CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ (Prapatti ็ˆชใ„šๅ‡ าœ)
GraphQL For Pentesters

Iโ€™ll showcase several GraphQL vulnerabilities and attacks, how they work and how to exploit them as well as illustrations with POCs.

Read Full Article: https://bit.ly/GraphQLForPentesters

@crackcodes @Mynk0x00
๐Ÿ”ด Don't Miss These Tutorials! (FREE)

๐ŸŒŸ CTF for Beginners: Get Started
๐Ÿ‘‰
bit.ly/CTFforBeginners

๐ŸŒŸ Best CTF Challenges for Beginners
๐Ÿ‘‰
bit.ly/CTFChallenges

๐ŸŒŸ How to Prepare for CTF to Succeed
๐Ÿ‘‰
bit.ly/PrepareForCTF

(Note: Click on First Website)

Just React & Make us Happy โ˜บ๏ธ
๐Ÿ‘2โคโ€๐Ÿ”ฅ1๐Ÿ‘ป1
Media is too big
VIEW IN TELEGRAM
Trap , brainwash And Transform
๐Ÿ‘7โคโ€๐Ÿ”ฅ2
๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ปPenetration Tester Full Roadmap๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

If you want to become a penetration tester or an ethical hacker then you should not miss this post!

What you'll know?
โœ… How to become ethical hacker
โœ… Salary of ethical hacker
โœ… Certifications required to become hacker
โœ… Skills required to become hacker
โœ… Do you need a degree or not

๐Ÿ”—Link:
bit.ly/PentesterRoadmap

Share and Support usโ™ฅ๏ธ
Buffer Overflow to RCE Root Shell

Buffer overflows were an earth-shattering vulnerability exploited in the late 1980โ€™s that are protected against on modern systems. That said, they are still relevant, and pave the way to learning more advanced exploits.

Read Full Article: https://bit.ly/BOF_to_RCE

@crackcodes
๐˜ฝ๐™ช๐™œ ๐™๐™ฎ๐™ฅ๐™š : Reflected XSS

๐™‹๐™ก๐™š๐™–๐™จ๐™š ๐™จ๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™

๐˜พ๐™ค๐™ช๐™ง๐™จ๐™š ๐™‡๐™ž๐™ฃ๐™ : https://youtu.be/NOmEO5GsS7w

โ˜บ๏ธ๐Ÿ™Œ
๐Ÿ‘1
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
Pokries.rar
313.2 MB
PASS : INDIAISYOURDAD


Greetz to All Indian Hackers

Jai Hind ๐Ÿ‡ฎ๐Ÿ‡ณ


@BlackDragonSec
Forwarded from Team BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ (BlackDragonSec)
Media is too big
VIEW IN TELEGRAM
Beta remember your still from my bloodline, your my son๐Ÿ™ƒ๐Ÿ‘‹๐Ÿป

Beta baap baap hotha hea
โคโ€๐Ÿ”ฅ4
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
A Beginnerโ€™s Guide to Ethical Hacking and Bug Hunting

READ FULL BLOG ๐Ÿ‘‡๐Ÿ‘‡

https://cyberdemonsindia.42web.io/2023/04/28/a-beginners-guide-to-ethical-hacking-and-bug-hunting/

แดŠแดษชษด แด›สœแด‡ สŸแด‡แด€ษขแดœแด‡ แด๊œฐ แด„สส™แด‡ส€ แด…แด‡๊œฐแด‡ษดแด…แด‡ส€๊œฑ แด€ษดแด… ส™แด‡แด„แดแดแด‡ แด€ษด แด‡แด›สœษชแด„แด€สŸ สœแด€แด„แด‹แด‡ส€ แด€ษดแด… ส™แดœษข สœแดœษดแด›แด‡ส€ แดกษชแด›สœ แดแดœส€ แด„แดแดแด˜ส€แด‡สœแด‡ษด๊œฑษชแด แด‡ ส™แด‡ษขษชษดษดแด‡ส€โ€™๊œฑ ษขแดœษชแด…แด‡. แดœษดสŸแดแด„แด‹ แด›สœแด‡ ๊œฑแด‡แด„ส€แด‡แด›๊œฑ แด๊œฐ แด‡แด›สœษชแด„แด€สŸ สœแด€แด„แด‹ษชษดษข แด€ษดแด… ส™แดœษข สœแดœษดแด›ษชษดษข แด€ษดแด… แดแด€แด‹แด‡ สแดแดœส€ แดแด€ส€แด‹ ษชษด แด›สœแด‡ แด‡แด แด‡ส€-แด‡แด แดสŸแด ษชษดษข แดกแดส€สŸแด… แด๊œฐ แด„สส™แด‡ส€๊œฑแด‡แด„แดœส€ษชแด›ส. สŸแด‡แด›โ€™๊œฑ แด…ษชแด แด‡ ษชษด แด€ษดแด… ๊œฑแด›แด€ส€แด› สแดแดœส€ แดŠแดแดœส€ษดแด‡ส แด›แดแด…แด€ส!
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Google Dorking for Penetration Testers

What is Google Dorking?

Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...

Read More

bit.ly/3oYWPxT

@trickypenguin
๐Ÿ‘3
WebSocket Pentration Testing

HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP.

Read : https://system32.ink/websocket-pentration-testing/
๐Ÿ‘3
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
INDONESIANA MADRASAH APPLICATION SERVER HACKED

Play Store Link :

https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm

App Store Link :

https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156

Database will be leaked Soon

#BlackDragonSec
#OpsPayBack

Greetz To All Indian Hackers
โค3
How To Recover Deleted Data From Pendrive And HardDisk

When a file is deleted, the meta-information about this file (file name, date/time, size, location of the first data block/cluster, etc.) is lost; for example, in an ext3/ext4 file system, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the file system, but only until some or all of it is overwritten by new file data.

Read Article: https://bit.ly/Recover_data

@crackcodes
๐Ÿ˜ 5 ANIME BASED ON HACKING ๐Ÿ˜

There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.

With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.

โœ… Link :
bit.ly/AnimeOnHacking

Share & Support โค๏ธ
๐˜ผ๐™ช๐™ฉ๐™๐™š๐™ฃ๐™ฉ๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™ซ๐™จ ๐˜ผ๐™ช๐™ฉ๐™๐™ค๐™ง๐™ž๐™ฏ๐™–๐™ฉ๐™ž๐™ค๐™ฃ

๐™‡๐™ž๐™ฃ๐™ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐™จ๐™๐™–๐™ง๐™š



๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก ๐™›๐™ค๐™ง ๐™ข๐™ค๐™ง๐™š ๐™ช๐™ฅ๐™˜๐™ค๐™ข๐™ž๐™ฃ๐™œ ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™‘๐™ž๐™™๐™š๐™ค๐™จ ๐Ÿ™