Creating Pixel Art with Math and Code: A Deep Dive into GLSL Shaders
https://undercodetesting.com/creating-pixel-art-with-math-and-code-a-deep-dive-into-glsl-shaders/
@Undercode_testing
https://undercodetesting.com/creating-pixel-art-with-math-and-code-a-deep-dive-into-glsl-shaders/
@Undercode_testing
Undercode Testing
Creating Pixel Art with Math and Code: A Deep Dive into GLSL Shaders - Undercode Testing
Source code: https://lnkd.in/e4s_3397 In this article, we explore the fascinating world of creating pixel art using mathematical algorithms and code, [β¦]
From Backend Engineer to βFigure-It-Outβ Engineer β 4 Days at a Startup
https://undercodetesting.com/from-backend-engineer-to-figure-it-out-engineer-4-days-at-a-startup/
@Undercode_testing
https://undercodetesting.com/from-backend-engineer-to-figure-it-out-engineer-4-days-at-a-startup/
@Undercode_testing
Undercode Testing
From Backend Engineer to βFigure-It-Outβ Engineer β 4 Days at a Startup - Undercode Testing
In the fast-paced world of startups, roles are often fluid, and responsibilities can extend far beyond the initial job description. [β¦]
π ICMP & Data Exfiltration: How Attackers Use ICMP for Data Theft
https://undercodetesting.com/icmp-data-exfiltration-how-attackers-use-icmp-for-data-theft/
@Undercode_testing
https://undercodetesting.com/icmp-data-exfiltration-how-attackers-use-icmp-for-data-theft/
@Undercode_testing
Undercode Testing
ICMP & Data Exfiltration: How Attackers Use ICMP for Data Theft - Undercode Testing
ICMP (Internet Control Message Protocol) is commonly used by network administrators to check connectivity between devices. However, attackers can exploit [β¦]
π Everything I Learned About Prompt Injection Attacks in the Last 2 Years
https://undercodetesting.com/everything-i-learned-about-prompt-injection-attacks-in-the-last-2-years/
@Undercode_testing
https://undercodetesting.com/everything-i-learned-about-prompt-injection-attacks-in-the-last-2-years/
@Undercode_testing
Undercode Testing
Everything I Learned About Prompt Injection Attacks in the Last 2 Years - Undercode Testing
https://devanshbatham.hashnode.dev/prompt-injection-attacks-for-dummies Prompt injection attacks are a critical vulnerability in AI systems, particularly those leveraging large language models (LLMs). These attacks [β¦]
Penetration Testing and SQL Injection: A Practical Guide
https://undercodetesting.com/penetration-testing-and-sql-injection-a-practical-guide/
@Undercode_testing
https://undercodetesting.com/penetration-testing-and-sql-injection-a-practical-guide/
@Undercode_testing
Undercode Testing
Penetration Testing and SQL Injection: A Practical Guide - Undercode Testing
In a recent penetration testing session, a critical SQL Injection (SQLI) vulnerability was identified in a web application. SQL Injection [β¦]
π How I Passed the CBBH [Certified Bug #Bounty Hunter] Certification from HackTheBox
https://undercodetesting.com/how-i-passed-the-cbbh-certified-bug-bounty-hunter-certification-from-hackthebox/
@Undercode_testing
https://undercodetesting.com/how-i-passed-the-cbbh-certified-bug-bounty-hunter-certification-from-hackthebox/
@Undercode_testing
Undercode Testing
How I Passed the CBBH [Certified Bug Bounty Hunter] Certification from HackTheBox - Undercode Testing
In this review, I share a comprehensive analysis of the CBBH certification, covering the following aspects: β The training π [β¦]
π¨ The Rise in CVEs and WordPress Security: A Deep Dive
https://undercodetesting.com/the-rise-in-cves-and-wordpress-security-a-deep-dive/
@Undercode_testing
https://undercodetesting.com/the-rise-in-cves-and-wordpress-security-a-deep-dive/
@Undercode_testing
Undercode Testing
The Rise in CVEs and WordPress Security: A Deep Dive - Undercode Testing
The rise in Common Vulnerabilities and Exposures (CVEs) has been a significant topic in the cybersecurity community, particularly within the [β¦]
π‘οΈ Rapid Response to Cybersecurity Vulnerabilities: Insights from Black Basta Chat Logs
https://undercodetesting.com/rapid-response-to-cybersecurity-vulnerabilities-insights-from-black-basta-chat-logs/
@Undercode_testing
https://undercodetesting.com/rapid-response-to-cybersecurity-vulnerabilities-insights-from-black-basta-chat-logs/
@Undercode_testing
Undercode Testing
Rapid Response to Cybersecurity Vulnerabilities: Insights from Black Basta Chat Logs - Undercode Testing
One insight we can gather from the Black Basta chat logs is how quickly threat actors respond to newly published [β¦]
π‘οΈ A Community-Driven Cybersecurity Resources and Tools Hub
https://undercodetesting.com/a-community-driven-cybersecurity-resources-and-tools-hub/
@Undercode_testing
https://undercodetesting.com/a-community-driven-cybersecurity-resources-and-tools-hub/
@Undercode_testing
Undercode Testing
A Community-Driven Cybersecurity Resources and Tools Hub - Undercode Testing
A centralized platform offering a diverse collection of tools, resources, and educational materials tailored for cybersecurity professionals and learners: Learning [β¦]
π¨ Prioritizing Vulnerability Management: A Practical Approach
https://undercodetesting.com/prioritizing-vulnerability-management-a-practical-approach/
@Undercode_testing
https://undercodetesting.com/prioritizing-vulnerability-management-a-practical-approach/
