CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
FREE Cybersecurity Courses! Save 1000s of dollars. You asked, and I listened! ๐Ÿ“ฃ Presenting a list of FREE cybersecurity courses just for you! ๐Ÿ’ป Seize this incredible opportunity! Bookmark this page and dive into my curated curriculum. Eager to learn Cybersecurity? Discover an all-inclusive Cybersecurity courses tailored just for you - at no cost! 29 free lessons to get you interview-ready and move ahead of 90% of people. Immerse yourself in top-notch tutorials and certifications โ€“ all meticulously crafted to turbocharge your skillset! ๐Ÿ™ Help me spread these free courses: like, share and comment! ๐Ÿ”1. Intro to Information Security by Udacity: https://lnkd.in/ggdYxnUp ๐Ÿ”2. Network Security by Udacity: https://lnkd.in/gSHx2tJQ ๐Ÿ”3. Introduction to Cybersecurity: https://lnkd.in/ghQY8cKA ๐Ÿ”4. Cybersecurity Essentials: https://lnkd.in/gZe6bf-t ๐Ÿ”5. Networking Essentials: https://lnkd.in/gjipDpgG ๐Ÿ”6. NSE 1,2 & 3: https://lnkd.in/gsQJhn2a ๐Ÿ”7. Information Security by OpenLearn: https://lnkd.in/gvfghKNs ๐Ÿ”8. Network Security by OpenLearn: https://lnkd.in/gS2KWNfN ๐Ÿ”9. Risk Management by Open Learn: https://lnkd.in/gGPTDU2g ๐Ÿ”10. Certified in Cybersecurityโ„  - CC: https://lnkd.in/gW3w8Jqu ๐Ÿ”11. CCNA Security Courses: https://lnkd.in/gfby3CR2 ๐Ÿ”12. Network Defense Essentials (NDE): https://lnkd.in/g6mRKt2t ๐Ÿ”13. Ethical Hacking Essentials (EHE): https://lnkd.in/gRBGCud7 ๐Ÿ”14. Digital Forensics Essentials (DFE): https://lnkd.in/gPrkYcDH ๐Ÿ”15. Dark Web, Anonymity, and Cryptocurrency: https://lnkd.in/gUrCCGdf ๐Ÿ”16. Digital Forensics by Open Learn: https://lnkd.in/gdv8emgt ๐Ÿ”17. AWS Cloud Certifications (Cybersecurity): https://lnkd.in/gaDGWdkm ๐Ÿ”18. Microsoft Learn for Azure: https://lnkd.in/gDpkXiik ๐Ÿ”19. Google Cloud Training: https://lnkd.in/get8rnkh ๐Ÿ”20. Android Bug Bounty Hunting: Hunt Like a Rat: https://lnkd.in/gMNT8saN ๐Ÿ”21. Vulnerability Management: https://lnkd.in/gvNKJnni ๐Ÿ”22. Software Security: https://lnkd.in/gG4P5bkn ๐Ÿ”23. Developing Secure Software: https://lnkd.in/gQRwTzKU ๐Ÿ”24. PortSwigger Web Hacking: https://lnkd.in/eEa-fNfu ๐Ÿ”25. RedTeaming: https://lnkd.in/et_T2DEa ๐Ÿ”26. Splunk: https://lnkd.in/et5bkjeY ๐Ÿ”27. Secure Software Development: https://lnkd.in/ebGpA4wG ๐Ÿ”28. Maryland Software Security: https://lnkd.in/e3z4zFmJ ๐Ÿ”29. Stanford Cyber Resiliency: https://lnkd.in/eg9BM5Bv ๐ŸŒŸ Enjoying my content? Stay in the loop! ๐ŸŒŸ
๐Ÿ‘Œ1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Free API Course (Premium Quality) !
Save 1000s of dollars.

Seize this incredible opportunity!

Bookmark this page and dive into my curated curriculum.

Eager to learn API?

