CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
ransomwhere: a ransomware sample to test out your ransomware response strategy.
https://ift.tt/c1o67Ey

Submitted November 28, 2022 at 03:11PM by nindustries
via reddit https://ift.tt/yzC1QrP
#tools
#Red_Team_Tactics
1. A Dive into Microsoft Defender for Identity
https://www.synacktiv.com/publications/a-dive-into-microsoft-defender-for-identity.html
2. A New Way of Exploiting Jolokia RCE/JDBC Attack
https://pyn3rd.github.io/2022/11/15/A-New-Way-to-Trigger-Jolokia-Remote-Code-Execution
3. Empire - PowerShell/Python 3.x post-exploitation/adversary emulation framework
https://github.com/BC-SECURITY/Empire
#exploit
1. CVE-2022-39425:
Vulnerability in Oracle VM VirtualBox <6.1.40 (Core)
https://github.com/bob11vrdp/CVE-2022-39425

2. Analysis and exploitation of an uninitialized pointer vulnerability affecting certain TP-LINK routers
https://github.com/b1ack0wl/vulnerability-write-ups/blob/master/TP-Link/WR940N/112022/Part1.md

3. CVE-2022-22971:
Spring Framework DoS with STOMP over WebSocket
https://github.com/tchize/CVE-2022-22971
NIST.SP.800-215.pdf
1 MB
#Infosec_Standards
NIST SP 800-215: "Guide to a Secure Enterprise Network Landscape", August 5, 2022.
AUTOARMOR.pdf
1 MB
#Research
"Automatic Policy Generation for Inter-Service Access Control of Microservices", 2021.
Investigating_co-occurrences_MITRE.pdf
538.7 KB
#Research
"Investigating co-occurrences of MITRE ATT\&CK Techniques", 2022.
CPG_CHECKLIST_508c.pdf
356.1 KB
#Infosec_Standards
CISA Cybersecurity Performance Goals (CPG) Checklist

]-> Cross-Sector Cybersecurity Performance Goals 2022 (.pdf):
https://www.cisa.gov/sites/default/files/publications/2022_00092_CISA_CPG_Report_508c.pdf
🔥Mind the Gap

The week before FirstCon22, Maddie gave an internal preview of her talk("0-day In-the-Wild Exploitation in 2022…so far"). Inspired by the description of an in-the-wild vulnerability in low-level memory management code, fellow Project Zero researcher Jann Horn started auditing the ARM Mali GPU driver. Over the next three weeks, Jann found five more exploitable vulnerabilities (2325, 2327, 2331, 2333, 2334).

⚠️The vulnerabilities discussed in this blog post (CVE-2022-33917) are fixed by the upstream vendor, but at the time of publication, these fixes have not yet made it downstream to affected Android devices (including Pixel, Samsung, Xiaomi, Oppo and others). Devices with a Mali GPU are currently vulnerable.
Forwarded from 卩ro 爪Cracker
SANS_DFPS_FOR585_v3.5_1122.pdf
1.4 MB
Forwarded from 卩ro 爪Cracker
regex GitHub Dorks
/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/
👍2
Forwarded from 卩ro 爪Cracker
​​otp

One Time Password utilities Go / Golang

One Time Passwords (OTPs) are an mechanism to improve security over passwords alone. When a Time-based OTP (TOTP) is stored on a user's phone, and combined with something the user knows (Password), you have an easy on-ramp to Multi-factor authentication without adding a dependency on a SMS provider. This Password and TOTP combination is used by many popular websites including Google, GitHub, Facebook, Salesforce and many others.

The otp library enables you to easily add TOTPs to your own application, increasing your user's security against mass-password breaches and malware.

https://github.com/pquerna/otp
​​BugBountyTips

#BugBounty (Bypasses, Payloads, y más)

https://github.com/xNaughty/BugBountyTips
Are you looking for OSINT books? In the overview below you will find various books about Open Source Intelligence (OSINT), Social Media Intelligence (SOCMINT), Privacy, Hacking, Red Teaming, Blue Teaming, Brand Protection, Automation and more!
▫️ https://www.aware-online.com/en/osint-books/

Cyber security post uploader admin @hayper007