Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฆ How to Hunt LFI Using Google Dorks - PoC ๐จ
Welcome to another exciting episode on HackWithRohit! ๐
In this video, weโll dive deep into:
๐ Local File Inclusion (LFI) vulnerabilities and how they can expose sensitive files on web servers.
๐ก Leveraging Google Dorks as a powerful tool to uncover vulnerable endpoints.
๐ A step-by-step demonstration of identifying and exploiting LFI in real-world scenarios.
๐ก Disclaimer:
This video is strictly for educational purposes only. Always ensure you have permission to test and follow ethical hacking guidelines. Unauthorized testing or exploitation is illegal and against the principles of ethical hacking.
๐ฌ Discussion Time:
Have you encountered LFI during your bug hunting journey?
Share your tips and tricks in the comments!
๐ Donโt forget to like, comment, and subscribe to stay updated on the latest bug bounty techniques and tools.
Ref: ROHITH SROHITH S
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Welcome to another exciting episode on HackWithRohit! ๐
In this video, weโll dive deep into:
๐ Local File Inclusion (LFI) vulnerabilities and how they can expose sensitive files on web servers.
๐ก Leveraging Google Dorks as a powerful tool to uncover vulnerable endpoints.
๐ A step-by-step demonstration of identifying and exploiting LFI in real-world scenarios.
๐ก Disclaimer:
This video is strictly for educational purposes only. Always ensure you have permission to test and follow ethical hacking guidelines. Unauthorized testing or exploitation is illegal and against the principles of ethical hacking.
๐ฌ Discussion Time:
Have you encountered LFI during your bug hunting journey?
Share your tips and tricks in the comments!
๐ Donโt forget to like, comment, and subscribe to stay updated on the latest bug bounty techniques and tools.
Ref: ROHITH SROHITH S
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
bloodhound.pdf
2.3 MB
๐ฆMastering Active Directory Enumeration with BloodHound ๐๐ป
Just explored the "BloodHound Active Directory Enumeration Tool"โan essential resource for both offensive and defensive security professionals. This guide simplifies the process of visualizing and understanding Active Directory attack paths and security gaps, helping organizations stay secure.
Highlights from the guide:
โ๏ธ Step-by-step installation for Linux and Windows
โ๏ธ Techniques to extract and analyze domain data
โ๏ธ Pre-built queries to identify vulnerabilities like AS-REP roasting, Kerberoasting, and DC Sync attacks
โ๏ธ Utilizing SharpHound and PowerShell for efficient data collection
โ๏ธ Practical advice for Red and Blue Teams alike
Whether you're on the offensive or working to harden your network's defenses, BloodHound is a game-changer for Active Directory enumeration and analysis.
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Just explored the "BloodHound Active Directory Enumeration Tool"โan essential resource for both offensive and defensive security professionals. This guide simplifies the process of visualizing and understanding Active Directory attack paths and security gaps, helping organizations stay secure.
Highlights from the guide:
โ๏ธ Step-by-step installation for Linux and Windows
โ๏ธ Techniques to extract and analyze domain data
โ๏ธ Pre-built queries to identify vulnerabilities like AS-REP roasting, Kerberoasting, and DC Sync attacks
โ๏ธ Utilizing SharpHound and PowerShell for efficient data collection
โ๏ธ Practical advice for Red and Blue Teams alike
Whether you're on the offensive or working to harden your network's defenses, BloodHound is a game-changer for Active Directory enumeration and analysis.
