CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
โ€‹โ€‹Hash Muncher

Grab NetNTLMv2 hashes using ETW with administrative rights on Windows.
โคโ€๐Ÿ”ฅ3
This media is not supported in your browser
VIEW IN TELEGRAM
bangladesh religious education.. that's how a terrorist born.. don't ask for reasons.. or people/religious stuff will be exposed badly ๐Ÿฅบ
๐Ÿ’ฏ6
Forwarded from ByteUpdates โšก
Google is now accepting registrations for new top-level domains (TLDs) that are meant to be used for personal pages, projects, and portfolios.

The new TLDs include .dad, .phd, .esq, and .prof, among others. The domains are in early access, and the registration fees will go down each day until May 10, when all of them will be available at normal prices.
SCCMHunter

SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. The basic function of the tool is to query LDAP with the find module for potential SCCM related assets. This is achieved through ACL recon of objects created during the deployment process when extending the AD schema, as well as by performing queries for the keywords โ€œSCCMโ€ or โ€œMECMโ€.

Download: https://system32.ink/news-feed/p/339/
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
PHISHING - DON'T BE A VICTIM

Learn how to protect yourself from phishing attacks with our comprehensive guide โ€ Phishing : Donโ€™t Be A Victim โ€ . Discover the different types of phishing and how to identify them, as well as the preventative measures you can take to safeguard yourself from cybercrime. Donโ€™t let scammers trick you into handing over sensitive information โ€“ read our guide now and stay safe online! ๐Ÿ”ฅ๐Ÿ˜พ

READ FULL BLOG ๐Ÿ‘‡๐Ÿ‘‡

http://cyberdemonsindia.42web.io/cyber-security/phishing-dont-be-a-victim/
CVE-2023-0386 | Linux Kernel Privilege Escalation

Enables an attacker with low-privileged user access on a Linux machine with an overlay mount containing a file capability in one of its layers to escalate their privileges up to root. The attacker can achieve this by copying a capable file from a nosuid mount into another mount.

Download: https://system32.ink/news-feed/p/340/
CVE-2023-0698 TALOS-2023-1693, Google Chrome WebRTC RTCStatsCollector OOB memory access vuln

๐Ÿ’ฅAn OOB memory access vulnerability exists in stats reporting functionality of the WebRTC implementation in Google Chrome 109.0.5414.74 and 108.0.5359.124. A specially crafted malicious web page can trigger an OOB access which can lead to type confusion and further memory corruption. A victim would need to navigate to a malicious webpage to trigger this vulnerability.

Download Exploit Poc:
https://system32.ink/news-feed/p/341/
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ 
โšก2
BHEH's XSSRocket

XSS Rocket is written by Black Hat Ethical Hacking with the help of
#ChatGPT as experimentation, with a lot of hours spent modifying the code generated by ChatGPT, and is designed for Offensive Security and XSS (Cross-Site Scripting) attacks.
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Explore the FREE SQL resources that jump-started my career and can boost yours too!

A lot of people have asked me about the best places to learn SQL, so I've put together a list of free tools that helped me a lot.

I really like having a step-by-step plan for learning, and these resources make it easy and fun to keep going.

๐—™๐—ผ๐—ฟ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฟ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€:

๐Ÿ”ธ freecodecamp.org: https://lnkd.in/duCfNtTW
๐Ÿ”ธ Programming with Mosh: https://lnkd.in/dFT8UQ4x
๐Ÿ”ธ techTFQ: https://lnkd.in/d_aSwXpJ
๐Ÿ”ธ Alex the Analyst: https://lnkd.in/dCXcY82Z

๐—”๐—ฑ๐—ฑ๐—ถ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฟ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€:

๐Ÿ”ธ SQLBolt: http://sqlbolt.com
๐Ÿ”ธ SQLZoo: https://lnkd.in/dCa9Vwgv
๐Ÿ”ธ SQLTest: http://sqltest.net
๐Ÿ”ธ W3Schools.com: http://w3schools.com/sql/
๐Ÿ”ธ Codecademy: https://lnkd.in/d2J3956R

