CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
SQLi Hunter v2 is a python program that checks for SQL (and Blind) injection vulnerability in URL’s. The program is designed to be easy to use, practical and beneficial. The intention of this tool is to include it in your ethical Bug Bounty Hunting methodology. Please do not use this tool on any website without having its permission.

https://system32.ink/news-feed/p/175/
#Offensive_security
1. Cobalt Strike Beacon Object File for kernel exploitation using AMD's Ryzen Master Driver (version 17)
https://github.com/tijme/amd-ryzen-master-driver-v17-exploit
2. A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
#Analytics
Cybersecurity Trends Q1/23:

⬆️ Pwd spraying/creds stuffing;
⬆️ Phishing w/ new file types, eg .one, .iso, .lnk;
⬆️ Rust malware / loaders (+Go +Nim +Zig);
⬆️ Sliver implants;
⬆️ Abused legit RA software;
⬆️ Abused legit encryption tools (ransom);
⬆️ Token/Cloud API abuse;

⬇️ Malware attacks on non-standard ports;
⬇️ E-Skimming Incidents;
⬇️ Office Macros.
#hardening
#Blue_Team_Techniques
Recommendations to mitigate OWASP API Security Top 10 threats using API Management
https://learn.microsoft.com/en-us/azure/api-management/mitigate-owasp-api-threats
Wireshark_forensics.pdf
24.8 MB
#Tech_book
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
Java XML security issues and how to address them

https://semgrep.dev/blog/2022/xml-security-in-java
Bug : Facebook Group Members Disclosure

Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.

Video POC:- https://system32.ink/news-feed/p/176/
#Malware_analysis
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
#tools
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#tools
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
StealthyIMU.pdf
1.8 MB
#Research
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.

]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
NIST_SP_800-190.pdf
650.6 KB
#Infosec_Standards
NIST SP 800-190:
"Application Container Security Guide", 2017.
WordPress Plugin Elementor 3.6.2 – Remote Code Execution (RCE) (Authenticated)] Date: 04/16/2022

Exploit:- https://system32.ink/news-feed/p/177/
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io

I was able to discover thousands of vulnerable cameras using it

Tool:- https://system32.ink/news-feed/p/179/