CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠
👍1
Сайт пункта подвергся киберсокрушению😏👍‌‌

Translation: ru-en
The site of the point was cyber-crashed😏👍‌‌
📌Добрый вечер, КиберАрмия🇷🇺
Пробуем положить усраинский свиносервис для поиска работы, призывающий создавать Call-центры для обзвонов Российских государственных учреждений в целях сообщения ложной информации об их минировании!

URL: http://trudbox.com.ua/
IP: 85.17.141.222
IP: 88.85.94.39

Начинаем⚠️
Мы шикарны👄
Неплохо поработали💯
А свиньи как всегда идут
🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️🏃‍♂️👍
Forwarded from Cyber security intelligent program
𝘾𝙍𝙔𝙋𝙏𝙊 𝙊𝙎𝙄𝙉𝙏:

BTC-ETH-XRP-BCH-LTC-XLM-DASH-ZEC-XMR-TON (Blockchain)
Google Dorks (Change Wallet)
blockchair (Explorer) + Chrome
breadcrumbs (Visualization) + Chrome
shard (Visualization)
blockpath (Visualization)
oxt (Visualization)
graphsense (Visualization)
ethtective (Visualization ETH)
walletexplorer (Grouping)
bitinfocharts (Grouping)
bitcoinabuse (Abuse)
bitcoinwhoswho (Abuse)
checkbitcoinaddress (Abuse)
scamalert (Abuse)
cryptscam (Abuse)
ransomwhe (Abuse)
badbitcoin (Abuse)
bitcoinais (Abuse)
cryptoblacklist (Abuse)
bitrankverified (Scoring)
vivigle (Scoring)
antinalysis (Scoring TOR)
cryptocurrencyalerting (Monitoring)
cryptotxalert (Monitoring)
kycp (Block Analysis)
blockstream (Block Analysis)
fragment (TON market)
btcrecover (Wallet Brute)
Forwarded from Deadly malware xp
#Red_Team_Tactics
1. Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime
https://github.com/D1rkMtr/UnhookingPatch
2. A new AMSI Bypass technique using .NET ALI Call Hooking
https://github.com/pracsec/AmsiBypassHookManagedAPI
3. Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID
https://github.com/D1rkMtr/FilelessNtdllReflection
1
Forwarded from Deadly malware xp
#Blue_Team_Techniques
1. Recognizing the APT groups most likely responsible for a cybersecurity incident from the MITRE ATT&CK techniques in the incident report of the incident
https://gitlab.com/bontchev/whodunit
2. Open source tool to aid in SOC investigations
https://github.com/zdhenard42/SOC-Multitool
Forwarded from Deadly malware xp
IPv6_security.pdf
14.3 MB
#Whitepaper
"IPv6 Security Guide", 2022.
👍1
Forwarded from Deadly malware xp
👍1