Discover an all-inclusive API courses tailored just for you - at no cost!

13 free lessons to get you interview-ready and move ahead of 90% of people.

Immerse yourself in top-notch tutorials for designing, developing and testing APIs โ€“ all meticulously crafted to turbocharge your skillset!

๐Ÿ™ Help me spread these free courses: like, share and comment!

Follow these steps in the specified order to ensure success:


1. API and REST API Fundamentals - https://lnkd.in/e8eMet_k

2. API Methods - https://lnkd.in/ey9v7-hU

3. API Terminologies - https://lnkd.in/eRsPMzpd

4. API Authentication - https://lnkd.in/eNPfpAdE

5. API Status Codes - https://lnkd.in/egXizUrS

6. REST API vs GraphQL - https://lnkd.in/eZHREdgC

7. API Integration - https://lnkd.in/eDASPP5m

8. API Testing - https://lnkd.in/emgmWJqH

9. API with Python - https://lnkd.in/eM23ah2y

10. API Scaling - https://lnkd.in/e3mZSvmn

11. Designing and Developing Robust APIs - https://lnkd.in/eBXzbFyg

12. Designing APIs with Postman- https://lnkd.in/ezue3d4B

13. Testing APIs with Postman - https://lnkd.in/eCPnGTGi

Ready to take your APIs skills to the next level?

Try these free Premium quality courses to see immediate results.
โคโ€๐Ÿ”ฅ2๐Ÿ‘2๐Ÿ”ฅ1๐Ÿ‘Œ1
โ€‹โ€‹Hash Muncher

Grab NetNTLMv2 hashes using ETW with administrative rights on Windows.
โคโ€๐Ÿ”ฅ3
This media is not supported in your browser
VIEW IN TELEGRAM
bangladesh religious education.. that's how a terrorist born.. don't ask for reasons.. or people/religious stuff will be exposed badly ๐Ÿฅบ
๐Ÿ’ฏ6
Forwarded from ByteUpdates โšก
Google is now accepting registrations for new top-level domains (TLDs) that are meant to be used for personal pages, projects, and portfolios.

The new TLDs include .dad, .phd, .esq, and .prof, among others. The domains are in early access, and the registration fees will go down each day until May 10, when all of them will be available at normal prices.
SCCMHunter

SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. The basic function of the tool is to query LDAP with the find module for potential SCCM related assets. This is achieved through ACL recon of objects created during the deployment process when extending the AD schema, as well as by performing queries for the keywords โ€œSCCMโ€ or โ€œMECMโ€.

Download: https://system32.ink/news-feed/p/339/
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
PHISHING - DON'T BE A VICTIM

Learn how to protect yourself from phishing attacks with our comprehensive guide โ€ Phishing : Donโ€™t Be A Victim โ€ . Discover the different types of phishing and how to identify them, as well as the preventative measures you can take to safeguard yourself from cybercrime. Donโ€™t let scammers trick you into handing over sensitive information โ€“ read our guide now and stay safe online! ๐Ÿ”ฅ๐Ÿ˜พ

READ FULL BLOG ๐Ÿ‘‡๐Ÿ‘‡

http://cyberdemonsindia.42web.io/cyber-security/phishing-dont-be-a-victim/
CVE-2023-0386 | Linux Kernel Privilege Escalation

Enables an attacker with low-privileged user access on a Linux machine with an overlay mount containing a file capability in one of its layers to escalate their privileges up to root. The attacker can achieve this by copying a capable file from a nosuid mount into another mount.

Download: https://system32.ink/news-feed/p/340/
CVE-2023-0698 TALOS-2023-1693, Google Chrome WebRTC RTCStatsCollector OOB memory access vuln

๐Ÿ’ฅAn OOB memory access vulnerability exists in stats reporting functionality of the WebRTC implementation in Google Chrome 109.0.5414.74 and 108.0.5359.124. A specially crafted malicious web page can trigger an OOB access which can lead to type confusion and further memory corruption. A victim would need to navigate to a malicious webpage to trigger this vulnerability.

