CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Master OAuth 2.0 Vulnerability
#bugbounty #infosec 

Difficulty : Any

OAuth 2.0 Resources :๐Ÿ‘‡

โ€ข https://owasp.org/www-pdf-archive/20151215-Top_X_OAuth_2_Hacks-asanso.pdf

โ€ข https://medium.com/@lokeshdlk77/stealing-facebook-mailchimp-application-oauth-2-0-access-token-3af51f89f5b0

โ€ข https://medium.com/a-bugz-life/the-wondeful-world-of-oauth-bug-bounty-edition-af3073b354c1

โ€ข https://gauravnarwani.com/misconfigured-oauth-to-account-takeover/

โ€ข https://medium.com/@Jacksonkv22/oauth-misconfiguration-lead-to-complete-account-takeover-c8e4e89a96a

โ€ข https://medium.com/@logicbomb_1/bugbounty-user-account-takeover-i-just-need-your-email-id-to-login-into-your-shopping-portal-7fd4fdd6dd56

โ€ข https://medium.com/@protector47/full-account-takeover-via-referrer-header-oauth-token-steal-open-redirect-vulnerability-chaining-324a14a1567

โ€ข https://hackerone.com/reports/49759

โ€ข https://hackerone.com/reports/131202

โ€ข https://hackerone.com/reports/6017

โ€ข https://hackerone.com/reports/7900

โ€ข https://hackerone.com/reports/244958

โ€ข https://hackerone.com/reports/405100

โ€ข https://ysamm.com/?p=379

โ€ข https://amolbaikar.com/facebook-oauth-framework-vulnerability/

โ€ขhttps://medium.com/@godofdarkness.msf/mail-ru-ext-b-scope-account-takeover-1500-abdb1560e5f9

โ€ข https://medium.com/@tristanfarkas/finding-a-security-bug-in-discord-and-what-it-taught-me-516cda561295

โ€ข https://medium.com/@0xgaurang/case-study-oauth-misconfiguration-leads-to-account-takeover-d3621fe8308b

โ€ข https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74

โ€ข http://blog.intothesymmetry.com/2014/02/oauth-2-attacks-and-bug-bounties.html

โ€ข http://blog.intothesymmetry.com/2015/04/open-redirect-in-rfc6749-aka-oauth-20.html

โ€ข https://veracode.com/blog/research/spring-social-core-vulnerability-disclosure

โ€ข https://medium.com/@apkash8/oauth-and-security-7fddce2e1dc5

โ€ข https://xploitprotocol.medium.com/exploiting-oauth-2-0-authorization-code-grants-379798888893

Thanks You For Reading this ๐Ÿ™

Hope You'll like ๐Ÿ‘ it
๐Ÿ‘3
๐Ÿ“ฒEnzyme is an jailbreak-free iOS modding framework that allows you to statically patch and hook iOS apps.
This repository contains an example using Enzyme. For modifying this, check out the CMakeLists.txt file, the patcher/main.py file, the patcher/bootstrap.asm file, and the src folder.

Download:- https://system32.ink/news-feed/p/213/
RedTeam-Tools-main.zip
40.1 KB
#RedTeam #hack #tools

Collection of 100+ tools and resources that can be useful for red teaming activities.

https://github.com/A-poc/RedTeam-Tools
๐Ÿ‘1
Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6

download: https://system32.ink/news-feed/p/209/
๐Ÿ†3
๐Ÿ”ฅBrave browser 1 day exploit.
This is a remote crash that triggers in brave browser due to how the rss XML parsing happens by reading an item's title that contains the < (less than) character.

Download: https://system32.ink/news-feed/p/211/
๐Ÿ‘1
Forwarded from ๅฉro ็ˆชCracker
๐Ÿ”ฅChrome heap buffer overflow in validating command decoder(CVE-2022-4135)
Heap BoF/OOB access in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a SBX via a crafted HTML page.

๐Ÿ›กPatch CL

Exploit strategy:
The vulnerability immediately provides an attacker with an extremely powerful exploitation primitive -- a non-linear BoF with a controlled offset.

Exploit flow:
The exploit abuses the command buffer and GLES2 APIs for memory manipulation. A corrupted memory bucket is used to first leak data from the GPU process and break ASLR, and then, when the ROP chain is ready, hijack the control flow.

reproduce:
<script>
canvas = document.createElement("canvas");
document.documentElement.appendChild(canvas);
context = canvas.getContext("webgl2");
context.blendColor(0, 0, 0, 0);
</script>

โš ๏ธPart of an exploit chain: CVE-2022-4135 + CVE-2022-3723
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅAdobe Acrobat Reader - resetForm - CAgg UaF - RCE Exploit(CVE-2023-21608)

Download: https://system32.ink/news-feed/p/212/
Forwarded from ๅฉro ็ˆชCracker
๐Ÿ’ฅIf a web application allow you to upload a .zip file, zip:// is an interesting PHP wrapper to turn a LFI into a RCE.
๐Ÿ‘1
Needle (CVE-2023-0179) exploit

Download:- https://system32.ink/news-feed/p/215/
๐Ÿ’ฅCobalt Strike BOF that bypasses AMSI in a remote process with code injection.

Download:- https://system32.ink/news-feed/p/214/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿช‚ Standout as Web design Expert Course ๐Ÿช‚

Download link-

https://mega.nz/folder/y3AkFAjT#j8-rd4vmddGn4utAgDITPQ

๐Ÿ” Zip Password- @udemyking1
โœฆโ€ขโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ€ขโœฆ
๐Ÿ‘‰ ๐‘€๐‘ข๐‘ ๐‘ก ๐ฟ๐‘–๐‘˜๐‘’ & ๐น๐‘œ๐‘™๐‘™๐‘œ๐‘ค ๐‘‚๐‘ข๐‘Ÿ ๐‘ƒ๐‘Ž๐‘”๐‘’๐‘ ๐Ÿ‘‡
๐Ÿ”ท ๐’€๐’๐’–๐‘ป๐’–๐’ƒ๐’† โž› bit.ly/UFC-YouTube
๐Ÿ”ถ ๐‘ญ๐’‚๐’„๐’†๐’ƒ๐’๐’๐’Œ โž› fb.me/UdemyKing
๐Ÿ”ท ๐‘ณ๐’Š๐’๐’Œ๐’†๐’…๐‘ฐ๐’ โž› bit.ly/UFC-linkedin
๐Ÿ”ถ ๐‘ฐ๐’๐’”๐’•๐’‚๐’ˆ๐’“๐’‚๐’Ž โž› bit.ly/UFC-Insta
๐Ÿ”ท ๐‘ฑ๐’๐’Š๐’ ๐‘ญ๐’‚๐’”๐’• โž› t.me/UdemyKing1
โœฆโ€ขโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ€ขโœฆ