Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆTop 40 AI Tools You Need in 2025! ๐
๐ง Audio
โ Murf AI
โ Descript
โ Voicemaker
โ PlayAI .
โ๏ธ Copywriting
โ Copy.ai
โ Jasper
โ Writesonic
โ Anyword
๐ Logo
โ Looka
โ Namecheap
โ Canva
โ DesignEvolve
๐ Marketing
โ HubSpot
โ Marketo
โ Active Campaign
โ Mailchimp
๐ Productivity
โ Notion
โ ClickUp
โ Asana
โ Trello
๐ Meeting
โ Notta๏ฝAI meeting notes & audio transcription
โ Otter.ai
โ tl;dv - AI Meeting Assistant (tldv.io)
โ Zoom
โ Microsoft Teams
๐ Presentation
โ Canva Presentations
โ Prezi
โ Microsoft PowerPoint
โ Google Slides
๐ฌ Prompts
โ Prompt Perfect
โ GPT-3 Playground
โ AI Dungeon
โ CopyAI Prompts
๐จ Design
โ Figma
โ Adobe XD
โ Sketch
โ Gravit Designer
๐ค Chatbot
โ Kraya
โ Mobile Monkey
โ Landbot
โ ManyChat
Ref: Md Riyazuddin
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ง Audio
โ Murf AI
โ Descript
โ Voicemaker
โ PlayAI .
โ๏ธ Copywriting
โ Copy.ai
โ Jasper
โ Writesonic
โ Anyword
๐ Logo
โ Looka
โ Namecheap
โ Canva
โ DesignEvolve
๐ Marketing
โ HubSpot
โ Marketo
โ Active Campaign
โ Mailchimp
๐ Productivity
โ Notion
โ ClickUp
โ Asana
โ Trello
๐ Meeting
โ Notta๏ฝAI meeting notes & audio transcription
โ Otter.ai
โ tl;dv - AI Meeting Assistant (tldv.io)
โ Zoom
โ Microsoft Teams
๐ Presentation
โ Canva Presentations
โ Prezi
โ Microsoft PowerPoint
โ Google Slides
๐ฌ Prompts
โ Prompt Perfect
โ GPT-3 Playground
โ AI Dungeon
โ CopyAI Prompts
๐จ Design
โ Figma
โ Adobe XD
โ Sketch
โ Gravit Designer
๐ค Chatbot
โ Kraya
โ Mobile Monkey
โ Landbot
โ ManyChat
Ref: Md Riyazuddin
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆReduce Noise in Burp Suite with This Simple Trick! ๐ฅ
๐ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
hashtag#bugbounty hashtag#bugbountytip
Ref: Het VikamHet Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ก Just add the following patterns in Burp Suite under Proxy > Options > TLS Pass Through:
.*\.google\.com
.*\.gstatic\.com
.*\.googleapis\.com
.*\.pki\.goog
.*\.mozilla\..*
hashtag#bugbounty hashtag#bugbountytip
Ref: Het VikamHet Vikam
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆRouting Commands Cheatsheet
โช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธ
1. Basic Commands
๐น enable - Privileged mode
๐น configure terminal - Global config mode
๐น interface <int> - Interface config
๐น ip address <ip> <mask> - Assign IP
๐น no shutdown - Enable interface
2. Static Routing
๐น ip route <dest> <mask> <next-hop> - Add static route
๐น show ip route - View routing table
3. RIP Commands
๐น router rip - Enable RIP
๐น network <net> - Add RIP networks
๐น no auto-summary - Disable summarization
4. OSPF Commands
๐น router ospf <id> - Enable OSPF
๐น network <ip> <mask> area <id> - Define OSPF area
๐น show ip ospf neighbor - View neighbors
5. EIGRP Commands
๐น router eigrp <AS> - Enable EIGRP
๐น network <net> - Add networks
๐น no auto-summary - Disable summarization
6. BGP Commands
๐น router bgp <AS> - Enable BGP
๐น neighbor <ip> remote-as <AS> - Add neighbor
๐น show ip bgp summary - View BGP status
7. Troubleshooting
๐น ping <ip> - Test connectivity
๐น traceroute <ip> - Trace packet path
๐น debug ip routing - Debug routing
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธโช๏ธ
1. Basic Commands
๐น enable - Privileged mode
๐น configure terminal - Global config mode
๐น interface <int> - Interface config
๐น ip address <ip> <mask> - Assign IP
๐น no shutdown - Enable interface
2. Static Routing
๐น ip route <dest> <mask> <next-hop> - Add static route
๐น show ip route - View routing table
3. RIP Commands
๐น router rip - Enable RIP
๐น network <net> - Add RIP networks
๐น no auto-summary - Disable summarization
4. OSPF Commands
๐น router ospf <id> - Enable OSPF
๐น network <ip> <mask> area <id> - Define OSPF area
๐น show ip ospf neighbor - View neighbors
5. EIGRP Commands
๐น router eigrp <AS> - Enable EIGRP
๐น network <net> - Add networks
