CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from Cyber security intelligent program
🟥10k🔠 non stop Post uploading soon this Last month

Happy
💻 cyber security intelligent 💻
Please open Telegram to view this post
VIEW IN TELEGRAM
FCracker - is a command-line tool designed to brute force encrypted files like zip, 7z, rar, pdf, gpg etc.

▪️https://github.com/TarunYenni/FCracker
VTI_Cheatsheet.pdf
946.6 KB
#Infographics
"VT Intelligence Cheat Sheet", 2022.
NIST.SP800_160v1r1.pdf
7.8 MB
#Infosec_Standards
NIST SP 800-160v1r1:
"Engineering Trustworthy Secure Systems", November 2022.
​​ZoneAlarmEoP

Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV

https://github.com/Wh04m1001/ZoneAlarmEoP
🔥🔥🔥Type confusion vulnerability(CVE-2022-42823) exists in the Apple Safari JSC Inspector(Root Cause Analysis + PoC).

A Type confusion vulnerability exists in the Apple Safari JSC Inspector. This issue causes Memory Corruption due to Type confusion. A victim must open an arbitrary generated HTML file to trigger this vulnerability.

PoC:
<script>
let object = {};
Object.prototype.__defineSetter__('type', function() {
object.x = {};
object[0] = object.x;
});
</script>

🛡Fixed in: macOS 13, tvOS 16.1, iOS 16.1 & iPadOS 16, Safari 16.1, watchOS 9.1.
🔥Linux Kernel: Exploiting a Netfilter UAF in kmalloc-cg

We describe a method to exploit a UAF in the Linux kernel when objects are allocated in a specific slab cache, namely the kmalloc-cg series of SLUB caches used for cgroups. This vulnerability is assigned CVE-2022-32250 and exists in Linux kernel versions 5.18.1 and prior.
Forwarded from 卩ro 爪Cracker
This media is not supported in your browser
VIEW IN TELEGRAM
👍2👏1
💥In-Memory Execution in macOS: the Old and the New

As part of our work, it’s often interesting to try to find possible avenues of attack that bypass detections on EDR products. On macOS, EDR products specifically collect telemetry from fork and exec syscalls. macOS has alternative ways of executing code, which side-step these system calls by executing code directly in-memory.

In this writeup, we touch on all 3 aforementioned APIs and then create a PoC loader which uses NSCreateObjectFileImageFromFile and CFBundleCreate to load a bundle from disk and execute it.