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆRecommended courses:
Google Data Analytics
๐ https://lnkd.in/gv4whkFn
Advanced Google Analytics
๐ https://lnkd.in/gnswTs7t
Google Project Management
๐ https://lnkd.in/geUMD3K9
Foundations of Project Management
๐ https://lnkd.in/gJCjD6us
1. IBM Project Manager
๐https://lnkd.in/gTaaHHPQ
3. IBM Data Analyst
๐https://lnkd.in/gMingmB2
4. IBM Data Analytics with Excel and R
๐https://lnkd.in/gejqD9ry
5. IBM Data Science
๐https://lnkd.in/guyY26Ye
6. IBM Data Engineering
๐https://lnkd.in/geFjWDCj
7. IBM AI Engineering
๐https://lnkd.in/gQpHeu7e
3-Learn SQL Basics for Data Science:
๐https://lnkd.in/gKcT3SdP
4-Excel for Business :
๐https://lnkd.in/geHAfHAK
5-Python for Everybody :
๐https://lnkd.in/gUga4caw
6-Data Analysis Visualization Foundations :
๐https://lnkd.in/geWz5T-v
7-Machine Learning Specialization:
๐https://lnkd.in/gCZqk6-J
8-Introduction to Data Science:
๐https://lnkd.in/gK_C8XKy
1. Microsoft Azure Data Scientist Associate
๐ https://lnkd.in/gaX-nhS3
2. Microsoft Cybersecurity Analyst Professional
๐ https://lnkd.in/g_WYd7iw
3. Microsoft Power BI Data Analyst Professional
๐ https://lnkd.in/gi2FQkf7
4. Microsoft Azure Data Engineering Associate (DP-203) Professional
๐ https://lnkd.in/ggUAK2zx
5. Microsoft Azure Developer Associate (AZ-204) Professional
๐ https://lnkd.in/gF99Jh_s
6. Microsoft Azure Security Engineer Associate (AZ-500) Professional
๐ https://lnkd.in/gqgBVvUc
Ref: Vikas Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Google Data Analytics
๐ https://lnkd.in/gv4whkFn
Advanced Google Analytics
๐ https://lnkd.in/gnswTs7t
Google Project Management
๐ https://lnkd.in/geUMD3K9
Foundations of Project Management
๐ https://lnkd.in/gJCjD6us
1. IBM Project Manager
๐https://lnkd.in/gTaaHHPQ
3. IBM Data Analyst
๐https://lnkd.in/gMingmB2
4. IBM Data Analytics with Excel and R
๐https://lnkd.in/gejqD9ry
5. IBM Data Science
๐https://lnkd.in/guyY26Ye
6. IBM Data Engineering
๐https://lnkd.in/geFjWDCj
7. IBM AI Engineering
๐https://lnkd.in/gQpHeu7e
3-Learn SQL Basics for Data Science:
๐https://lnkd.in/gKcT3SdP
4-Excel for Business :
๐https://lnkd.in/geHAfHAK
5-Python for Everybody :
๐https://lnkd.in/gUga4caw
6-Data Analysis Visualization Foundations :
๐https://lnkd.in/geWz5T-v
7-Machine Learning Specialization:
๐https://lnkd.in/gCZqk6-J
8-Introduction to Data Science:
๐https://lnkd.in/gK_C8XKy
1. Microsoft Azure Data Scientist Associate
๐ https://lnkd.in/gaX-nhS3
2. Microsoft Cybersecurity Analyst Professional
๐ https://lnkd.in/g_WYd7iw
3. Microsoft Power BI Data Analyst Professional
๐ https://lnkd.in/gi2FQkf7
4. Microsoft Azure Data Engineering Associate (DP-203) Professional
๐ https://lnkd.in/ggUAK2zx
5. Microsoft Azure Developer Associate (AZ-204) Professional
๐ https://lnkd.in/gF99Jh_s
6. Microsoft Azure Security Engineer Associate (AZ-500) Professional
๐ https://lnkd.in/gqgBVvUc
Ref: Vikas Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆChatGPT Prompts That Will Change Your Life Before 2025
1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."
2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."
3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]
4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."
5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."
6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."
Save this now to unlock the power of ChatGPT before 2025
๐ Courses From Google
๐ 7000+ Course Free Access: https://lnkd.in/dzCcMS7n
Google Data Analytics
๐ https://lnkd.in/gv4whkFn
Advanced Google Analytics
๐ https://lnkd.in/gnswTs7t
Google AI Essentials j
๐ https://lnkd.in/gKyDHMhe
Ref: Khushboo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. Use the 80/20 principle to learn faster
Prompt: "I want to learn about [insert topic]. Identify and share the most important 20% of learnings from this topic that will help me understand 80% of it."
2. Learn and develop any new skill
Prompt: "I want to learn / get better at [insert desired skill]. I am a complete beginner. Create a 30-day learning plan that will help a beginner like me learn and improve this skill."
3. Summarize long documents and articles
Prompt: "Summarize the text below and give me a list of bullet points with key insights and the most important facts." [Insert text]
4. Train ChatGPT to generate prompts for you
Prompt: "You are an AI designed to help [insert profession]. Generate a list of the 10 best prompts for yourself. The prompts should be about [insert topic]."