๐—ง๐—ผ ๐—ฝ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ:

๐Ÿ”ธ LeetCode: https://leetcode.com
๐Ÿ”ธ HackerRank: https://www.hackerrank.com
๐Ÿ”ธ DataLemur: https://datalemur.com

๐—™๐—ผ๐—ฟ ๐—ณ๐˜‚๐—ป ๐—ด๐—ฎ๐—บ๐—ฒ๐˜€ ๐—ผ๐—ป ๐—ฆ๐—ค๐—Ÿ:

๐Ÿ”ธ SQLZOO: https://sqlzoo.net/
๐Ÿ”ธ SQLBOLT: https://sqlbolt.com/
๐Ÿ”ธ SQL Murder Mystery: https://lnkd.in/dbw9JUY5

I hope these resources help you learn and master SQL in a fun and engaging way. Good luck on your journey!

๐ŸŒŸ Enjoying my content? Stay in the loop! ๐ŸŒŸ
---------
๐Ÿ‘1
๐Ÿ˜9๐Ÿ‘1๐Ÿซก1
This media is not supported in your browser
VIEW IN TELEGRAM
Chad Jaishankar ๐Ÿ”ฅ
โšก7
Wanted Terr0rist & Khalistan Commando Force head Paramjit Singh Panjwar aka Malik Sardar Singh neutralised by two unidentified gunmen in Johar Town, Lahore in #Pakistan

It's same town in which 26/11 Mumbai attack most wanted Hafiz saeed house is their.
๐Ÿ‘6๐Ÿ˜2
phpMyAdmin Exploit

Exploit Title : phpMyAdmin 5.1.1 - XSS (Cross-site Scripting)

Affected Versions : phpMyAdmin versions of the 5.1 branch prior to 5.1.2 are affected.
Offensive Web Testing Framework

OWASP OWTF is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST...
Forwarded from ByteUpdates โšก
The Indian Space Research Organisation (ISRO) is set to launch two missions in July 2023 - Chandrayaan 3 and Aditya L1.

Chandrayaan 3 will be the third moon mission and will have a lander and a rover, while Aditya L1 will be India's first-ever space mission to the sun.

The Aditya L1 mission aims to study the solar atmosphere and its impact on Earth.

The total budget for Aditya L1 is around Rs 378 crore, while the budget for Chandrayaan 3 is around Rs 615 crore.
๐Ÿ”ฅ11โค1โคโ€๐Ÿ”ฅ1๐Ÿ‘1
๐ŸŽฏ Web Pentesting RoadMap ๐ŸŽฏ

Web pentesting is the practice of identifying security vulnerabilities in web applications and websites, in order to improve their security.

It involves finding weaknesses that could be exploited by malicious actors, and recommending measures to mitigate these risks. In this blog, we will discuss a roadmap for becoming a successful web pentester.

Link:
bit.ly/WebPentestingRoadmap

Share & Support โค๏ธ
๐Ÿ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
Congress's Telangana manifesto that every Karnataka voter must listen to.

โ–ช๏ธAll government contracts to Muslim youths.

โ–ช๏ธ20 lakh financial aid to poor Muslim students.

โ–ช๏ธResidential schools for Muslims only.

โ–ช๏ธHospitals for minorities only.

โ–ช๏ธFree electricity supply to Masjid and Churches.
๐˜ฝ๐™ช๐™œ ๐™๐™ฎ๐™ฅ๐™š: Stored XSS

Course Link: https://youtu.be/uUmMc05iFuo

Please Share your views
&
๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™๐Ÿป

๐™๐™๐™–๐™ฃ๐™ ๐™จ ๐™›๐™ค๐™ง ๐™ฎ๐™ค๐™ช๐™ง ๐™Ž๐™ช๐™ฅ๐™ฅ๐™ค๐™ง๐™ฉ. โ˜บ๏ธ