CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐ŸŒŸ Best WiFi Adapters for Hacking ๐ŸŒŸ

Here we have listed some best USB Wireless adapters Kali Linux in 2023These WiFi adapters are 100% compatible with Kali Linux and supports monitor mode and packet injection, which will help a lot in WiFi penetration testing.

๐Ÿ”ฅLink -> https://pentestingguide.com/wifi-adapter-for-hacking/
๐Ÿ‘4
๐Ÿ”ฅ6
OSCP guide 2023

All the advices that worked for me might not work for you.

Pick what you like, throw what you donโ€™t.

Read Full Article: https://bit.ly/OSCPGuide2023
โคโ€๐Ÿ”ฅ9
๐Ÿ”ฅ How to Start Bug Bounty for Beginners ๐Ÿ”ฅ

๐ŸŒŸ Topics Covered ๐Ÿ‘‡

โœ… Introduction
โœ… Advantages of bug bounty
โœ… Steps to become bug hunter
โœ… Scope of bug bounty
โœ… Skills required to become bug hunter
โœ… Tools required for bug hunting
โœ… Common vulnerabilities in bug hunting
โœ… Reporting & Communication best practices
โœ… Legal and Ethical Considerations
โœ… Finding and joining bug bounty programs
โœ… Tips & tricks for succeeding in bug bounty

๐Ÿ”— Link :
https://bit.ly/3nPrJrK

Share if you found it helpful โค๏ธ
๐Ÿ‘1
Make PDF Exploit (Demo) POC

Watch Full Video:- https://system32.ink/news-feed/p/292/
โค3
๐Ÿ‘2
Fuzzing The Web For Mysterious Bugs

It all starts with unexpected input. Modern applications and APIs rely on validation, sanitization, and normalization. This is usually done by custom regular expressions and widely used libraries that validate and transform typical user input formats, such as email addresses, URLs, and more.

Read Full Article: https://bit.ly/FuzzTheWeb
๐Ÿ‘2
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Turkiye Goverment Access Added VIP๐Ÿ’Ž

https://prnt.sc/BiaBeXmk4E3T
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Part2 Turkiye Goverment Access Added VIP๐Ÿ’Ž

https://prnt.sc/Uj8q2iP78VnT
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Maal Gf Randi Bhabhi chudai Desi
๐Ÿ‘‰BEWARE OF THESE FAKE INSTAGRAM JOB PAGES!!๐Ÿ‘ˆ


โญ•๏ธ  In December, a job posting on Instagram piqued the womanโ€™s interest. When she followed the link, she was taken to another Instagram account, @airlinejoballindia. She was instructed to fill out this form with her information, which included her contact details.

โญ•๏ธ  After she completed the form, she received a call from a man named Rahul. She was initially requested to pay a pittance of Rs 750 to register. However, as time went on, she was asked to send additional funds for gate pass fees, insurance, security deposits, and other expenses.

โญ•๏ธ  The woman became concerned when the demand for money continued even after she sent Rs 8.6 lakh.

โญ•๏ธ  The womanโ€™s husband then reported the incident to Central Delhi police. Following an investigation, authorities revealed that most money withdrawals were conducted in Hisar, Haryana. Rahulโ€™s calls to the woman were also traced to the same address. After confirming all data, the police team raided and apprehended the fraudster.

โญ•๏ธ  The culprit admitted to investigators that he misled several people by promising them employment with private airlines. He began doing this when the perpetrator was jobless for more than two years due to the pandemic, as per a TOI report.

          Join for more
โœ–๏ธ
@HackingInsights โœ–๏ธ
๐Ÿ‘3
๐Ÿ‡ธ๐Ÿ‡ช๐Ÿ‡ต๐Ÿ‡ฐโšก๏ธ- Sweden has shut down its embassy in Pakistan permanently

t.me/MEGHUPDATES
๐Ÿ”ฅ4
This media is not supported in your browser
VIEW IN TELEGRAM
โšก๏ธPakistan :-

Blast in Balochistan, four killed including two policemen, 18 injured The blast occurred near a police vehicle parked in the Kandhari market in the Shahrah-e-Iqbal area of โ€‹โ€‹the provincial capital Quetta.

No group has claimed responsibility for the attack.

๐Ÿ”บ@AngrySaffron
๐Ÿ”ฅ6๐Ÿ‘1
gg's hacker's ( good afternoon โ€”
โ€ผ๏ธHere we go again

Certified PENetration Testing professional (CPENT)
update link

#hacker_bano_chutiya_nhe ๐Ÿ’•
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Bug Reports ๐Ÿฅฌโ˜˜๏ธ & Bug bounty Guide ๐ŸŒฟ๐ŸŽฏ๐Ÿ€

1)Attacker is able to query Github repositories of arbitrary Shopify Hydrogen Users
https://hackerone.com/reports/1692788

2)The Story of Becoming a Super Admin
https://medium.com/@omerkepenek/the-story-of-becoming-a-super-admin-ab32db7dd1b3

3)How to Bypass XSS Filters: A Practical Example
https://securitylit.medium.com/how-to-bypass-xss-filters-a-practical-example-3189877fe2ce

4)XSS Vulnerability Types
https://medium.com/@rkarthik435/xss-vulnerability-types-272ae496d1a1

5)A Beginnerโ€™s Guide to Bug Hunting and Exploiting Common WordPress Vulnerabilities
https://medium.com/@cuncis/a-beginners-guide-to-bug-hunting-and-exploiting-common-wordpress-vulnerabilities-821fe0d79461

6)What Is Open Source Intelligence (OSINT) In the Context of Bug Bounty
https://securitylit.medium.com/what-is-open-source-intelligence-osint-in-the-context-of-bug-bounty-c792f8680e3c

7)Can you spot the vulnerability? #16022023 โ€” Intigriti
https://infosecwriteups.com/can-you-spot-the-vulnerability-16022023-intigriti-a46068e557cc

8)Skipjack Encryption: Understanding Its Advantages and Limitations in Cyber Security | 2023
https://cyberw1ng.medium.com/skipjack-encryption-understanding-its-advantages-and-limitations-in-cyber-security-2023-b0dcfdf8cf6c

9)Earning cryptocurrency through bug bounties
https://medium.com/@apriltoken/earning-cryptocurrency-through-bug-bounties-718158b013dd

Bug Reports ๐Ÿฅฌโ˜˜๏ธ & Bug bounty Guide ๐ŸŒฟ๐ŸŽฏ๐Ÿ€ โ˜๏ธโ˜๏ธ