UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top 40 AI Tools You Need in 2025! ๐Ÿš€

๐ŸŽง Audio
โ—• Murf AI
โ—• Descript
โ—• Voicemaker
โ—• PlayAI .

โœ๏ธ Copywriting
โ—• Copy.ai
โ—• Jasper
โ—• Writesonic
โ—• Anyword

๐ŸŒŸ Logo
โ—• Looka
โ—• Namecheap
โ—• Canva
โ—• DesignEvolve

๐Ÿ“ˆ Marketing
โ—• HubSpot
โ—• Marketo
โ—• Active Campaign
โ—• Mailchimp

๐Ÿ“Š Productivity
โ—• Notion
โ—• ClickUp
โ—• Asana
โ—• Trello

๐Ÿ“… Meeting
โ—• Notta๏ฝœAI meeting notes & audio transcription
โ—• Otter.ai
โ—• tl;dv - AI Meeting Assistant (tldv.io)
โ—• Zoom
โ—• Microsoft Teams

๐ŸŽž Presentation
โ—• Canva Presentations
โ—• Prezi
โ—• Microsoft PowerPoint
โ—• Google Slides

๐Ÿ’ฌ Prompts
โ—• Prompt Perfect
โ—• GPT-3 Playground
โ—• AI Dungeon
โ—• CopyAI Prompts

๐ŸŽจ Design
โ—• Figma
โ—• Adobe XD
โ—• Sketch
โ—• Gravit Designer

๐Ÿค– Chatbot
โ—• Kraya
โ—• Mobile Monkey
โ—• Landbot
โ—• ManyChat

Ref: Md Riyazuddin
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Reduce Noise in Burp Suite with This Simple Trick! ๐Ÿ”ฅ

๐Ÿ’ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:

.*\.google\.com

.*\.gstatic\.com

.*\.googleapis\.com

.*\.pki\.goog

.*\.mozilla\..*

hashtag#bugbounty hashtag#bugbountytip

Ref: Het VikamHet Vikam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Routing Commands Cheatsheet
โ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธโ–ช๏ธ

1. Basic Commands

๐Ÿ”น enable - Privileged mode
๐Ÿ”น configure terminal - Global config mode
๐Ÿ”น interface <int> - Interface config
๐Ÿ”น ip address <ip> <mask> - Assign IP
๐Ÿ”น no shutdown - Enable interface

2. Static Routing

๐Ÿ”น ip route <dest> <mask> <next-hop> - Add static route
๐Ÿ”น show ip route - View routing table

3. RIP Commands

๐Ÿ”น router rip - Enable RIP
๐Ÿ”น network <net> - Add RIP networks
๐Ÿ”น no auto-summary - Disable summarization

4. OSPF Commands

๐Ÿ”น router ospf <id> - Enable OSPF
๐Ÿ”น network <ip> <mask> area <id> - Define OSPF area
๐Ÿ”น show ip ospf neighbor - View neighbors

5. EIGRP Commands

๐Ÿ”น router eigrp <AS> - Enable EIGRP
๐Ÿ”น network <net> - Add networks
๐Ÿ”น no auto-summary - Disable summarization

6. BGP Commands

๐Ÿ”น router bgp <AS> - Enable BGP
๐Ÿ”น neighbor <ip> remote-as <AS> - Add neighbor
๐Ÿ”น show ip bgp summary - View BGP status

7. Troubleshooting

๐Ÿ”น ping <ip> - Test connectivity
๐Ÿ”น traceroute <ip> - Trace packet path
๐Ÿ”น debug ip routing - Debug routing

Ref: Mahesh Girhe
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Routing Commands Cheatsheet.pdf
266.5 KB
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Free Anti Forensic Techniques Repositories #1

Anti Forensic Techniques
https://lnkd.in/dWmF3ikg

Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6

Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb

Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2

Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m

Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx

AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR

Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz

Ref: Joas A. Santos
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐  ๐’๐Ž๐‚ ๐‡๐จ๐ฆ๐ž ๐‹๐š๐› :
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.

๐Ž๐›๐ฃ๐ž๐œ๐ญ๐ข๐ฏ๐ž๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.

๐“๐ก๐ž ๐–๐จ๐ซ๐ค๐Ÿ๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.

Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.

Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.

TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.

Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.

SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.

๐“๐ž๐ฌ๐ญ๐ข๐ง๐  ๐š๐ง๐ ๐‘๐ž๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.

Thank you Mohamed Benkhirat for you nice content.


@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘OnionGPT - Have fun! ๐Ÿ˜

OnionGPT - Have fun! ๐Ÿ˜ http://oniongpt6lntsoztgylhju7nmqedlq6fjexe55z327lmxyae3nutlyad.onion/