tool
https://lnkd.in/giNT2tGr
5)Easy Way To Root Your Virtual Device :)
https://lnkd.in/gTCX9_Zk
6)LetsDefend Walkthrough: Kernel Exploit Challenge
https://lnkd.in/gWjzjUaN
7)TryHackMe Writeup β Corridor
https://lnkd.in/g462KWdP
8)HTB: Editorial Writeup / Walkthrough
https://lnkd.in/gCQgrzy4
9)Lookup THM Walkthrough
https://lnkd.in/gk87hb_H
10)ITI + CyberTalents DFIR Bootcamp CTF Write ups
https://lnkd.in/gpTJuVim
Ref: Saumadip Mandal
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
π¦FREE Videos for Learning ICS/OT Cyber Security! π½
Learning doesn't have to be hard!
My YouTube channel now hosts 42 videos on ICS/OT cyber security.
Just to help you!
Haven't checked out my YouTube channel yet?
Here's where to start...
1. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)
https://lnkd.in/ee6QjZEn
2. OSINT for ICS/OT - Complete 10+ Hour Course - Part 1 (Course Introduction)
https://lnkd.in/eia63NDc
3. Industrial (ICS/OT) Cyber Security Certifications
https://lnkd.in/eErhErQJ
4. Hacking ICS/OT (& IT) with ChatGPT
https://lnkd.in/ebiidVry
5. Nmap Scanning for ICS/OT (& IT) - Part 1
https://lnkd.in/eHvMD2zJ
6. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 10 (Intro to ICS/OT Penetration Testing)
https://lnkd.in/eeSm7rxD
7. ICS/OT Packet Analysis Tools
https://lnkd.in/e4nSThTm
8. Using Shodan to Find ICS/OT (& IT) Assets
https://lnkd.in/eQgJ-xKa
9. Getting Started in ICS/OT Cyber Security - LIVE Recruiter Edition
https://lnkd.in/eACU5WNQ
10. Learn ICS/OT Incident Response w/ Backdoors & Breaches
https://lnkd.in/ePgnwPbA
Ref: Mike Holcomb
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Learning doesn't have to be hard!
My YouTube channel now hosts 42 videos on ICS/OT cyber security.
Just to help you!
Haven't checked out my YouTube channel yet?
Here's where to start...
1. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)
https://lnkd.in/ee6QjZEn
2. OSINT for ICS/OT - Complete 10+ Hour Course - Part 1 (Course Introduction)
https://lnkd.in/eia63NDc
3. Industrial (ICS/OT) Cyber Security Certifications
https://lnkd.in/eErhErQJ
4. Hacking ICS/OT (& IT) with ChatGPT
https://lnkd.in/ebiidVry
5. Nmap Scanning for ICS/OT (& IT) - Part 1
https://lnkd.in/eHvMD2zJ
6. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 10 (Intro to ICS/OT Penetration Testing)
https://lnkd.in/eeSm7rxD
7. ICS/OT Packet Analysis Tools
https://lnkd.in/e4nSThTm
8. Using Shodan to Find ICS/OT (& IT) Assets
https://lnkd.in/eQgJ-xKa
9. Getting Started in ICS/OT Cyber Security - LIVE Recruiter Edition
https://lnkd.in/eACU5WNQ
10. Learn ICS/OT Incident Response w/ Backdoors & Breaches
https://lnkd.in/ePgnwPbA
Ref: Mike Holcomb
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
π¦AICaller
is a simple-to-use automated bulk calling solution that uses the latest Generative AI technology to trigger phone calls for you and get things done. It can do things like lead qualification, data gathering over phone calls, and much more. It comes with a powerful API, low cost pricing and free trial.
https://aicaller.io/
https://youtu.be/1MEK5Q_Yyao
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
is a simple-to-use automated bulk calling solution that uses the latest Generative AI technology to trigger phone calls for you and get things done. It can do things like lead qualification, data gathering over phone calls, and much more. It comes with a powerful API, low cost pricing and free trial.
https://aicaller.io/
https://youtu.be/1MEK5Q_Yyao
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
aicaller.io
AI Caller is a robocaller for automated calls using AI for Sales and Marketing
AI Caller is a robocaller for automated calls using latest AI technology. Best AI for Sales and Marketing professionals, they love using AI for lead qualification, AI for meeting booking, AI for appointment booking, AI for data gathering and much more. AIβ¦
UNDERCODE TESTING
π¦AICaller is a simple-to-use automated bulk calling solution that uses the latest Generative AI technology to trigger phone calls for you and get things done. It can do things like lead qualification, data gathering over phone calls, and much more. It comesβ¦
π¦AI Phone Answering Service (Trial)
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Heyrosie
Rosie AI Call Answering Service | 24/7 Phone Support From $49
Never miss another call with our AI-powered call answering service. 10x better than voicemail. 10x cheaper than a traditional phone answering service.
Forwarded from UNDERCODE TESTING
π¦AI Phone Answering Service (Trial)
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Heyrosie
Rosie AI Call Answering Service | 24/7 Phone Support From $49
Never miss another call with our AI-powered call answering service. 10x better than voicemail. 10x cheaper than a traditional phone answering service.