5. Master any new skill
Prompt: "I have 3 free days a week and 2 months. Design a crash study plan to master [insert desired skill]."
6. Simplify complex information
Prompt: "Break down [insert topic] into smaller, easier-to-understand parts. Use analogies and real-life examples to simplify the concept and make it more relatable."
Save this now to unlock the power of ChatGPT before 2025
๐ Courses From Google
๐ 7000+ Course Free Access: https://lnkd.in/dzCcMS7n
Google Data Analytics
๐ https://lnkd.in/gv4whkFn
Advanced Google Analytics
๐ https://lnkd.in/gnswTs7t
Google AI Essentials j
๐ https://lnkd.in/gKyDHMhe
Ref: Khushboo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐
๐๐๐ ๐๐ ๐๐จ๐ฎ๐ซ๐ฌ๐๐ฌ ๐ญ๐จ ๐ ๐๐ญ ๐ฒ๐จ๐ฎ ๐ฆ๐๐ฌ๐ฌ๐ข๐ฏ๐๐ฅ๐ฒ ๐๐ก๐๐๐:
๐ Links are included.
๐ Save for later.
๐7000+ Courses Learn without limits: https://lnkd.in/gfYC9rxB
Google Prompting Essentials
๐ https://lnkd.in/gghsW2kP
Programming with Generative AI
๐ https://lnkd.in/gAnKXgzF
Foundations of AI and Machine Learning
๐ https://lnkd.in/gyEP56i9
IBM AI Developer Professional Certificate
๐https://lnkd.in/gSAxDbxv
1๏ธโฃ ChatGPT for beginners
๐ https://lnkd.in/gRw5dcCG
2๏ธโฃ Generative AI for Project Managers
๐https://lnkd.in/gUNDFU7C
3๏ธโฃ Generative AI for Product Managers
๐https://lnkd.in/g5aX2Qbr
4๏ธโฃ Navigating Generative AI for Leaders
๐ https://lnkd.in/gkQ_y7ZK
5๏ธโฃ Generative AI for Business Consultants
๐ https://lnkd.in/gQj4czyE
6๏ธโฃ Generative AI for Data Scientists
๐ https://lnkd.in/gPUcZRRq
7๏ธโฃ Generative AI for Data Analysts
๐ https://lnkd.in/g-mCEN64
8๏ธโฃ Generative AI for Software Developers
๐ https://lnkd.in/gYfBi8hM
9๏ธโฃ Generative AI for Cybersecurity Professionals
๐ https://lnkd.in/gyicuxb5
๐ Generative AI for Data Engineers
๐ https://lnkd.in/gTBzGWB2
Ref: Khushboo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Links are included.
๐ Save for later.
๐7000+ Courses Learn without limits: https://lnkd.in/gfYC9rxB
Google Prompting Essentials
๐ https://lnkd.in/gghsW2kP
Programming with Generative AI
๐ https://lnkd.in/gAnKXgzF
Foundations of AI and Machine Learning
๐ https://lnkd.in/gyEP56i9
IBM AI Developer Professional Certificate
๐https://lnkd.in/gSAxDbxv
1๏ธโฃ ChatGPT for beginners
๐ https://lnkd.in/gRw5dcCG
2๏ธโฃ Generative AI for Project Managers
๐https://lnkd.in/gUNDFU7C
3๏ธโฃ Generative AI for Product Managers
๐https://lnkd.in/g5aX2Qbr
4๏ธโฃ Navigating Generative AI for Leaders
๐ https://lnkd.in/gkQ_y7ZK
5๏ธโฃ Generative AI for Business Consultants
๐ https://lnkd.in/gQj4czyE
6๏ธโฃ Generative AI for Data Scientists
๐ https://lnkd.in/gPUcZRRq
7๏ธโฃ Generative AI for Data Analysts
๐ https://lnkd.in/g-mCEN64
8๏ธโฃ Generative AI for Software Developers
๐ https://lnkd.in/gYfBi8hM
9๏ธโฃ Generative AI for Cybersecurity Professionals
๐ https://lnkd.in/gyicuxb5
๐ Generative AI for Data Engineers
๐ https://lnkd.in/gTBzGWB2
Ref: Khushboo
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆXSS payload generated using JSfuck, for bypass attribute filters ๐ก๏ธ
https://pastebin.ubuntu.com/p/5sVVKjqXxx
https://pastebin.ubuntu.com/p/5sVVKjqXxx
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐งช Interactive Labs for Microsoft Certified: Security Operations Analyst Associate
๐น Apply Microsoft Defender for Office 365 preset security policies
๐งช https://lnkd.in/d6BqZJtv
