CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from HACKLIDO | Cyber Security (Illucist)
๐ŸšจHacklido presents you a FREE webinar on "Recon For BugBounty" in collaboration with Agnibha Dutta a.k.a Anon_Y0gi

Webinar Details:
- Platform: Google Meet
- Date: March 05, 2023 | Sunday
- Timing: 5:00 - 7:00 pm

To Register, Click on the following link , to receive the invite link for the respective webinar:
https://forms.gle/ZrS8dcaQ1ejag29f6

[LIMITED SEATS upto 100]
Join us soon!!๐Ÿ”ฅ
Forwarded from Biaล‚a Bล‚
โค2
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„ (.)
๐Ÿ”ฅ4
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„ (.)
๐Ÿ”ฅ4
Forwarded from ๅฉro ็ˆชCracker
โš™๏ธ CamOver is a camera exploitation tool that allows to disclosure network camera admin password.

Features:
๐Ÿ’พExploits vulnerabilities in most popular camera models such as CCTV, GoAhead and Netwave.
๐Ÿ’พOptimized to exploit multiple cameras at one time from list with threading enabled.
๐Ÿ’พSimple CLI and API usage.

โš™๏ธ CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.

Features:
๐Ÿ’พExploits vulnerabilities in most popular camera models such as Novo, CeNova and QSee.
๐Ÿ’พOptimized to exploit multiple cameras at one time from list with threading enabled.
๐Ÿ’พSimple CLI and API usage.
โšก2๐Ÿ‘1
Forwarded from GhostSec
This media is not supported in your browser
VIEW IN TELEGRAM
The Land of missing people
That is what Balochistan is called by nowadays Following the request of these people, we announce #OpBalochistan

To the pakistan army and ISI, You lot really wouldn't last a minute with our penetration. But we do wish you enjoy XoXo


~GhostSec
โšก6๐Ÿ˜ฑ2
Cortex XDR Config Extractor is a tool is meant to be used during Red Team Assessments and to audit the XDR Settings. With this tool its possible to parse the Database Lock Files of the Cortex XDR Agent by Palo Alto Networks and extract Agent Settings, the Hash and Salt of the Uninstall Password, as well as possible Exclusions.

Supported Extractions:

Uninstall Password Hash & Salt
Excluded Signer Names
DLL Security Exclusions & Settings
PE Security Exclusions & Settings
Office Files Security Exclusions & Settings
Credential Gathering Module Exclusions
Webshell Protection Module Exclusions
Childprocess Executionchain Exclusions
Behavorial Threat Module Exclusions
Local Malware Scan Module Exclusions
Memory Protection Module Status
Global Hash Exclusions
Ransomware Protection Module Modus & Settings

Download:- https://system32.ink/news-feed/p/264/
๐Ÿ‘1
๐Ÿ’ฅNuclei-templates that help during the bug bounty hunting process.

https://system32.ink/news-feed/p/265/
๐Ÿ‘3
โคโ€๐Ÿ”ฅ1
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„ (.)
Check Out These Sites
Redefaced By Indian Hackers
๐Ÿ˜˜

Power Of Indian Hackers
&
Feel The Power Of Indians
๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿ‡ฎ
๐Ÿ”ฅ5โค3
Let's move to some different topic this time

What is Digital Forensics? Digital forensics tools

Here is the link to the blog:

https://techofide.com/blogs/what-is-digital-forensics-how-to-use-digital-forensics-tools/

Join our group for more cyber security content in varitey

Don't miss new content is coming

t.me/ethicalhackingtechofide
๐Ÿ‘4๐Ÿ˜1
โค5
๐Ÿค”CVE-2023-21716 (Microsoft Word RCE vuln) Python PoC

https://system32.ink/news-feed/p/266/
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐ƒ๐€๐‘๐Š๐๐„๐“ ๐€๐’๐’๐Ž๐‚๐ˆ๐€๐“๐ˆ๐Ž๐
๐Ÿ”ฅ6โšก2โค2
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„
โค1
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐ƒ๐€๐‘๐Š๐๐„๐“ ๐€๐’๐’๐Ž๐‚๐ˆ๐€๐“๐ˆ๐Ž๐
โคโ€๐Ÿ”ฅ7๐Ÿ”ฅ2๐Ÿ‘1
เค†เคชเค•เฅ‡ เคœเฅ€เคตเคจ เคฎเฅ‡เค‚ เคนเฅ‹ เคฐเค‚เค—เฅ‹เค‚ เค•เฅ€ เคญเคฐเคฎเคพเคฐ
เคฏเคนเฅ€ เคฆเฅเค† เคนเฅˆ เคฎเฅ‡เคฐเฅ€ เคˆเคถเฅเคตเคฐ เคธเฅ‡ เค‡เคธ เคฌเคพเคฐ, เคนเฅ‹เคฒเฅ€ เคฎเฅเคฌเคพเคฐเค• เคนเฅ‹ เค†เคชเค•เฅ‹ เคฆเคฟเคฒ เคธเฅ‡ เคนเคฐ เคฌเคพเคฐเฅค เคนเฅ‹เคฒเฅ€ เค•เฅ€ เคนเคพเคฐเฅเคฆเคฟเค• เคถเฅเคญเค•เคพเคฎเคจเคพเคเค‚
โค8