CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Haโ„ฝ๐–•er
private sector database โœช
1 week  10$
2 week 20$
1 month 50$

https://t.me/+V3GiW-cRaMswMTM9

@Algorithm2bot
๐Ÿ›ก ๐˜พ๐™ก๐™ž๐™˜๐™ ๐™Ÿ๐™–๐™˜๐™ ๐™ž๐™ฃ๐™œ & ๐˜พ๐™ค๐™ฃ๐™ฉ๐™š๐™ฃ๐™ฉ ๐™„๐™ฃ๐™Ÿ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃ ๐™‘๐™ช๐™ก๐™ฃ๐™š๐™ง๐™–๐™—๐™ž๐™ก๐™ž๐™ฉ๐™ฎ ๐Ÿ›ก

Clickjacking Tool, Script are given in Description.

๐™‹๐™ก๐™š๐™–๐™จ๐™š ๐™‡๐™ž๐™ ๐™š & ๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™

๐™‡๐™ž๐™ฃ๐™  : https://youtu.be/gbpVPv3aT18
๐Ÿ‘1
How Search Engines Help Us In Bug Bounty

Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโ€™t interact with the target. Instead, they obtain information about the target from other external, third-party sources.

Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty

@crackcodes
โค3
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
[ cPanel CVE-2023-29489 ]
==========================

Finding XSS in a million websites (cPanel CVE-2023-29489)

READ ARTICLE

==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
โคโ€๐Ÿ”ฅ5โค2
Forwarded from INDIAN CYBER MAFIA
Forensic Science Laboratory KP Police Govt. Of Pakistan Hacked

https://rfslswat.gov.pk

https://mail.rfslswat.gov.pk

https://school.rfslswat.gov.pk

Jai Hind
๐Ÿ”ฅ6๐Ÿ˜1๐Ÿ†1
Opportunity Update :

We are in search of Talented Guys who have skillset of

: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers

Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
๐Ÿ‘2๐Ÿ˜1
๐Ÿคฉ10 Best FREE Ethical Hacking Courses๐Ÿคฉ

With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.

This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.

Download:
bit.ly/BestHackingCourses

Share & Support โค๏ธ
DHCP Server Service Remote Code Execution Vulnerability

CVE-2023-28231 POC

Download
๐Ÿ‘2
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
๐Ÿ˜„ 312 Turkish Passports Leaked By ๐Ÿ‡ช๐Ÿ‡ธ @LegionLeaker ๐Ÿ‡ช๐Ÿ‡ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
โ—๏ธScammer ๐Ÿšซ
@MohammedKairz
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Public This Mother Fucker ๐Ÿ–•
Please open Telegram to view this post
VIEW IN TELEGRAM
https://medium.com/@lonewarriorco/mastering-osint-the-ultimate-guide-to-investigating-and-analyzing-publicly-available-information-370f265699da

In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill

This may be helpful for both intermediate and beginners.
also suggest me for any edits.
๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
5 Common Web Application Vulnerabilities and How to Test for Them

READ full Article

bit.ly/3oQ4RsT

@trickypenguin

Share & Support ๐Ÿ™Œ
โค4
๐Ÿค” How to Write Bug Bounty Report ๐Ÿค”

Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.

In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.

By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.

โœ…Link:
bit.ly/BugBountyReport

Share & Support โค๏ธ
๐Ÿ‘4
What To Do If Your PC Got Infected With Malware?

Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.

Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Watch latest movies and Get Free Courses on https://neplix.stream

Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies

https://neplix.stream/courses