CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Linux Hacking Tools

Nessus– this tool can be used for Ubuntu hack, scan configuration settings, patches, and networks etc. it can be found at https://www.tenable.com/products/nessus

NMap. This tool can be used to monitor hosts that are running on the server and the services that they are utilizing. It can also be used to scan for ports. It can be found at https://nmap.org/

SARA – SARA is the acronym for Security Auditor’s Research Assistant. As the name implies, this tool can be used to audit networks against threats such as SQL Injection, XSS etc. it can be found at http://www-arc.com/sara/sara.html

The above list is not exhaustive; it gives you an idea of the tools available for Ubuntu hacking and hacking Linux systems.
First_Do_No_Harm.pdf
412.7 KB
#Research
"First, Do No Harm: Studying the manipulation of security headers in browser extensions", 2021.

]-> Fast JavaScript parser: https://github.com/acornjs/acorn
FSI_Masscan_Ransomware.pdf
40.7 MB
#Threat_Research
"Operation MaRS: Masscan Ransomware Threat Analysis Report", 2022.
Venom.zip
156.4 KB
🔥Venom is a C++ library that is meant to give an alternative way to communicate, instead of creating a socket that could be traced back to the process, it creates a new "hidden" (there is no window shown) detached edge process (edge was chosen because it is a browser that is installed on every Windows 10+ and won't raise suspicious) and stealing one of its sockets to perform the network operations.

The benefit of creating a detached browser process is that there is no danger that it will be closed accidentally by the user and the sockets exist but not communicating with any site, therefore avoiding possible collisions.
#Malware_analysis
1. Munin - Online hash checker for Virustotal and other services
https://github.com/Neo23x0/munin
2. Hunting for Attestation Signed Malware
https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
#tools
#OSINT
OctoSuite - A framework fro gathering OSINT on GitHub users, repositories and organizations
https://github.com/bellingcat/octosuite
Hardware_Trojans.pdf
4.3 MB
#tools
#Offensive_security
1. Venom - library that meant to perform evasive communication using stolen browser socket
https://github.com/Idov31/Venom
2. Pingoor - Linux Backdoor based on ICMP protocol
https://github.com/MrEmpy/Pingoor
#exploit
CVE-2022-42823:
1. Apple Safari JavaScriptCore Inspector Type Confusion
https://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion

2. CVE-2021-22015:
VMware vCenter vScalation Privilege Escalation
https://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html
💥Ban-R

•Features:
~Reports Time Delay To Secure Your Acc
~Temp Ban & Permanent Ban
~Fully Safe & Accessible
~Works Without Proxies
~Anti Virtual Machine

•Use 2013 Insta Accounts For Fast Banning

Download Link:
Click Here 👈

Password:
#CyberRatsBanR

By Cyber_Rats ❤️
51
BlueTeam.Lab

This project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab.

The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.

https://github.com/op7ic/BlueTeam.Lab

#blueteam #techniques #cybersecurity #infosec
wanderer.zip
279.5 KB
🔥Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of the AMSI as a loaded module, whether it is running as 64-bit or 32-bit as well as the privilege level of the current process.
This information is extremely helpful when building payloads catered to the ideal candidate for process injection.