CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Google Dorking for Penetration Testers

What is Google Dorking?

Dorking, also known as Google Dorking, is a technique used by hackers and penetration testers to search for sensitive information...

Read More

bit.ly/3oYWPxT

@trickypenguin
๐Ÿ‘3
WebSocket Pentration Testing

HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP.

Read : https://system32.ink/websocket-pentration-testing/
๐Ÿ‘3
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
INDONESIANA MADRASAH APPLICATION SERVER HACKED

Play Store Link :

https://play.google.com/store/apps/details?id=id.hdmadrasah.rdm

App Store Link :

https://apps.apple.com/us/app/rdm-rapor-digital-madrasah/id1604487156

Database will be leaked Soon

#BlackDragonSec
#OpsPayBack

Greetz To All Indian Hackers
โค3
How To Recover Deleted Data From Pendrive And HardDisk

When a file is deleted, the meta-information about this file (file name, date/time, size, location of the first data block/cluster, etc.) is lost; for example, in an ext3/ext4 file system, the names of deleted files are still present, but the location of the first data block is removed. This means the data is still present on the file system, but only until some or all of it is overwritten by new file data.

Read Article: https://bit.ly/Recover_data

@crackcodes
๐Ÿ˜ 5 ANIME BASED ON HACKING ๐Ÿ˜

There are several anime series and movies that feature hacking as a central theme. Here we have listed 5 best animes for you.

With these anime, you will not only enjoy but also increase your knowledge of hacking & programming.

โœ… Link :
bit.ly/AnimeOnHacking

Share & Support โค๏ธ
๐˜ผ๐™ช๐™ฉ๐™๐™š๐™ฃ๐™ฉ๐™ž๐™˜๐™–๐™ฉ๐™ž๐™ค๐™ฃ ๐™ซ๐™จ ๐˜ผ๐™ช๐™ฉ๐™๐™ค๐™ง๐™ž๐™ฏ๐™–๐™ฉ๐™ž๐™ค๐™ฃ

๐™‡๐™ž๐™ฃ๐™ : https://youtube.com/shorts/RFFDrICrAXc?feature=๐™จ๐™๐™–๐™ง๐™š



๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก ๐™›๐™ค๐™ง ๐™ข๐™ค๐™ง๐™š ๐™ช๐™ฅ๐™˜๐™ค๐™ข๐™ž๐™ฃ๐™œ ๐˜พ๐™ฎ๐™—๐™š๐™ง ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐™‘๐™ž๐™™๐™š๐™ค๐™จ ๐Ÿ™
Signal-zeroday-exploit

Signal RCE vulnerability found in contact exchange API
Usage:

python poc.py -t [TARGET PHONE #] -i [IP HERE] -p [PORT HERE]

Download: https://system32.ink/news-feed/p/333/
Telegram-0day-exploit-poc


Zero Day revshell exploit tool for Remote Code Execution vulnerability found in Telegram's bot api broadcast_msg api call.

Usage:

python poc.py -u [TELEGRAM USER] -i [IP HERE] -p [PORT HERE]

Download: https://system32.ink/news-feed/p/334/
Install and Use Intrusion detection system Snort

https://techofide.com/blogs/snort-intrusion-detection-system-prevention-system-installation-use-in-linux/

Join our group for more cyber security content

t.me/ethicalhackingtechofide
๐Ÿ˜ฑ13๐Ÿ˜3๐Ÿซก1
DNSRecon

Dnsrecon is one of the popular scripts in the security community which is used for reconnaissance on domains. This script is written in python language.

This script checks all the DNS records for AXFR which can be useful for a security researcher for DNS enumeration on all types of records such as SOA, NS, TXT, SVR, SPF, etc.
WhatsApp OSINT Tool

Logs online/offline events from ANYONE in the world.
Forwarded from d.
WebSocket Pentration Testing

HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP. Websockets are a direct TCP connection between the client browser and the webserver.