π¦Free AI lab focused on open-source generative audio models:
> open-source generative audio tools to make music production more accessible and fun for everyone.
https://www.harmonai.org/
https://github.com/Harmonai-org/
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
> open-source generative audio tools to make music production more accessible and fun for everyone.
https://www.harmonai.org/
https://github.com/Harmonai-org/
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Harmonai
A Stability AI lab focused on open-source generative audio models - Harmonai
π¦ TLS vs SSL: Whatβs the Difference? π
In todayβs digital world, securing data in transit is critical. If youβve ever wondered about the difference between SSL (Secure Socket Layer) and TLS (Transport Layer Security), hereβs a simplified breakdown to clarify:
β What is SSL?
π» SSL was the first protocol designed to secure data over the internet.
π» Versions like SSL 1.0, 2.0, and 3.0 are now considered outdated and insecure due to vulnerabilities.
π TLS (The Modern Standard)
π» TLS is the successor to SSL and is widely used today to secure communications.
π» Versions like TLS 1.2 and TLS 1.3 offer strong encryption, secure handshakes, and modern algorithms.
π Key Differences Between TLS and SSL:
1οΈβ£ Security:
π» TLS is more secure with enhanced features.
π» SSL is outdated and vulnerable to modern attacks.
2οΈβ£ Protocol Versions:
π» TLS: 1.0 β 1.1 β 1.2 β 1.3 β
π» SSL: 1.0 β 2.0 β 3.0 (all deprecated) β
3οΈβ£ Cipher Suites:
π» TLS supports stronger and modern cipher suites.
π» SSL uses weaker suites that are less secure.
4οΈβ£ Handshake Process:
π» TLS uses a robust and secure handshake process.
π» SSL relies on a less secure method.
5οΈβ£ Key Exchange:
π» TLS enables highly secure key exchanges (e.g., Diffie-Hellman and ECDHE).
π» SSL primarily relies on older RSA algorithms.
π Why Does This Matter?
Using TLS (especially TLS 1.2 or TLS 1.3) ensures:
β Stronger encryption
β Better security against cyber attacks
β Safe data transmission across networks
β SSL should not be used anymore due to its vulnerabilities.
Ref: Fadi Kazdar
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
In todayβs digital world, securing data in transit is critical. If youβve ever wondered about the difference between SSL (Secure Socket Layer) and TLS (Transport Layer Security), hereβs a simplified breakdown to clarify:
β What is SSL?
π» SSL was the first protocol designed to secure data over the internet.
π» Versions like SSL 1.0, 2.0, and 3.0 are now considered outdated and insecure due to vulnerabilities.
π TLS (The Modern Standard)
π» TLS is the successor to SSL and is widely used today to secure communications.
π» Versions like TLS 1.2 and TLS 1.3 offer strong encryption, secure handshakes, and modern algorithms.
π Key Differences Between TLS and SSL:
1οΈβ£ Security:
π» TLS is more secure with enhanced features.
π» SSL is outdated and vulnerable to modern attacks.
2οΈβ£ Protocol Versions:
π» TLS: 1.0 β 1.1 β 1.2 β 1.3 β
π» SSL: 1.0 β 2.0 β 3.0 (all deprecated) β
3οΈβ£ Cipher Suites:
π» TLS supports stronger and modern cipher suites.
π» SSL uses weaker suites that are less secure.
4οΈβ£ Handshake Process:
π» TLS uses a robust and secure handshake process.
π» SSL relies on a less secure method.
5οΈβ£ Key Exchange:
π» TLS enables highly secure key exchanges (e.g., Diffie-Hellman and ECDHE).
π» SSL primarily relies on older RSA algorithms.
π Why Does This Matter?
Using TLS (especially TLS 1.2 or TLS 1.3) ensures:
β Stronger encryption
β Better security against cyber attacks
β Safe data transmission across networks
β SSL should not be used anymore due to its vulnerabilities.
Ref: Fadi Kazdar
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Cloud Sec 2025.pdf
1.2 MB
π¦Cloud Security
π The world of cloud computing offers incredible flexibility and scalability, but it also comes with unique challenges in securing your data and infrastructure. π»π‘
π― Key Aspects Covered in This Cloud Security Guide:
π Identity and Access Management (IAM): Strong authentication & role-based access controls.
π Data Protection: Encryption, backup strategies & secure storage.
π Network Security: Firewalls, VPNs, and segmentation.
π Compliance: Aligning with frameworks like ISO, GDPR, and HIPAA.
π Threat Management: Monitoring & mitigating risks with SIEM and IDS.
π Incident Response: Proactive planning and fast recovery.
π The world of cloud computing offers incredible flexibility and scalability, but it also comes with unique challenges in securing your data and infrastructure. π»π‘
π― Key Aspects Covered in This Cloud Security Guide:
π Identity and Access Management (IAM): Strong authentication & role-based access controls.
π Data Protection: Encryption, backup strategies & secure storage.
π Network Security: Firewalls, VPNs, and segmentation.
π Compliance: Aligning with frameworks like ISO, GDPR, and HIPAA.
π Threat Management: Monitoring & mitigating risks with SIEM and IDS.
π Incident Response: Proactive planning and fast recovery.