@Undercode_testing
Undercode Testing
Prioritizing Vulnerability Management: A Practical Approach - Undercode Testing
In the realm of cybersecurity, the common directive to βfix all high and critical vulnerabilities in 30 daysβ is not [β¦]
Exploring LDAP and ADWS at BlueHatIL
https://undercodetesting.com/exploring-ldap-and-adws-at-bluehatil/
@Undercode_testing
https://undercodetesting.com/exploring-ldap-and-adws-at-bluehatil/
@Undercode_testing
Undercode Testing
Exploring LDAP and ADWS at BlueHatIL - Undercode Testing
URL: https://lnkd.in/djRaG9uJ Practice Verified Codes and Commands: 1. LDAP Search Command: ldapsearch -x -h ldap.example.com -b "dc=example,dc=com" "(objectClass=*)" This command [β¦]
π Major Web Vulnerabilities: A Comprehensive Guide
https://undercodetesting.com/major-web-vulnerabilities-a-comprehensive-guide/
@Undercode_testing
https://undercodetesting.com/major-web-vulnerabilities-a-comprehensive-guide/
@Undercode_testing
Undercode Testing
Major Web Vulnerabilities: A Comprehensive Guide - Undercode Testing
I found an interesting resource that provides information on major web vulnerabilities. The unique feature of this platform is that [β¦]
π‘οΈ Mastering SCP: Secure File Transfer with OpenSSH
https://undercodetesting.com/mastering-scp-secure-file-transfer-with-openssh/
@Undercode_testing
https://undercodetesting.com/mastering-scp-secure-file-transfer-with-openssh/
@Undercode_testing
Undercode Testing
Mastering SCP: Secure File Transfer with OpenSSH - Undercode Testing
SCP (Secure Copy Protocol) is a command-line utility provided by the OpenSSH suite, enabling secure file transfers between a local [β¦]
π§ ShadowDumper V20: Advanced LSASS Memory Dumping Tool for Red Teaming
https://undercodetesting.com/shadowdumper-v20-advanced-lsass-memory-dumping-tool-for-red-teaming/
@Undercode_testing
https://undercodetesting.com/shadowdumper-v20-advanced-lsass-memory-dumping-tool-for-red-teaming/
@Undercode_testing
Undercode Testing
ShadowDumper V20: Advanced LSASS Memory Dumping Tool for Red Teaming - Undercode Testing
π ShadowDumper V2.0 is now available with enhanced stealth features, making it a must-have tool for penetration testers and red [β¦]
Automating Response with SOAR and EDR - LimaCharlie Setup
https://undercodetesting.com/automating-response-with-soar-and-edr-limacharlie-setup/
@Undercode_testing
https://undercodetesting.com/automating-response-with-soar-and-edr-limacharlie-setup/
@Undercode_testing
Undercode Testing
Automating Response with SOAR and EDR - LimaCharlie Setup - Undercode Testing
Gain exposure to SOAR and EDR tools and use cases by building out this SOAR EDR lab documented on my [β¦]
π‘οΈ Cheat Sheet for Designing Secure Systems
https://undercodetesting.com/cheat-sheet-for-designing-secure-systems/
@Undercode_testing
https://undercodetesting.com/cheat-sheet-for-designing-secure-systems/
@Undercode_testing
Undercode Testing
Cheat Sheet for Designing Secure Systems - Undercode Testing
In todayβs digital landscape, security isnβt optionalβitβs essential! Whether youβre a cybersecurity professional, developer, or IT administrator, understanding key security [β¦]
π¨ Basic Vulnerability Scanning Using #Nmap on #Kali Linux
https://undercodetesting.com/basic-vulnerability-scanning-using-nmap-on-kali-linux/
@Undercode_testing
https://undercodetesting.com/basic-vulnerability-scanning-using-nmap-on-kali-linux/
@Undercode_testing
Undercode Testing
Basic Vulnerability Scanning Using Nmap on Kali Linux - Undercode Testing
In this article, we explore basic vulnerability scanning using Nmap on Kali Linux. The focus is on scanning for open [β¦]
π¨ Real-World Cybersecurity Vulnerabilities and Exploits in VULN-BANK
https://undercodetesting.com/real-world-cybersecurity-vulnerabilities-and-exploits-in-vuln-bank/
@Undercode_testing
https://undercodetesting.com/real-world-cybersecurity-vulnerabilities-and-exploits-in-vuln-bank/
@Undercode_testing
Undercode Testing
Real-World Cybersecurity Vulnerabilities and Exploits in VULN-BANK - Undercode Testing
Al-Amir Badmus, a Senior Application Security Engineer, recently presented a live hacking demo of VULN-BANK, a vulnerable banking application he [β¦]
π‘οΈ The History of Intelligence: The Crusades - A Cybersecurity Perspective
https://undercodetesting.com/the-history-of-intelligence-the-crusades-a-cybersecurity-perspective/
@Undercode_testing
https://undercodetesting.com/the-history-of-intelligence-the-crusades-a-cybersecurity-perspective/
@Undercode_testing
Undercode Testing
The History of Intelligence: The Crusades - A Cybersecurity Perspective - Undercode Testing
Available Platforms: Spotify YouTube Apple Deezer Amazon What Undercode Say: The intersection of history and cybersecurity offers a unique lens [β¦]
π Tales from the OT Trenches #2 - SOC without OT Knowledge
https://undercodetesting.com/tales-from-the-ot-trenches-2-soc-without-ot-knowledge/
@Undercode_testing
https://undercodetesting.com/tales-from-the-ot-trenches-2-soc-without-ot-knowledge/
@Undercode_testing
Undercode Testing
Tales from the OT Trenches #2 - SOC without OT Knowledge - Undercode Testing
In the realm of cybersecurity, the convergence of IT (Information Technology) and OT (Operational Technology) is becoming increasingly inevitable. However, [β¦]