CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Port Forwarding With a Lifetime Static Address Without Router Video

Watch Video:
https://system32.ink/news-feed/p/356/

Direct Link:
https://system32.ink/bb-video-preview/Zm9yYmlkZGVuXzEzODA=/Zm9yYmlkZGVuXzEx
โคโ€๐Ÿ”ฅ1
SubDomainizer

A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Forwarded from pkg
Pakistan Biggest Urdu News Channel is under cyber attack.


Dunyatv Firewall Server Pic is kept for Representation. (Yes that pc from which pakis adding their unhacked servers into firewall assuming that they can kick us out, Lol xD)


Hi, Dunyatv when your soc's assessment completes and when you are assured that you successfully removed us from your firewall server or infra do ping insta : @pkg__divi ( Yours security personnel's Father )
๐Ÿ”ฅ4
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE)

Get a working portable Python/Git/Java environment on Windows in SECONDS without having local administrator, regardless of your broken Python environment. Our open-source script downloads directly from proper sources without any binaries. While the code may not be perfect, it includes many useful PowerShell tricks.
This media is not supported in your browser
VIEW IN TELEGRAM
wpfinger | WordPress scanning tool.

โ€ข Core version detection
โ€ข Plugin scanning through fingerprinting
โ€ข Vulnerability output, using database from Wordfence
๐Ÿ”ฅ2๐Ÿ’”1
๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Learn How to Get CYBER SECURITY INTERNSHIP๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

๐ŸŒ€Want to get cyber security internship? If yes then you don't have to miss this๐Ÿ˜
Know about secret and amazing tips which will surely work for youโ—

๐Ÿ”ดLink: https://pentestingguide.com/how-to-get-cyber-security-internship/

โค๏ธSHARE WITH LOVE๐Ÿ˜˜
๐Ÿ‘1
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (แดดแดฌแถœแดทแดธแดผแถœแดท)
SITE URL - https://www.comand.edu.pk/

PAYLOAD - id (GET)
Type: boolean-based blind
Title: AND boolean-based blind - WHERE or HAVING clause
Payload: id=1' AND 9657=9657-- kGMX

KHUD KE DESH KI SECURITYB SAMBHALO PEHLE CHUTIYO ๐Ÿ˜‚๐Ÿ˜‚

HACKED BY -
CYBER DEMONS INDIA ๐Ÿ‡ฎ๐Ÿ‡ณ

JAY SHREE RAAM ๐Ÿค’๐Ÿ™๐Ÿ‡ฎ๐Ÿ‡ณโค๏ธโค๏ธ
โค1
New Article is Out Check โœ…

Title : Top 7 Types of Operating System Used in Cyber Security

Hello and welcome back, fellow hackers, to another exciting article from yours truly. ๐Ÿคฉ

Today, weโ€™re going to dive into the fascinating world of operating systems used in cyber security.

Read Full Here ๐Ÿ‘‡
https://bit.ly/3NZ2b6x
This media is not supported in your browser
VIEW IN TELEGRAM
Om hari hari, jai shree ram ๐Ÿ™
๐Ÿ™8
This media is not supported in your browser
VIEW IN TELEGRAM
โ—๏ธ๐Ÿ‡ต๐Ÿ‡ฐ After 51 yrs PTI Chairman & Ex-PM of Pakistan Imran Khan admits the truth of East Pak (now Bangladesh) & blames Pak Army by saying Mujibur Rahman after winning the election should have been the PM but Pak Army did crackdown instead & end up losing with 90K POWs & humiliation
This media is not supported in your browser
VIEW IN TELEGRAM
Happy Mother's Day.
Media is too big
VIEW IN TELEGRAM
Jai Shree Ram ๐Ÿ”ฅ

Short By @VoidForReal
๐Ÿ”ฅ4๐Ÿฅฐ2
Forwarded from BlackEye๐Ÿฅท
This media is not supported in your browser
VIEW IN TELEGRAM
*เค›เคคเฅเคฐเคชเคคเคฟ เคธเค‚เคญเคพเคœเฅ€ เคฎเคนเคพเคฐเคพเคœ เคœเฅ€ เค•เฅ€ เคœเคฏเค‚เคคเฅ€ เค•เฅ€ เคนเคพเคฐเฅเคฆเคฟเค• เคถเฅเคญเค•เคพเคฎเคจเคพเคเค‚เฅค*๐Ÿšฉ
โค3
โ€‹โ€‹Kovid Rootkit

A full-feature LKM intended for use against Linux kernel v5+.

https://github.com/carloslack/KoviD

#infosec #pentesting #redteam
โ€‹โ€‹Nimbo-C2

Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.

https://github.com/itaymigdal/Nimbo-C2

#infosec #pentesting #redteam
Forwarded from BlackEye๐Ÿฅท
โค2
A new blog on Advance Snort Introduction Detection and Prevention System

https://techofide.com/blogs/mastering-snort-an-intrusion-detection-and-prevention-system-step-by-step-guide/

Join our group for more cyber security content.

t.me/ethicalhackingtechofide
๐Ÿ‘2
MagSpoof

A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.