CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
The Ultimate TOP 50 FREE Cyber Labs Resources in 2022
by RALFKAIROS

Alert to win - https://alf.nu/alert1
Attack-Defense - https://attackdefense.com
Bancocn - https://bancocn.com
Certified Secure - https://lnkd.in/gBKK-i-s
CMD Challenge - https://cmdchallenge.com
CryptoHack - https://cryptohack.org/
CTF Komodo Security - https://ctf.komodosec.com
Ctftime - https://ctftime.org/
Cyberdefenders - https://lnkd.in/gCf8v4Ju
CyberSecLabs - https://lnkd.in/gmyzMXju
EchoCTF - https://echoctf.red/
Explotation Education - https://exploit.education
Google CTF - https://lnkd.in/e46drbz8
Hack The Box - https://lnkd.in/ggfAMdQ8
Hackaflag BR - https://hackaflag.com.br/
Hacker Security - https://lnkd.in/gJbSaY3f
Hacker101 - https://ctf.hacker101.com
Hacking-Lab - https://hacking-lab.com/
Hacksplaining - https://lnkd.in/gVd9dNkK
HackTheBox - https://www.hackthebox.com
Hackthis - https://www.hackthis.co.uk
HackXpert - https://hackxpert.com/
HSTRIKE - https://hstrike.com
ImmersiveLabs - https://immersivelabs.com
LetsDefend- https://letsdefend.io/
NewbieContest - https://lnkd.in/gZ4UjDhy
OSBOXES - http://www.osboxes.org/
OverTheWire - http://overthewire.org
Penetration Testing Practice Labs - https://lnkd.in/grQev9Kk
Pentestlab - https://pentesterlab.com
PicoCTF - https://picoctf.com
PortSwigger Web Security Academy - https://lnkd.in/gAPq2ezr
Practical Pentest Labs - https://lnkd.in/gUSqv6xS
Pwn college - https://dojo.pwn.college/
PWNABLE - https://lnkd.in/gNcyqG64
RangeForce - https://lnkd.in/gGy3feqt
Root in Jail - http://rootinjail.com
Root-Me - https://www.root-me.org
SANS Challenger - https://lnkd.in/gG-5_ZPF
SmashTheStack - https://lnkd.in/gMFNTURc
TCM Security - https://lnkd.in/gbQinqvf
The Cryptopals Crypto Challenges - https://cryptopals.com
Try Hack Me - https://tryhackme.com
Vulnhub - https://www.vulnhub.com
Vulnmachines https://vulnmachines.com/
W3Challs - https://w3challs.com
WeChall - http://www.wechall.net
Zenk-Security - https://lnkd.in/g_y_p5ha
Webgoat - https://lnkd.in/gjsgegYw

if you recommand websites we missed, please share them in the comments by
Looking_Beyond_IoCs.pdf
1 MB
#Research
"Looking Beyond IoCs: Automatically Extracting Attack Patterns from External CTI", 2022.
]-> Repo: https://github.com/aiforsec22/IEEEEuroSP23
Fingerprinting_Browser_Ext.pdf
996.9 KB
#Threat_Research
"The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions", 2022.
]-> Tool/Repo: https://github.com/kostassolo/dangers-of-human-touch
OpenVPN_fp.pdf
11.6 MB
#Research
"OpenVPN is Open to VPN Fingerprinting", 2022.

]-> Network traffic classification library:
https://github.com/LibtraceTeam/libprotoident
Python3.pdf
17.1 MB
#Tech_book
"Python 3: The Comprehensive Guide", 2022.
Рекламные идентификаторы (ID) прячутся в коде вебсайта (в Chrome комбинацией клавиш - CTRL+U):

AdSense: Pub- или ca-pub
Analytics: UA-
Amazon: &tag=
AddThis: #pubid / pubid
Metrika: mc.yandex / ym
Rambler: top100
Mail.ru: Top.Mail.Ru

Сервисы поиска рекламных идентификаторов:
blacklight (Search AD)
urlscan (Search AD)
spiderfoot (Search AD)

Поиск совпадений рекламных идентификаторов:
spyonweb (Reverse AD)
shodan (Reverse AD)
osint.sh (Reverse AD)
analyzeid (Reverse AD)
dnslytics (Reverse AD)
intelx (Reverse AD)

Доступ к чужой статистике:
https://metrika.yandex.ru/dashboard?id=ID
https://top100.rambler.ru/search?query=ID
https://top.mail.ru/visits?id=ID

Translation: ru-en
Advertising identifiers (ID) are hidden in the website code (in Chrome, the key combination is CTRL + U):

AdSense: Pub- or ca-pub
Analytics: UA-
Amazon: &tag=
AddThis: #pubid / pubid
Metrika: mc.yandex / ym
Rambler: top100
Mail.ru: Top.Mail.Ru

Search services for advertising identifiers:
├blacklight (Search AD)
├urlscan (Search AD)
└spiderfoot (Search AD)

Searching for Advertising ID Matches:
├spyonweb (Reverse AD)
├shodan (Reverse AD)
├osint.sh (Reverse AD)
├analyzeid (Reverse AD)
├dnslytics (Reverse AD)
└intelx (Reverse AD)

Access to someone else's statistics:
https://metrika.yandex.ru/dashboard?id=ID
https://top100.rambler.ru/search?query=ID
https://top.mail.ru/visits?id=ID
👍3
This media is not supported in your browser
VIEW IN TELEGRAM
Free travel with contactless payment

A SMA
LL vulnerability in the fare scheme in the subway and social transport. 100% works with Apple Pay (I can't test Android Pay). The essence of the scheme is simple to impossibility.
Would need:
1. Apple smartphone with Apple Pay support
2. Debit card with zero balance (less than the fare in your area (I have 28r))
Progress of work (on the example of the subway):
1. We go down to the subway
2. We pay through a turnstile with a contactless payment terminal
3. There is no money, but you der ... "ahem" for the first time they will let you through, the card will be sent to an emergency
4. But because payment went through Apple Pay, card emulation, it is this emulation code that gets into the emergency situation (it is different for each card)
5. We bind the card to the AP again, the code changes
6. Next time start from point 1‌‌
👍3
Кто работает по Китаю вот полный рессурс по проверки и пробиву всех данных.‌‌

Translation: ru-en
Who works in China, here is a complete resource for checking and breaking through all the data.‌‌
( Profile @hayper007 tools lab profile https://start.me/u/kxEL4L millions tools available Here)
Open this link create account and enjoy ☺️🥲
👍2
Атака на телефоный номер пользователя‌‌

Translation: ru-en
Attack on the user's phone number‌‌
👍2