Download Exploit Poc:
https://system32.ink/news-feed/p/341/
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ 
โšก2
BHEH's XSSRocket

XSS Rocket is written by Black Hat Ethical Hacking with the help of
#ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Explore the FREE SQL resources that jump-started my career and can boost yours too!

A lot of people have asked me about the best places to learn SQL, so I've put together a list of free tools that helped me a lot.

I really like having a step-by-step plan for learning, and these resources make it easy and fun to keep going.

๐—™๐—ผ๐—ฟ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฟ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€:

๐Ÿ”ธ freecodecamp.org: https://lnkd.in/duCfNtTW
๐Ÿ”ธ Programming with Mosh: https://lnkd.in/dFT8UQ4x
๐Ÿ”ธ techTFQ: https://lnkd.in/d_aSwXpJ
๐Ÿ”ธ Alex the Analyst: https://lnkd.in/dCXcY82Z

๐—”๐—ฑ๐—ฑ๐—ถ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฟ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€:

๐Ÿ”ธ SQLBolt: http://sqlbolt.com
๐Ÿ”ธ SQLZoo: https://lnkd.in/dCa9Vwgv
๐Ÿ”ธ SQLTest: http://sqltest.net
๐Ÿ”ธ W3Schools.com: http://w3schools.com/sql/
๐Ÿ”ธ Codecademy: https://lnkd.in/d2J3956R

๐—ง๐—ผ ๐—ฝ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ:

๐Ÿ”ธ LeetCode: https://leetcode.com
๐Ÿ”ธ HackerRank: https://www.hackerrank.com
๐Ÿ”ธ DataLemur: https://datalemur.com

๐—™๐—ผ๐—ฟ ๐—ณ๐˜‚๐—ป ๐—ด๐—ฎ๐—บ๐—ฒ๐˜€ ๐—ผ๐—ป ๐—ฆ๐—ค๐—Ÿ:

๐Ÿ”ธ SQLZOO: https://sqlzoo.net/
๐Ÿ”ธ SQLBOLT: https://sqlbolt.com/
๐Ÿ”ธ SQL Murder Mystery: https://lnkd.in/dbw9JUY5

I hope these resources help you learn and master SQL in a fun and engaging way. Good luck on your journey!

๐ŸŒŸ Enjoying my content? Stay in the loop! ๐ŸŒŸ
---------
๐Ÿ‘1
๐Ÿ˜9๐Ÿ‘1๐Ÿซก1
This media is not supported in your browser
VIEW IN TELEGRAM
Chad Jaishankar ๐Ÿ”ฅ
โšก7
Wanted Terr0rist & Khalistan Commando Force head Paramjit Singh Panjwar aka Malik Sardar Singh neutralised by two unidentified gunmen in Johar Town, Lahore in #Pakistan

It's same town in which 26/11 Mumbai attack most wanted Hafiz saeed house is their.
๐Ÿ‘6๐Ÿ˜2
phpMyAdmin Exploit

Exploit Title : phpMyAdmin 5.1.1 - XSS (Cross-site Scripting)

Affected Versions : phpMyAdmin versions of the 5.1 branch prior to 5.1.2 are affected.
Offensive Web Testing Framework

OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST...
Forwarded from ByteUpdates โšก
The Indian Space Research Organisation (ISRO) is set to launch two missions in July 2023 - Chandrayaan 3 and Aditya L1.

Chandrayaan 3 will be the third moon mission and will have a lander and a rover, while Aditya L1 will be India's first-ever space mission to the sun.

The Aditya L1 mission aims to study the solar atmosphere and its impact on Earth.

The total budget for Aditya L1 is around Rs 378 crore, while the budget for Chandrayaan 3 is around Rs 615 crore.
๐Ÿ”ฅ11โค1โคโ€๐Ÿ”ฅ1๐Ÿ‘1