CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
#Malware_analysis
1. Munin - Online hash checker for Virustotal and other services
https://github.com/Neo23x0/munin
2. Hunting for Attestation Signed Malware
https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
#tools
#OSINT
OctoSuite - A framework fro gathering OSINT on GitHub users, repositories and organizations
https://github.com/bellingcat/octosuite
Hardware_Trojans.pdf
4.3 MB
#tools
#Offensive_security
1. Venom - library that meant to perform evasive communication using stolen browser socket
https://github.com/Idov31/Venom
2. Pingoor - Linux Backdoor based on ICMP protocol
https://github.com/MrEmpy/Pingoor
#exploit
CVE-2022-42823:
1. Apple Safari JavaScriptCore Inspector Type Confusion
https://ssd-disclosure.com/apple-safari-javascriptcore-inspector-type-confusion

2. CVE-2021-22015:
VMware vCenter vScalation Privilege Escalation
https://packetstormsecurity.com/files/170116/VMware-vCenter-vScalation-Privilege-Escalation.html
💥Ban-R

•Features:
~Reports Time Delay To Secure Your Acc
~Temp Ban & Permanent Ban
~Fully Safe & Accessible
~Works Without Proxies
~Anti Virtual Machine

•Use 2013 Insta Accounts For Fast Banning

Download Link:
Click Here 👈

Password:
#CyberRatsBanR

By Cyber_Rats ❤️
51
BlueTeam.Lab

This project contains a set of Terraform and Ansible scripts to create an orchestrated BlueTeam Lab.

The goal of this project is to provide the red and blue teams with the ability to deploy an ad-hoc detection lab to test various attacks and forensic artifacts on the latest Windows environment and then to get a 'SOC-like' view into generated data.

https://github.com/op7ic/BlueTeam.Lab

#blueteam #techniques #cybersecurity #infosec
wanderer.zip
279.5 KB
🔥Wanderer is an open-source program that collects information about running processes. This information includes the integrity level, the presence of the AMSI as a loaded module, whether it is running as 64-bit or 32-bit as well as the privilege level of the current process.
This information is extremely helpful when building payloads catered to the ideal candidate for process injection.
🔥🔥🔥MeshyJSON: A TP-Link tdpServer JSON Stack Overflow

This blog post describes a vulnerability found and exploited in November 2022 by NCC Group. The target was the TP-Link AX1800 WiFi 6 Router (Archer AX21). It was running hardware version 3.6 and firmware version 1.1.1 (Archer AX21(US)_V3.6_1.1.1 Build 20220603). The vulnerability was patched on 2nd of December 2022 with firmware version 1.1.3 (Archer AX21(US)_V3.6_1.1.3 Build 20221125).
|Exploit Notes|

📑Exploit Notes github repo

Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTF.

💾File Upload Attack
💾Java Pentesting
💾RE with Rizin
💾Android Pentesting
💾Pug Pentesting
💾PE Analysis
💾RE
💾IMINT and GEOINT
💾32-bit ARM Assembly
💾OSINT
💾x86 Assembly
💾Malware Analysis
💾BOF Attack