CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ“กSpace Jam: Exploring Radio Frequency Attacks in Outer Space

Download:- https://system32.ink/news-feed/p/220/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Microsoft Exchange: OWASSRF + TabShell
(CVE-*2022-41076
)*

The TabShell vulnerability its a form of Privilege Escalation which allows breaking out of the restricted Powershell Sandbox after you have successfully gained access through OWASSRF.

For a detailed write see research:
https://blog.viettelcybersecurity.com/tabshell-owassrf/

*PoC:
*
https://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e

#owa #ssrf #tabshell #poc

@virus303

@NetEditors
๐Ÿ‘2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Learning DevOps.pdf
18.3 MB
๐Ÿ‘2
SCRIPT HTTP-SQL-INJECTION (NMAP)
download
๐Ÿ‘3โšก1
Hi, all a new blog on Smurf attack is now here

Learn the technique to perform this Ddos attack.

Here is the link to the blog

https://techofide.com/blogs/what-is-smurf-attack-what-is-the-denial-of-service-attack-practical-ddos-attack-step-by-step-guide/
๐Ÿ‘3
A public collection of POCs & Exploits for the vulnerabilities I discovered

https://system32.ink/news-feed/p/223/
๐Ÿ‘2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
All Common Ports

Enumerations and Exploitations

https://pentestbook.six2dez.com/enumeration/ports
๐Ÿ”ฅ1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
SSH key injection in Google Cloud Compute Engine [Google VRP]

https://blog.stazot.com/ssh-key-injection-google-cloud/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
image.png
973.2 KB
Command Injection Cheat Sheet

#bugbounty #infosec #hacking #cybersecurity
๐Ÿ‘2
A new post for those who want to learn Metasploit and Meterpreter.

Hi Cyber learners

Check my new post + Video on Metasploit and Meterpreter.

How to Use Metasploit | Meterpreter | Reverse shell | Metasploit Tutorial


https://techofide.com/blogs/how-to-use-metasploit-meterpreter-reverse-shell-metasploit-tutorial/
๐Ÿ‘2
Apache SCXML RCE (PoC included) + Article

Link:- https://system32.ink/news-feed/p/225/
exploit for an actively exploited zero-day vulnerability affecting the GoAnywhere MFT administration consoles.

Exploit: https://system32.ink/news-feed/p/227/
๐Ÿ‘1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Mini description of linux file permissions. Found this helpful!

#Linux #infosec #cybersecurity
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ‘2
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ 
โšก2๐Ÿ”ฅ1