CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
Aerleon a vendor agnostic firewall management system
https://ift.tt/5L72C9O

Submitted January 20, 2023 at 12:19AM by ankenyr
via reddit https://ift.tt/TFMavi7
Forwarded from 卩ro 爪Cracker
How to completely own an airline in 3 easy steps
https://ift.tt/DsZiIY6

Submitted January 20, 2023 at 07:48AM by _vavkamil_
via reddit https://ift.tt/CoDSNga
Forwarded from 卩ro 爪Cracker
​​Gold Digger

Gold Digger is a simple tool used to help quickly discover sensitive information in files recursively. Originally written to assist in rapidly searching files obtained during a penetration test.

https://github.com/ustayready/golddigger
Google Chrome “SymStealer” (CVE-2022-3656)

https://system32.ink/news-feed/p/157/
Forwarded from 卩ro 爪Cracker
spray.js
1.1 KB
🔥🔥🔥FoxitReader Precise Heap Spray 0c0c0c0c bc.
⚠️Testesd version: 9.0.1.1049
Forwarded from 卩ro 爪Cracker
Android Exploit to get a System based shell (UID 1000) on ANY Samsung Mobile Device based on CVE-2019-16253

1) Downgrade to vulnerable SamsungTTS app
2) Install exploit APK
3) Exploit vulnerability to achieve System rights
https://forum.xda-developers.com/t/system-shell-exploit-all-samsung-mobile-devices-no-bl-unlock-required.4543071/
1
#exploit
1. CVE-2022-47966:
RCE vulnerability in multiple ManageEngine (Apache Santuario (xmlsec) <=1.4.1) products
https://github.com/horizon3ai/CVE-2022-47966
]-> https://www.horizon3.ai/manageengine-cve-2022-47966-technical-deep-dive

2. CVE-2022-39955:
Charset confusion + WAF bypasses via 0days
https://terjanq.medium.com/waf-bypasses-via-0days-d4ef1f212ec

3. Microsoft Teams RCE
https://blog.pksecurity.io/2023/01/16/2022-microsoft-teams-rce.html
#Blue_Team_Techniques
1. YARA/Sigma rule to detect the exploitation of ManageEngine ServiceDesk CVE-2022-47966
https://github.com/Neo23x0/signature-base/blob/master/yara/expl_manageengine_jan23.yar
https://github.com/SigmaHQ/sigma/pull/3935/files
2. Investigate malicious Windows logon by visualizing and analyzing Windows event log
https://github.com/JPCERTCC/LogonTracer
#tools
#Cloud_Security
Gold Digger - tool used to help quickly discover sensitive information in files recursively
https://github.com/ustayready/golddigger
FRAMESHIFTER.pdf
721.1 KB
#Research
"FRAMESHIFTER: Security Implications of HTTP/2-to-HTTP/1 Conversion Anomalies", 2022.
Поисковая система You.com запустила чат-бота с искусственным интеллектом, под названием youChat 💻

Чат-бот способен отвечать на вопросы, и вести разговоры, на подобии с ботом ChatGPT, хотя и имеет значительно меньший функционал, относительно последнего. Разработчики заявляют, что добавление youChat значительно расширяет возможности поиска нужной информации в Интернете.

Так, он в состоянии помочь с простыми ответами на общие вопросы, предложением идей, перевода, обобщении текста, составлении электронных писем, а также написании кода. Тем не менее система пока находится в бета-тестировании, и разработчики не рекомендуют принимать на веру все ответы, что выдаёт бот.
#exploit
1. CVE-2022-41033:
Type confusion in Windows COM+ Event System Service

https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2022/CVE-2022-41033.html

2. CVE-2022-34718:
Dissecting and Exploiting TCP/IP RCE Vulnerability "EvilESP"
https://securityintelligence.com/posts/dissecting-exploiting-tcp-ip-rce-vulnerability-evilesp

3. CVE-2023-0297:
Pre-auth RCE in pyLoad
https://github.com/bAuh0lz/CVE-2023-0297_Pre-auth_RCE_in_pyLoad