๐น Deploy Microsoft Defender for Endpoint
๐งช https://lnkd.in/dd_Vj9VT
๐น Mitigate Attacks with Microsoft Defender for Endpoint
๐งช https://lnkd.in/d273kEnd
๐น Enable Microsoft Defender for Cloud
๐งช https://lnkd.in/d_nGMapG
๐น Mitigate threats using Microsoft Defender for Cloud
๐งช https://lnkd.in/drJmedgr
๐น Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
๐งช https://lnkd.in/dQnQ_iEZ
๐น Configure your Microsoft Sentinel environment
๐งช https://lnkd.in/dr4akkUX
๐น Connect data to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dtRmAwFa
๐น Connect Windows devices to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dpxmvabA
๐น Connect Linux hosts to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dua8fHNm
๐น Create workbooks
๐งช https://lnkd.in/dnawKhcP
๐น Use Repositories in Microsoft Sentinel
๐งช https://lnkd.in/daQkDy9N
Ref: Dimitris Chatzidimitris
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐น Apply Microsoft Defender for Office 365 preset security policies
๐งช https://lnkd.in/d6BqZJtv
๐น Deploy Microsoft Defender for Endpoint
๐งช https://lnkd.in/dd_Vj9VT
๐น Mitigate Attacks with Microsoft Defender for Endpoint
๐งช https://lnkd.in/d273kEnd
๐น Enable Microsoft Defender for Cloud
๐งช https://lnkd.in/d_nGMapG
๐น Mitigate threats using Microsoft Defender for Cloud
๐งช https://lnkd.in/drJmedgr
๐น Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
๐งช https://lnkd.in/dQnQ_iEZ
๐น Configure your Microsoft Sentinel environment
๐งช https://lnkd.in/dr4akkUX
๐น Connect data to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dtRmAwFa
๐น Connect Windows devices to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dpxmvabA
๐น Connect Linux hosts to Microsoft Sentinel using data connectors
๐งช https://lnkd.in/dua8fHNm
๐น Create workbooks
๐งช https://lnkd.in/dnawKhcP
๐น Use Repositories in Microsoft Sentinel
๐งช https://lnkd.in/daQkDy9N
Ref: Dimitris Chatzidimitris
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ LFIer Tool :
>>>>LFIer>>>> is a powerful tool for detecting >>>>Local File Inclusion (LFI)>>>> vulnerabilities in web applications. By injecting payloads into URL parameters and analyzing responses, it efficiently identifies potential security issues. The tool is designed for flexibility, efficiency, and accuracy, even when scanning sites protected by WAFs or cloud-based defenses.
๐ >>>>Key Features>>>>
1. >>>>โก๏ธ High Performance>>>>: Async programming ensures rapid, non-blocking requests for large-scale scanning.
2. >>>>๐ Advanced Detection>>>>: Custom payloads and indicators accurately detect vulnerabilities.
3. >>>>๐ก WAF/Cloud Bypass>>>>: Simulates real browser requests to bypass security measures.
4. >>>>๐ Custom Payloads>>>>: Allows user-defined payload injection for flexibility.
5. >>>>๐ Custom Headers>>>>: Mimics client requests or bypasses filters with custom headers.
6. >>>>โฑ๏ธ Rate Limiting>>>>: Prevents server overload by controlling request frequency and batching.
7. >>>>๐ Flexible Output>>>>: Results in JSON or plain text for seamless integration into pipelines.
8. >>>>๐ง Configurability>>>>: Adjustable settings for rate, timeouts, and workers.
9. >>>>๐ Organized Scans>>>>: Groups results by domain or URL list.
10. >>>>๐ Easy Updates>>>>: One-click update mechanism ensures the latest features.