Read Article: https://bit.ly/WebSocket_PentrationTesting

@crackcodes
Forwarded from LegionLeaker๐Ÿดโ€โ˜ ๏ธ
Media is too big
VIEW IN TELEGRAM
๐Ÿ‡ช๐Ÿ‡ธLaravel Scanner ๐Ÿ‡ช๐Ÿ‡ธ
-={SHELL, SMTP, AWS, TWILIO, SSH, NEXMO, PERFECTMONEY, DB,ENV}=- ๐Ÿ‡จ๐Ÿ‡ณ


๐Ÿ’ฐPrice :150$
๐Ÿ’ŽVIPMember : 100$

For buy : @Hajit00n
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
FREE Cybersecurity Courses! Save 1000s of dollars. You asked, and I listened! ๐Ÿ“ฃ Presenting a list of FREE cybersecurity courses just for you! ๐Ÿ’ป Seize this incredible opportunity! Bookmark this page and dive into my curated curriculum. Eager to learn Cybersecurity? Discover an all-inclusive Cybersecurity courses tailored just for you - at no cost! 29 free lessons to get you interview-ready and move ahead of 90% of people. Immerse yourself in top-notch tutorials and certifications โ€“ all meticulously crafted to turbocharge your skillset! ๐Ÿ™ Help me spread these free courses: like, share and comment! ๐Ÿ”1. Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp ๐Ÿ”2. Network Security by Udacity: https://lnkd.in/gSHx2tJQ ๐Ÿ”3. Introduction to Cybersecurity: https://lnkd.in/ghQY8cKA ๐Ÿ”4. Cybersecurity Essentials: https://lnkd.in/gZe6bf-t ๐Ÿ”5. Networking Essentials: https://lnkd.in/gjipDpgG ๐Ÿ”6. NSE 1,2 & 3: https://lnkd.in/gsQJhn2a ๐Ÿ”7. Information Security by OpenLearn: https://lnkd.in/gvfghKNs ๐Ÿ”8. Network Security by OpenLearn: https://lnkd.in/gS2KWNfN ๐Ÿ”9. Risk Management by Open Learn: https://lnkd.in/gGPTDU2g ๐Ÿ”10. Certified in Cybersecurityโ„  - CC: https://lnkd.in/gW3w8Jqu ๐Ÿ”11. CCNA Security Courses: https://lnkd.in/gfby3CR2 ๐Ÿ”12. Network Defense Essentials (NDE): https://lnkd.in/g6mRKt2t ๐Ÿ”13. Ethical Hacking Essentials (EHE): https://lnkd.in/gRBGCud7 ๐Ÿ”14. Digital Forensics Essentials (DFE): https://lnkd.in/gPrkYcDH ๐Ÿ”15. Dark Web, Anonymity, and Cryptocurrency: https://lnkd.in/gUrCCGdf ๐Ÿ”16. Digital Forensics by Open Learn: https://lnkd.in/gdv8emgt ๐Ÿ”17. AWS Cloud Certifications (Cybersecurity): https://lnkd.in/gaDGWdkm ๐Ÿ”18. Microsoft Learn for Azure: https://lnkd.in/gDpkXiik ๐Ÿ”19. Google Cloud Training: https://lnkd.in/get8rnkh ๐Ÿ”20. Android Bug Bounty Hunting: Hunt Like a Rat: https://lnkd.in/gMNT8saN ๐Ÿ”21. Vulnerability Management: https://lnkd.in/gvNKJnni ๐Ÿ”22. Software Security: https://lnkd.in/gG4P5bkn ๐Ÿ”23. Developing Secure Software: https://lnkd.in/gQRwTzKU ๐Ÿ”24. PortSwigger Web Hacking: https://lnkd.in/eEa-fNfu ๐Ÿ”25. RedTeaming: https://lnkd.in/et_T2DEa ๐Ÿ”26. Splunk: https://lnkd.in/et5bkjeY ๐Ÿ”27. Secure Software Development: https://lnkd.in/ebGpA4wG ๐Ÿ”28. Maryland Software Security: https://lnkd.in/e3z4zFmJ ๐Ÿ”29. Stanford Cyber Resiliency: https://lnkd.in/eg9BM5Bv ๐ŸŒŸ Enjoying my content? Stay in the loop! ๐ŸŒŸ
๐Ÿ‘Œ1