CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
*เค›เคคเฅเคฐเคชเคคเคฟ เคธเค‚เคญเคพเคœเฅ€ เคฎเคนเคพเคฐเคพเคœ เคœเฅ€ เค•เฅ€ เคœเคฏเค‚เคคเฅ€ เค•เฅ€ เคนเคพเคฐเฅเคฆเคฟเค• เคถเฅเคญเค•เคพเคฎเคจเคพเคเค‚เฅค*๐Ÿšฉ
โค3
โ€‹โ€‹Kovid Rootkit

A full-feature LKM intended for use against Linux kernel v5+.

https://github.com/carloslack/KoviD

#infosec #pentesting #redteam
โ€‹โ€‹Nimbo-C2

Nimbo-C2 agent supports x64 Windows & Linux. It's written in Nim, with some usage of .NET on Windows (by dynamically loading the CLR to the process). Nim is powerful, but interacting with Windows is much easier and robust using Powershell, hence this combination is made. The Linux agent is slimer and capable only of basic commands, including ELF loading using the memfd technique.

https://github.com/itaymigdal/Nimbo-C2

#infosec #pentesting #redteam
Forwarded from BlackEye๐Ÿฅท
โค2
A new blog on Advance Snort Introduction Detection and Prevention System

https://techofide.com/blogs/mastering-snort-an-intrusion-detection-and-prevention-system-step-by-step-guide/

Join our group for more cyber security content.

t.me/ethicalhackingtechofide
๐Ÿ‘2
MagSpoof

A portable device that can spoof/emulate any magnetic stripe, credit card or hotel card "wirelessly", even on standard magstripe (non-NFC/RFID) readers. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy.
๐Ÿ”ด How to Become a RED TEAM HACKER ๐Ÿ”ด

โคท A red team hacker is an authorized individual or group that performs simulated cyberattacks to identify vulnerabilities in an organization's systems and help improve its security.

โœ… Link:
bit.ly/RedTeamer

Share & Support โค๏ธ
WebSocket Pentration Testing

HTML5 has introduced many new powerful APIs, one of the more interesting components being websockets. These highlight a trend in web application development to remove or reduce the overhead of HTTP. Websockets are a direct TCP connection between the client browser and the webserver.

Read Article: https://bit.ly/WebSocket_PentrationTesting

@crackcodes
This media is not supported in your browser
VIEW IN TELEGRAM
โค6โšก1
๐Ÿ”ฅNETGEAR Routers: A Playground for Hackers?
Overall, the security posture of custom binaries built by NETGEAR contained many vulnerabilities, largely due to the widespread usage of insecure C functions such as strcpy, strcat, sprintf, or from off-by-one errors. However, the majority of the binaries on the NETGEAR router were compiled with many protections in place, including stack canaries, non-executable stack (NX), position-independent code (PIE) and address layout randomization (ASLR) enabled. These protections made many of the vulnerabilities identified difficult to exploit on their own.

Content:
๐Ÿ’พ Summary
๐Ÿ’พ Advisories
๐Ÿ’พ Vulnerabilities
๐Ÿ’ฝ Telnet
๐Ÿ“€ PSV-2023-0008 โ€“ Telnet Default Account Privilege Escalation Breakout
๐Ÿ’ฝ Web Application
๐Ÿ“€ PSV-2022-???? โ€“ JSON Response Stack Data Leak
๐Ÿ’ฝ SOAP Service
๐Ÿ“€ PSV-2023-0009 โ€“ Write HTTP Response Stack Pointer Leak
๐Ÿ“€ PSV-2022-???? โ€“ SOAPAction Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0010 โ€“ HTTP Body Off-By-One NULL Terminator Stack Canary Corruption
๐Ÿ“€ PSV-2023-0011 โ€“ HTTP Protocol Stack Buffer Overflow
๐Ÿ“€ PSV-2023-0012 โ€“ SOAP Parameters Stack Buffer Overflow
๐Ÿ’พ Conclusion
โšก1๐Ÿ‘1
๐Ÿ˜‰ Web Pentesting Roadmap for Success ๐Ÿ˜‰

Web pentesting is a process of finding and exploiting security vulnerabilities in web applications or websites to ensure their security. It involves gathering information about the target, identifying weaknesses, and providing recommendations for improvement.

๐Ÿš€Link:
bit.ly/Web-Pentesting-Roadmap

Share with Love๐Ÿ˜˜
๐Ÿ‘1
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
Malware is a type of software that is designed to cause harm to a computer or its users. It can be used to steal personal information, damage files, or even take control of a computer.

Read Full Article

https://trickypenguin.ink/what-is-malware-and-how-to-protect-against-malware-attacks/

#malware #botnets #torjan
โค5
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ’ฅ PoC for CVE-2023-32233(tested under Ubuntu 23.04)

Once the PoC is started on a vulnerable system, it may leave that system in an unstable state with corrupted kernel memory. We strongly recommend to test the PoC on a dedicated system to avoid potential data corruptions.

Download: https://system32.ink/news-feed/p/367/
โค3
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still "easy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance. 

In this Blogpost I want to explain, how I am normally performing reconnaissance during Pentests and for Bug Bounties.

Read Full Article
โคโ€๐Ÿ”ฅ3
Media is too big
VIEW IN TELEGRAM
How to save all post in private from public channel
Using bot
Post credit @its_me_dollar
@Deadlymalwarexpbot
โค1
g's hacker's ( its a bad day for me but โ€”โค๏ธ
โ€ผ๏ธHere we go again

Microsoft is scanning the inside of password-protected zip files for malware
read_more

#hacker_bano_chutiya_nhe ๐Ÿ˜ค
#fuck_Microsoft ๐Ÿ˜‚