๐ฅ >>>>Installation>>>>
# >>>>For Kali Linux (2024.4+)>>>>
# >>>>Using Virtual Environment (Recommended for Non-Kali Users)>>>>
1. >>>>Create and activate virtual environment:>>>>
2. >>>>Upgrade pip:>>>>
3. >>>>Clone the repository and install dependencies:>>>>
---
๐ >>>>Payloads & Indicators>>>>
# >>>>Linux Example>>>>
- >>>>Payloads>>>>:
- >>>>Indicators>>>>:
# >>>>Windows Example>>>>
- >>>>Payloads>>>>:
- >>>>Indicators>>>>:
---
๐งฉ >>>>Parameterized URLs>>>>
To find URLs with parameters:
---
๐ >>>>Usage Examples>>>>
# >>>>Single Domain Scan>>>>
# >>>>Multiple URLs with Custom Rate>>>>
# >>>>Advanced Usage>>>>
- Custom headers:
- JSON output:
---
โ๏ธ >>>>Important Notes>>>>
- Always activate the virtual environment before using LFIer:
- Regularly update LFIer to keep it effective against new protections:
This tool is a must-have for cybersecurity professionals looking to identify and remediate LFI vulnerabilities efficiently. Happy hunting!
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
>>>>LFIer>>>> is a powerful tool for detecting >>>>Local File Inclusion (LFI)>>>> vulnerabilities in web applications. By injecting payloads into URL parameters and analyzing responses, it efficiently identifies potential security issues. The tool is designed for flexibility, efficiency, and accuracy, even when scanning sites protected by WAFs or cloud-based defenses.
๐ >>>>Key Features>>>>
1. >>>>โก๏ธ High Performance>>>>: Async programming ensures rapid, non-blocking requests for large-scale scanning.
2. >>>>๐ Advanced Detection>>>>: Custom payloads and indicators accurately detect vulnerabilities.
3. >>>>๐ก WAF/Cloud Bypass>>>>: Simulates real browser requests to bypass security measures.
4. >>>>๐ Custom Payloads>>>>: Allows user-defined payload injection for flexibility.
5. >>>>๐ Custom Headers>>>>: Mimics client requests or bypasses filters with custom headers.
6. >>>>โฑ๏ธ Rate Limiting>>>>: Prevents server overload by controlling request frequency and batching.
7. >>>>๐ Flexible Output>>>>: Results in JSON or plain text for seamless integration into pipelines.
8. >>>>๐ง Configurability>>>>: Adjustable settings for rate, timeouts, and workers.
9. >>>>๐ Organized Scans>>>>: Groups results by domain or URL list.
10. >>>>๐ Easy Updates>>>>: One-click update mechanism ensures the latest features.
๐ฅ >>>>Installation>>>>
# >>>>For Kali Linux (2024.4+)>>>>
git clone https://github.com/Cybersecurity-Ethical-Hacker/lfier.git
cd lfier
pipx install aiohttp
pipx install colorama
pipx install tqdm
# >>>>Using Virtual Environment (Recommended for Non-Kali Users)>>>>
1. >>>>Create and activate virtual environment:>>>>
python3 -m venv venv
source venv/bin/activate
2. >>>>Upgrade pip:>>>>
pip install --upgrade pip
3. >>>>Clone the repository and install dependencies:>>>>
git clone https://github.com/Cybersecurity-Ethical-Hacker/lfier.git
cd lfier
pip install -r requirements.txt
---
๐ >>>>Payloads & Indicators>>>>
# >>>>Linux Example>>>>
- >>>>Payloads>>>>:
/..\\../..\\../etc/passwd
../../../../../etc/passwd
- >>>>Indicators>>>>:
root:x:0:0:
nobody:x:65534:
# >>>>Windows Example>>>>
- >>>>Payloads>>>>:
C:/boot.ini
- >>>>Indicators>>>>:
[boot loader]
timeout=30
---
๐งฉ >>>>Parameterized URLs>>>>
To find URLs with parameters:
paramspider -d domain.com -s 2>&1 | grep -Ei "https?://" | sort -u | httpx -silent -status-code -mc 200,201,204,401,403 > live_urls.txt
---
๐ >>>>Usage Examples>>>>
# >>>>Single Domain Scan>>>>
python lfier.py -d "https://domain.com/file.php?parameter=1234"
# >>>>Multiple URLs with Custom Rate>>>>
python lfier.py -l urls.txt -r 5
# >>>>Advanced Usage>>>>
- Custom headers:
python lfier.py -d "https://example.com" -H "User-Agent: CustomAgent"
- JSON output:
python lfier.py -l urls.txt -j -o results.json
---
โ๏ธ >>>>Important Notes>>>>
- Always activate the virtual environment before using LFIer:
source venv/bin/activate
- Regularly update LFIer to keep it effective against new protections:
python lfier.py -u
This tool is a must-have for cybersecurity professionals looking to identify and remediate LFI vulnerabilities efficiently. Happy hunting!
