CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from Bug Bounty
🔰All Google Dorks
#bugbounty #infosec

• Operators
• Purposes
• Can be Mixed with other operators ?
• Can be used alone ?
• Does Search Work in ? : Web, Image, Groups, News

Download In More Clarity : https://bugbountyguide.org/index.php/mindmaps-cheatsheets/

Check this Out : 👆
Wi-Fi Exploitation Framework
https://github.com/D3Ext/WEF
Stealer + Clipper + Keylogger
https://github.com/Stealerium/Stealerium
JavaScript file crawler and secret finder
https://github.com/oppsec/Pinkerton
Reveals invisible links within JavaScript files
https://github.com/riza/linx
A simple CLI for converting WARC to Parquet
https://github.com/maxcountryman/warc-parquet
Web-See is Tool For Checkout Status Of Urls in Mass Its For Bug Bounty Hunters And Black Hat Hackers
https://github.com/indiancybertroops/Web-See
📡The Drone Market Environment 2022
#Red_Team_Tactics
1. Method of dumping LSASS by abusing the Windows Error Reporting service
https://github.com/deepinstinct/Lsass-Shtinkering
2. Bypass MS Graph API paging limitation and dump all user's objects using Graph API token (Illicit Grant Phishing Attack)
https://github.com/lutzenfried/OffensiveCloud/blob/4de3846faffa13d813872ffae6b990fa670dae6e/Azure/Tools/graphAPIDump.py
Stealthy_Location_Identification_Attack.pdf
1.2 MB
#Research
#5G_Network_Security
"A Stealthy Location Identification Attack Exploiting Carrier Aggregation in Cellular Networks", 2021.
❤‍🔥1