๐น no auto-summary - Disable summarization
6. BGP Commands
๐น router bgp <AS> - Enable BGP
๐น neighbor <ip> remote-as <AS> - Add neighbor
๐น show ip bgp summary - View BGP status
7. Troubleshooting
๐น ping <ip> - Test connectivity
๐น traceroute <ip> - Trace packet path
๐น debug ip routing - Debug routing
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
Routing Commands Cheatsheet.pdf
266.5 KB
๐ฆVideo - Unpatched Critical Vulnerability in Snapchat's Support System
https://dailycve.com/critical-vulnerability-in-snapchats-support-system-video/
https://dailycve.com/critical-vulnerability-in-snapchats-support-system-video/
DailyCVE
Critical Vulnerability in Snapchat's Support System Video - DailyCVE
Uncovered a significant issue in Snapchatโs Help Center form that allows attackers to send emails using Snapchatโs official support email [โฆ]
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆFree Anti Forensic Techniques Repositories #1
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A. Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Anti Forensic Techniques
https://lnkd.in/dWmF3ikg
Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6
Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb
Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2
Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m
Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx
AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR
Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz
Ref: Joas A. Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆ๐๐ฎ๐ข๐ฅ๐๐ข๐ง๐ ๐๐๐ ๐๐จ๐ฆ๐ ๐๐๐ :
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.
๐๐๐ฃ๐๐๐ญ๐ข๐ฏ๐๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.
๐๐ก๐ ๐๐จ๐ซ๐ค๐๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.
Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.
Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.
TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.
Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.
SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.
๐๐๐ฌ๐ญ๐ข๐ง๐ ๐๐ง๐ ๐๐๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.
Thank you Mohamed Benkhirat for you nice content.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A Security Operations Center (SOC) is vital for any organization. In this project, I designed and deployed a fully functional SOC home lab using open-source tools: Wazuh, ELK Stack, TheHive, and Cortex.
๐๐๐ฃ๐๐๐ญ๐ข๐ฏ๐๐ฌ :
Ensure proactive monitoring and efficient incident management.
Simulate attack scenarios to test detection and response capabilities.
๐๐ก๐ ๐๐จ๐ซ๐ค๐๐ฅ๐จ๐ฐ :
Wazuh Agents: Collect security data from various systems (Linux and Windows) and send it to the Wazuh Manager.
Wazuh (SIEM): Transfers data via Filebeat to Elasticsearch for storage and analysis.
Kibana: Visualizes data through dashboards with the Wazuh plugin for real-time monitoring.
TheHive (Incident Management Platform): Manages incidents using data from the Wazuh Manager.
Cortex (Automated Analysis Engine): Automates analyses and integrates with VirusTotal for suspicious file evaluation.
SOC Analyst: Utilizes these tools collectively to monitor systems, analyze incidents, and respond effectively to security threats.
๐๐๐ฌ๐ญ๐ข๐ง๐ ๐๐ง๐ ๐๐๐ฌ๐ฎ๐ฅ๐ญ๐ฌ :
To validate the lab's performance, I executed multiple attack scenarios to ensure the tools could detect, analyze, and respond effectively. Example scenarios include:
+ Malware detection: Identifying malicious files and responding appropriately.
+ SQL injection attack detection: Detecting and mitigating database attack attempts.
Thank you Mohamed Benkhirat for you nice content.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOnionGPT - Have fun! ๐
OnionGPT - Have fun! ๐ http://oniongpt6lntsoztgylhju7nmqedlq6fjexe55z327lmxyae3nutlyad.onion/
OnionGPT - Have fun! ๐ http://oniongpt6lntsoztgylhju7nmqedlq6fjexe55z327lmxyae3nutlyad.onion/