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHacking Search Queries :
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange
A threat intelligence sharing platform where cybersecurity professionals can access and share information about threats and vulnerabilities.
33. AlienVault OTX
An open threat intelligence platform that provides a community-driven collection of actionable cybersecurity data.
34. Honeyd
A honeypot tool for simulating different types of computer systems and services to capture network-based attacks.
35. LogRhythm
A security information and event management (SIEM) tool used for monitoring and analyzing log data for suspicious activity.
36. Snort
A widely-used open-source intrusion detection system (IDS) that analyzes network traffic for malicious activity.
37. Suricata
A high-performance IDS/IPS (Intrusion Prevention System) and network security monitoring tool used to detect and block threats in real-time.
38. ZAP (OWASP Zed Attack Proxy)
A popular open-source security testing tool used to find vulnerabilities in web applications through penetration testing.
39. Social-Engineer Toolkit (SET)
A framework for automating social engineering attacks such as phishing, credential harvesting, and exploitation.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
33. AlienVault OTX
An open threat intelligence platform that provides a community-driven collection of actionable cybersecurity data.
34. Honeyd
A honeypot tool for simulating different types of computer systems and services to capture network-based attacks.
35. LogRhythm
A security information and event management (SIEM) tool used for monitoring and analyzing log data for suspicious activity.
36. Snort
A widely-used open-source intrusion detection system (IDS) that analyzes network traffic for malicious activity.
37. Suricata
A high-performance IDS/IPS (Intrusion Prevention System) and network security monitoring tool used to detect and block threats in real-time.
38. ZAP (OWASP Zed Attack Proxy)
A popular open-source security testing tool used to find vulnerabilities in web applications through penetration testing.
39. Social-Engineer Toolkit (SET)
A framework for automating social engineering attacks such as phishing, credential harvesting, and exploitation.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
UNDERCODE TESTING
Free
๐ฆSOC Automation Matrix: Capabilities and Gaps!
A structured framework to evaluate and optimize SOC automation potential to pinpoint critical areas for automation, implement targeted strategies, and significantly enhance threat response capabilities.
The matrix is organized into categories containing various automation capabilities. Each capability includes:
โข Description: A brief overview of the capability.
โข Techniques: Technology-agnostic ideas for implementation.
โข Examples: Relevant workflow templates.
โข References: Additional research contributing to capability.
This tool offers a platform-agnostic approach and delivers an independent reference point for us to assess what security automation can achieve and plan the next steps.
Source: https://tinesio.notion.site/4fd14ccf93e7408c8faf96c5aca8c3fd?v=ec12309e0f42446e83c08565c5dc52b2
The SOC Automation Capability Matrix connects threat hunting with data analysis by automating how security data is collected, processed, and enriched.
Ref: Dr. Meisam Eslahi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A structured framework to evaluate and optimize SOC automation potential to pinpoint critical areas for automation, implement targeted strategies, and significantly enhance threat response capabilities.
The matrix is organized into categories containing various automation capabilities. Each capability includes:
โข Description: A brief overview of the capability.
โข Techniques: Technology-agnostic ideas for implementation.
โข Examples: Relevant workflow templates.
โข References: Additional research contributing to capability.
This tool offers a platform-agnostic approach and delivers an independent reference point for us to assess what security automation can achieve and plan the next steps.
Source: https://tinesio.notion.site/4fd14ccf93e7408c8faf96c5aca8c3fd?v=ec12309e0f42446e83c08565c5dc52b2
The SOC Automation Capability Matrix connects threat hunting with data analysis by automating how security data is collected, processed, and enriched.
Ref: Dr. Meisam Eslahi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Tines_io on Notion
SOC Automation Capability Matrix | Notion
The Automation Capability Matrix describes common activities which most security operations centers can automate