CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ’ฅPS script to exploit ESC1/retrieve your own NTLM password hash using only built-in Windows binaries to generate the PFX.

Download: https://system32.ink/news-feed/p/248/
Hi Everyone!

A new Blog on Burp Suite.

Let's learn how to use it like a Cyber Security Professional

A beginners blog to take your first step towards Burp Suite

Here is the link ๐Ÿ”—

https://techofide.com/blogs/what-is-burp-suite-how-to-use-burp-suite-burp-suite-tutorial-for-beginners/

Join our group for such exclusive content

t.me/ethicalhackingtechofide
Link updated...
CVE-2023-0754
PTC Thingworx Edge C-SDK twHeader_fromStream Integer Overflow RCE Vulnerability

CVE-2023-0755
PTC Thingworx Edge C-SDK mulitpartMessageStoreEntry_Create Array Indexing OOB Write RCE Vulnerability

Download POC exploit: https://system32.ink/news-feed/p/249/
Forwarded from โ™›โ™›โ™›๐Ÿ‡ฆ ๐Ÿ‡ณ ๐Ÿ‡บ ๐Ÿ‡ท ๐Ÿ‡ฆ ๐Ÿ‡ฌ เผ„โ—โƒแถซแต’๊ชœeโ˜ฏแดฎแดผแตžเฟโ™›๊ง‚ ๊งANURAG แญ„แดฎแดผหขหข๊ง‚
โค๏ธKrishnaGyan.in is a fantastic website that offers a unique and exciting service similar to ChatGPT But Difreent is that its not ChatGPT All Your Answer Come Across
To Our Bhagwat Geeta ๐Ÿ•‰.

Link :
KrishnaGyan.in

๐ŸคžWhether you want to know about science, technology, history, philosophy, or anything in between,
KrishnaGyan.in has got you covered. It is designed to provide you with accurate and insightful answers to your queries, just like a human expert would.๐Ÿ›•

Click Here To Visit
โค2
๐Ÿ’ฅPatchless/breakpoint in process amsi bypass thingy with C#

Download CS File:- https://system32.ink/news-feed/p/257/
OpenSSH 9.1 exploit and Mass Scan



Vulnerability CVE-2023-25136 affects the SSH pre-authentication process. Using it, an attacker can corrupt memory and execute arbitrary code on a machine without being authenticated on the target server.

Download: https://system32.ink/news-feed/p/258/
Forwarded from ๅฉro ็ˆชCracker
๐Ÿ’ฅFancy new way to conceal XSS payloads(Assignable protocol with location)
<script>location.protocol='javascript'</script>
โš ๏ธโš ๏ธโš ๏ธโš ๏ธโš ๏ธโš ๏ธโš ๏ธ

Hello homies. Wait for uploading soon music share and support
Wait wait every day 1 music upload soon and download link

I have 900 music you don't know how is good https://t.me/Darkwebmusician
A new blog on OSINT Bug Hunting series

Learn dorks and filters of Shodan, LinkedIn, Dnsdumpster, GitHub dorks, Wayback machine, Google dorks and much more...

Here is the link to the blog
https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-3/

Haven't seen the first part?

Here is the link

https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-1/

Haven't seen the second part?


Here is the link

https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-2/

Join our group for such exclusive content

t.me/ethicalhackingtechofide
Forwarded from ๅฉro ็ˆชCracker
๐Ÿ”ฅArm Mali: insufficient cache invalidation for non-page-aligned user buffer imports
When a user buffer is imported into Mali and mapped into the GPU, Mali calls dma_map_page(). This implicitly does a dcache_clean_poc() on the mapped range (unless the kernel knows that the device is DMA-coherent) to ensure that dirty cache state is written back to main memory before the user buffer can be accessed by the GPU and possibly also uncached mappings on the CPU.

However, when a user buffer is imported that does not begin/end at page boundaries, Mali still installs PTEs on the CPU and GPU that map the entire page, but only calls dma_map_page() on the user-specified range. This means that the rest of the page is mapped without any cache maintenance.

Therefore, when the GPU is not cache-coherent (which Jahn think means there's no ACE or ACE-Lite) or when Mali creates uncached CPU-side mappings, malicious code can read stale memory contents. This is a problem if the last cache writeback happened before the kernel's page allocator zeroed the page and handed it to userspace, since that means the stale data we're reading is whatever the previous user of the page wrote into it.
Forwarded from ๅฉro ็ˆชCracker
mali-coherent-test.c
8.8 KB
๐Ÿ’ฅReproducer just uses the uncached CPU-side mapping(example run):
aarch64-linux-gnu-gcc -static -o mali-coherent-test mali-coherent-test.c && adb push mali-coherent-test /data/local/tmp/ && adb shell /data/local/tmp/mali-coherent-test
๐Ÿ˜ˆWhen an evil hurts...๐Ÿ˜ˆ

DDoS Done of Targetted Country

๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ

List of Pakistani Websites:-

https://bookme.pk/

https://check-host.net/check-report/ec992eek303
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.nts.org.pk/

https://check-host.net/check-report/ec9950ak6d8
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.sastaticket.pk/

https://check-host.net/check-report/ec9963ckd1d
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://digiskills.pk/

https://check-host.net/check-report/ec9972ak405
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.piac.com.pk/

https://check-host.net/check-report/ec99930k475
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://laam.pk

https://check-host.net/check-report/ec99a2fk8d7
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.pcb.com.pk

https://check-host.net/check-report/ec99d2fk1e9
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.pktrucks.com

https://check-host.net/check-report/ec99f4fk8df
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://priceoye.pk/

https://check-host.net/check-report/ec9a387k6fc
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.clicky.pk/

https://check-host.net/check-report/ec9a416kdba
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


https://www.pk-ent.com/

https://check-host.net/check-report/ec9a4f8kcea
๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ๐Ÿ˜ˆ


๐Ÿ˜ˆFor Support, Do Share As Much As Possible ๐Ÿ˜ˆ

https://t.me/DDoS_Evil
โคโ€๐Ÿ”ฅ7
Forwarded from Biaล‚a Bล‚
๐Ÿ‘3
Hello Guys,
I am making an Private Page on start.me regarding OSINT
So if anyone wants to contribute or help me to make this project successful will be highly appreciated
if you are interested please contact me at https://t.me/hacklathon

also if you want to be in my team please let me know.
๐Ÿ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
ะจะปะฐ ะฒั€ะพะดะต ะฒั‚ะพั€ะฐั ะฝะตะดะตะปั, ั ัƒะถะต ัะฑะธะปัั ัะพ ัั‡ะตั‚ะฐ. ะŸะฐะบะธัั‚ะฐะฝัƒ ะฒัะต ั‚ะฐะบ ะถะต ะฟะพั…ัƒะน.
๐Ÿ˜4๐Ÿซก2๐Ÿ‘1
๐Ÿ”ฅAPT38 Tactic PoC for Stealing 0-days
๐Ÿ’พprogram based on APT38 North Korea-backed hackers tactic that used in targeting security researchers using a malicious Visual Studio project file (vcxproj) to steal their 0days.
๐Ÿ’พOnce the program runs, it will infect all of your Visual Studio projects

Download:- https://system32.ink/news-feed/p/259/
๐Ÿ‘3