CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ›ก ๐˜พ๐™ก๐™ž๐™˜๐™ ๐™Ÿ๐™–๐™˜๐™ ๐™ž๐™ฃ๐™œ & ๐˜พ๐™ค๐™ฃ๐™ฉ๐™š๐™ฃ๐™ฉ ๐™„๐™ฃ๐™Ÿ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃ ๐™‘๐™ช๐™ก๐™ฃ๐™š๐™ง๐™–๐™—๐™ž๐™ก๐™ž๐™ฉ๐™ฎ ๐Ÿ›ก

Clickjacking Tool, Script are given in Description.

๐™‹๐™ก๐™š๐™–๐™จ๐™š ๐™‡๐™ž๐™ ๐™š & ๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™

๐™‡๐™ž๐™ฃ๐™  : https://youtu.be/gbpVPv3aT18
๐Ÿ‘1
How Search Engines Help Us In Bug Bounty

Passive reconnaissance plays an important role in the approach of a target. In comparison to active reconnaissance, passive reconnaissance is the silent, stealthy one, where the attacker doesnโ€™t interact with the target. Instead, they obtain information about the target from other external, third-party sources.

Read Full Article: https://bit.ly/Search_engine_For_Bug_Bounty

@crackcodes
โค3
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
[ cPanel CVE-2023-29489 ]
==========================

Finding XSS in a million websites (cPanel CVE-2023-29489)

READ ARTICLE

==========================
[ Telegram Channel : @trickypenguin ]
[ Website : trickypenguin.ink ]
[ Share & Support ]
==========================
โคโ€๐Ÿ”ฅ5โค2
Forwarded from INDIAN CYBER MAFIA
Forensic Science Laboratory KP Police Govt. Of Pakistan Hacked

https://rfslswat.gov.pk

https://mail.rfslswat.gov.pk

https://school.rfslswat.gov.pk

Jai Hind
๐Ÿ”ฅ6๐Ÿ˜1๐Ÿ†1
Opportunity Update :

We are in search of Talented Guys who have skillset of

: Making Crypters
: Making FUD Trojans
: Doing Reverse Engineering
: Making Decompilers

Dm or send your Resume to Infosecpawan@gmail.com asap .
________
INDIANS ONLY...
๐Ÿ‘2๐Ÿ˜1
๐Ÿคฉ10 Best FREE Ethical Hacking Courses๐Ÿคฉ

With the increasing demand for skilled professionals to protect against cyber threats, taking a hacking course can be a valuable investment.

This blog will provide a list of the 10 best hacking courses for individuals interested in cybersecurity and improving their hacking skills.

Download:
bit.ly/BestHackingCourses

Share & Support โค๏ธ
DHCP Server Service Remote Code Execution Vulnerability

CVE-2023-28231 POC

Download
๐Ÿ‘2
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
๐Ÿ˜„ 312 Turkish Passports Leaked By ๐Ÿ‡ช๐Ÿ‡ธ @LegionLeaker ๐Ÿ‡ช๐Ÿ‡ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
โ—๏ธScammer ๐Ÿšซ
@MohammedKairz
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Public This Mother Fucker ๐Ÿ–•
Please open Telegram to view this post
VIEW IN TELEGRAM
https://medium.com/@lonewarriorco/mastering-osint-the-ultimate-guide-to-investigating-and-analyzing-publicly-available-information-370f265699da

In this blog I have mentioned:-
1.What truly osint stands for
2. Difference between Digital Forensics and OSint
3. The correct approach for osint
4. Place to learn the techniques of OSint
5. Jobs where osint is used as a skill

This may be helpful for both intermediate and beginners.
also suggest me for any edits.
๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
5 Common Web Application Vulnerabilities and How to Test for Them

READ full Article

bit.ly/3oQ4RsT

@trickypenguin

Share & Support ๐Ÿ™Œ
โค4
๐Ÿค” How to Write Bug Bounty Report ๐Ÿค”

Writing a clear and concise bug bounty report is crucial for helping developers identify and fix vulnerabilities.

In this article, we'll explore the key steps involved in writing a successful bug bounty report. We'll cover everything from providing a clear summary and detailed instructions to including supporting evidence and maintaining a professional tone.

By the end of this article, you'll have the knowledge you need to write a bug bounty report that helps keep software secure and reliable.

โœ…Link:
bit.ly/BugBountyReport

Share & Support โค๏ธ
๐Ÿ‘4
What To Do If Your PC Got Infected With Malware?

Malware, short for malicious software, is a type of software designed to harm computer
systems and networks. Malware can cause various degrees of damage, from minor inconvenience
to severe system failure.

Read Full Article: https://system32.ink/what-to-do-if-your-pc-got-infected-with-malware/
Watch latest movies and Get Free Courses on https://neplix.stream

Features of Neplix
1. Free Movies
2. Less Ads
3. Free Courses
4. Request for Movies

https://neplix.stream/courses
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
GraphQL For Pentesters

Iโ€™ll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.

Read Full Article: https://bit.ly/GraphQLForPentesters

@crackcodes @Mynk0x00
๐Ÿ”ด Don't Miss These Tutorials! (FREE)

๐ŸŒŸ CTF for Beginners: Get Started
๐Ÿ‘‰
bit.ly/CTFforBeginners

๐ŸŒŸ Best CTF Challenges for Beginners
๐Ÿ‘‰
bit.ly/CTFChallenges

๐ŸŒŸ How to Prepare for CTF to Succeed
๐Ÿ‘‰
bit.ly/PrepareForCTF

(Note: Click on First Website)

Just React & Make us Happy โ˜บ๏ธ
๐Ÿ‘2โคโ€๐Ÿ”ฅ1๐Ÿ‘ป1
Media is too big
VIEW IN TELEGRAM
Trap , brainwash And Transform
๐Ÿ‘7โคโ€๐Ÿ”ฅ2