CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿš€Google Dorks: Learn to Hack Anyone's Account with Google๐Ÿš€

โœ…What you'll learn?
โ€ข Complete understanding of Google Dorks
โ€ข How to find Vulnerabilities
โ€ข How to find anyone's Username & Password
โ€ข How to do Google search like a Hacker

๐Ÿ”—Link:
http://bit.ly/GoogleDorksForHacking

Share with Love๐Ÿ˜˜
web2shell

A Python program used to automate converting webshells into reverse shells. If you regularly do CTF, HTB, or red teaming you've probably spent a good chunk of time testing payloads to convert a webshell into a reverse shell. This tool aims to simplify this process.
CVE-2023-32243 | wordpress

Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalation

usage: exploit.py [-h] -u URL -p PASSWORD [-usr USERNAME]

Download Exploit
โค2
gg's hacker's ( I love you โ€”โค๏ธ
โ€ผ๏ธHere we go again
here we go again ๐ŸŽ‰
#OSINT

1โ‚พ
Visual Ping web page monitoring service,
helps to
track of changes on any particular website.
( hourly/everyday )

2โ‚พ
All the internet combines results from
different search engines and social media.

3โ‚พ izito searches and combines all Search Engines!
Yahoo, Microsoft Bing, YouTube, Wikipedia, Entireweb etc...

#exploit
1. CVE-2023-1586:
Avast Anti-Virus privileged arbitrary file create on virus restore

and as always #hacker_bano_chutiya_nhe ๐Ÿ˜๐Ÿ˜
โšก2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
OEBuilder | Hack Using Excel And Doc

OEBuilder uunique assembly, crypter and macro generator for stitching your bootloader into the doc file. The software is very convenient and understandable.

Features:

*Fake Error
*UAC Bypass
*Add password to doc
*add text
*USG
*DOC
*XLS
*Silent add ons
A new blog on OWASP ZAP Tool

A perfect tool for beginners to start their web application security testing journey

Here is the links to that blog:

https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/

Join our group for more such Cyber Security content:

t.me/ethicalhackingtechofide
๐Ÿ‘1
Windows UAC Bypass Script

Download
๐Ÿ”ฅ How to Start Bug Bounty for Beginners ๐Ÿ”ฅ

๐ŸŒŸ Topics Covered ๐Ÿ‘‡

โœ… Introduction
โœ… Advantages of bug bounty
โœ… Steps to become bug hunter
โœ… Scope of bug bounty
โœ… Skills required to become bug hunter
โœ… Tools required for bug hunting
โœ… Common vulnerabilities in bug hunting
โœ… Reporting & Communication best practices
โœ… Legal and Ethical Considerations
โœ… Finding and joining bug bounty programs
โœ… Tips & tricks for succeeding in bug bounty

๐Ÿ”— Link :
https://pentestingguide.com/bug-bounty-for-beginners/

(Click on Ads to Support us๐Ÿฅบ)

Share if you found it helpful โค๏ธ
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still โ€œeasy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance.

Read: https://bit.ly/AdvanceRecon_Guide
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
This media is not supported in your browser
VIEW IN TELEGRAM
Team insane right now๐Ÿ˜‚
๐Ÿ”ฅ4
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Scada system of Chemical factory of porkis has been compromised by Team 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
โคโ€๐Ÿ”ฅ5
CVE-2023-21554 Windows MessageQueuing PoC

Download
This media is not supported in your browser
VIEW IN TELEGRAM
Coercer

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.