CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
💥Fancy new way to conceal XSS payloads(Assignable protocol with location)
<script>location.protocol='javascript'</script>
⚠️⚠️⚠️⚠️⚠️⚠️⚠️

Hello homies. Wait for uploading soon music share and support
Wait wait every day 1 music upload soon and download link

I have 900 music you don't know how is good https://t.me/Darkwebmusician
A new blog on OSINT Bug Hunting series

Learn dorks and filters of Shodan, LinkedIn, Dnsdumpster, GitHub dorks, Wayback machine, Google dorks and much more...

Here is the link to the blog
https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-3/

Haven't seen the first part?

Here is the link

https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-1/

Haven't seen the second part?


Here is the link

https://techofide.com/blogs/osint-framework-osint-for-bug-hunters-practical-demo-part-2/

Join our group for such exclusive content

t.me/ethicalhackingtechofide
Forwarded from 卩ro 爪Cracker
🔥Arm Mali: insufficient cache invalidation for non-page-aligned user buffer imports
When a user buffer is imported into Mali and mapped into the GPU, Mali calls dma_map_page(). This implicitly does a dcache_clean_poc() on the mapped range (unless the kernel knows that the device is DMA-coherent) to ensure that dirty cache state is written back to main memory before the user buffer can be accessed by the GPU and possibly also uncached mappings on the CPU.

However, when a user buffer is imported that does not begin/end at page boundaries, Mali still installs PTEs on the CPU and GPU that map the entire page, but only calls dma_map_page() on the user-specified range. This means that the rest of the page is mapped without any cache maintenance.

Therefore, when the GPU is not cache-coherent (which Jahn think means there's no ACE or ACE-Lite) or when Mali creates uncached CPU-side mappings, malicious code can read stale memory contents. This is a problem if the last cache writeback happened before the kernel's page allocator zeroed the page and handed it to userspace, since that means the stale data we're reading is whatever the previous user of the page wrote into it.
Forwarded from 卩ro 爪Cracker
mali-coherent-test.c
8.8 KB
💥Reproducer just uses the uncached CPU-side mapping(example run):
aarch64-linux-gnu-gcc -static -o mali-coherent-test mali-coherent-test.c && adb push mali-coherent-test /data/local/tmp/ && adb shell /data/local/tmp/mali-coherent-test
😈When an evil hurts...😈

DDoS Done of Targetted Country

😈😈😈😈😈😈😈😈😈😈

List of Pakistani Websites:-

https://bookme.pk/

https://check-host.net/check-report/ec992eek303
😈😈😈😈😈😈😈😈😈😈


https://www.nts.org.pk/

https://check-host.net/check-report/ec9950ak6d8
😈😈😈😈😈😈😈😈😈😈


https://www.sastaticket.pk/

https://check-host.net/check-report/ec9963ckd1d
😈😈😈😈😈😈😈😈😈😈


https://digiskills.pk/

https://check-host.net/check-report/ec9972ak405
😈😈😈😈😈😈😈😈😈😈


https://www.piac.com.pk/

https://check-host.net/check-report/ec99930k475
😈😈😈😈😈😈😈😈😈😈


https://laam.pk

https://check-host.net/check-report/ec99a2fk8d7
😈😈😈😈😈😈😈😈😈😈


https://www.pcb.com.pk

https://check-host.net/check-report/ec99d2fk1e9
😈😈😈😈😈😈😈😈😈😈


https://www.pktrucks.com

https://check-host.net/check-report/ec99f4fk8df
😈😈😈😈😈😈😈😈😈😈


https://priceoye.pk/

https://check-host.net/check-report/ec9a387k6fc
😈😈😈😈😈😈😈😈😈😈


https://www.clicky.pk/

https://check-host.net/check-report/ec9a416kdba
😈😈😈😈😈😈😈😈😈😈


https://www.pk-ent.com/

https://check-host.net/check-report/ec9a4f8kcea
😈😈😈😈😈😈😈😈😈😈


😈For Support, Do Share As Much As Possible 😈

https://t.me/DDoS_Evil
❤‍🔥7
Hello Guys,
I am making an Private Page on start.me regarding OSINT
So if anyone wants to contribute or help me to make this project successful will be highly appreciated
if you are interested please contact me at https://t.me/hacklathon

also if you want to be in my team please let me know.
👍4
This media is not supported in your browser
VIEW IN TELEGRAM
Шла вроде вторая неделя, я уже сбился со счета. Пакистану все так же похуй.
😁4🫡2👍1
🔥APT38 Tactic PoC for Stealing 0-days
💾program based on APT38 North Korea-backed hackers tactic that used in targeting security researchers using a malicious Visual Studio project file (vcxproj) to steal their 0days.
💾Once the program runs, it will infect all of your Visual Studio projects

Download:- https://system32.ink/news-feed/p/259/
👍3
A blog to learn how to do password cracking using John the ripper

Password cracking with John the ripper tool

Here is the link to the blog:

https://techofide.com/blogs/how-to-use-john-the-ripper-john-the-ripper-password-cracker-techofide/

Join our group for Exclusive Cyber security content

t.me/ethicalhackingtechofide
👍1
Пакистан, видно что мы там делаем?🥹

PHOENIX
❤‍🔥5🤓1👻1
Forwarded from 卩ro 爪Cracker
📲ssl-kill-switch3 is a next-generation of iOS Tweak SSLKillSwitch(2) with much more functionality!
Forwarded from 卩ro 爪Cracker
DarkPhoenix.zip
165.1 KB
1👍1
Forwarded from 😈DDoS Evil😈
This media is not supported in your browser
VIEW IN TELEGRAM
Dreamstime.com

😈DDoS Done😈
After Bypassing CloudFlare 🖕

https://check-host.net/check-report/ed5664dk4da

Do Share And Support😈

😈Evils Always Remains Evil😈

https://t.me/DDoS_Evil
❤‍🔥3