CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
Browser Password Stealer [Source Code]

This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers. Supports chromium 80 and above.

Modules Required

To install all the required modules use the following code:

py -m pip install -r requirements.txt

or

pip3 install -r requirements.txt

Supported browsers

Chrome
Brave
Edge (Chromium)

This tools are GUI supported

https://github.com/henry-richard7/Browser-password-stealer
🥰1
Forwarded from 卩ro 爪Cracker
Entrust DataCard Leak

http://lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion/entrust.com/entrust-datacard/

magnet:?xt=urn:btih:d19daf6e690d5374b17d869c56239ab958f0ef04&dn=entrust.com&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce
Forwarded from 卩ro 爪Cracker
​​PrintNightmare (CVE-2021-34527)

This version of the PrintNightmare exploit is heavily based on the code created by Cube0x0, with the following features:

▫️ Ability to target multiple hosts.
▫️ Built-in SMB server for payload delivery, removing the need for open file shares.
▫️ Exploit includes both MS-RPRN & MS-PAR protocols (define in CMD args).
▫️ Implements @gentilkiwi's UNC bypass technique.

https://github.com/m8sec/CVE-2021-34527

Exploiting PrintNightmare (CVE-2021–34527)
https://infosecwriteups.com/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f

#cve
Forwarded from 卩ro 爪Cracker
​​Geogramint

#OSINT Geolocalization tool for Telegram

Geogramint is an OSINT tool that uses Telegram's API to find nearby users and groups. Inspired by Tejado's Telegram Nearby Map, which is no longer maintained, it aims to provide a more user-friendly alternative.

Geogramint only finds Telegram users and groups which have activated the nearby feature. Per default it is deactivated.

The tool is fully supported on Windows and partially supported on Mac OS and Linux distributions.

https://github.com/Alb-310/Geogramint
👍1
zyxel ipc camera pwn

This is a minimal proof of concept to remotely open a root shell on a Zyxel IP enabled camera. Known vulnerable models are:

▫️ Zyxel IPC-3605N
▫️ Zyxel IPC-4605N

https://github.com/hydrogen18/zyxel_ipc_camera_pwn
👍1
👏1
Free website hosting sites collection 🔥🔥
https://www.protocolnick.me/2022/02/free-website-hosting-sites.html
Updates On Hackbyte Forum:-

1. PrintNightmare (CVE-2021-34527)
2. START.ru Leak
3. SEC Sonora Mexico DataBase Leak
4. mpa.zj.gov.cn Food and Drug Administration Computers files
5. Moriarty-Project: This tool gives information about the phone number that you entered
6. Discord-QR-Token-Logger: Utilises Discord QR Login Feature To Create a Token Logger Scannable QR code
7. Elevator - Allows to bypass the UAC and spawn an elevated process with full administrator privileges.
8. Linksys E1200 buffer overflow vulnerability
9. GrabAccess - A tool for bypassing Windows login passwords and Bitlocker.
10. FiberHome VDSL2 Modem HG150-Ub_V3.0 (PTCL) – Admin Credentials are submitted in the URL
11. Gel4y Mini Shell Backdoor
12. Wpushell
13. r77 Rootkit
14. autodeauth - A tool built to automatically deauth local networks

👉🏻👉🏻All Updates On :- https://bit.ly/3yRyah3 👈🏻👈🏻
👍3
📣📢 Try new advance #pentesting challenges on @Vulnmachines 👩‍💻

No VPN required
✔️ Free Access
✔️ Access the lab using your favorite browser

Challenge Name: Family Man 🕵️👩‍💻
Checkout: https://www.vulnmachines.com

#infosec #cybersecurity #ctf
👍6