CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Maal Gf Randi Bhabhi chudai Desi
Top 7 Google Dorks You Need to Know

๐Ÿš€ Cache : This dork will show you the cached version of any website.
โ€ข cache : exampleโ€ข com

๐Ÿš€ After : This dork will give you result after like :
โ€ข After : 2019, After : 2016 ( Use with Site Dork )

๐Ÿš€ Allintext : Searches for specific text contained on any web page.
โ€ข allintext : admin

๐Ÿš€ Allinurl : exactly the same as allintext, but will show pages that contain titles with "X" characters.
โ€ข allinurl : "password"

๐Ÿš€ Anchor Tag : this is useful when you need to search for an exact anchor text used on any links.
โ€ข "Some_Text" Filetype : php

โœจAnother dork that Works like same as filetype is ext :
โ€ข "python" ext : pdf

๐Ÿš€ Allinurl : It can be used to fetch results whose URL contains all the specified characters.
โ€ข allinurl :"login"

๐ŸŒŸ Learn how to hack with Google Dorks (Free Guide)
๐Ÿ‘‰ https://pentestingguide.com/google-dorks/

          Join for more
โœ–๏ธ
@HackingInsights โœ–๏ธ
Scan Vulnerabilities With Nmap: A Comprehensive Guide

If you want to conduct a vulnerability scan, you can use Nmap, which is a popular tool for the security testing process. Nmap is a powerful and versatile network scanning tool that lets you map out hosts and services on your network and provides valuable information to analyze for vulnerabilities.

Read Full Article: https://bit.ly/ScanVulnerabilitiesWithNmap
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅSBX in vm2 ( CVE-2023-29017 )

vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.

โš ๏ธA threat actor can bypass the sandbox protections to gain RCE rights on the host running the sandbox.

Exploits:- https://system32.ink/news-feed/p/288/
๐Ÿ‘3
๐ŸŒŸ Best WiFi Adapters for Hacking ๐ŸŒŸ

Here we have listed some best USB Wireless adapters Kali Linux in 2023These WiFi adapters are 100% compatible with Kali Linux and supports monitor mode and packet injection, which will help a lot in WiFi penetration testing.

๐Ÿ”ฅLink -> https://pentestingguide.com/wifi-adapter-for-hacking/
๐Ÿ‘4
๐Ÿ”ฅ6
OSCP guide 2023

All the advices that worked for me might not work for you.

Pick what you like, throw what you donโ€™t.

Read Full Article: https://bit.ly/OSCPGuide2023
โคโ€๐Ÿ”ฅ9
๐Ÿ”ฅ How to Start Bug Bounty for Beginners ๐Ÿ”ฅ

๐ŸŒŸ Topics Covered ๐Ÿ‘‡

โœ… Introduction
โœ… Advantages of bug bounty
โœ… Steps to become bug hunter
โœ… Scope of bug bounty
โœ… Skills required to become bug hunter
โœ… Tools required for bug hunting
โœ… Common vulnerabilities in bug hunting
โœ… Reporting & Communication best practices
โœ… Legal and Ethical Considerations
โœ… Finding and joining bug bounty programs
โœ… Tips & tricks for succeeding in bug bounty

๐Ÿ”— Link :
https://bit.ly/3nPrJrK

Share if you found it helpful โค๏ธ
๐Ÿ‘1
Make PDF Exploit (Demo) POC

Watch Full Video:- https://system32.ink/news-feed/p/292/
โค3
๐Ÿ‘2
Fuzzing The Web For Mysterious Bugs

It all starts with unexpected input. Modern applications and APIs rely on validation, sanitization, and normalization. This is usually done by custom regular expressions and widely used libraries that validate and transform typical user input formats, such as email addresses, URLs, and more.

Read Full Article: https://bit.ly/FuzzTheWeb
๐Ÿ‘2
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Turkiye Goverment Access Added VIP๐Ÿ’Ž

https://prnt.sc/BiaBeXmk4E3T
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Part2 Turkiye Goverment Access Added VIP๐Ÿ’Ž

https://prnt.sc/Uj8q2iP78VnT
Please open Telegram to view this post
VIEW IN TELEGRAM