CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
A new blog on OWASP ZAP Tool

A perfect tool for beginners to start their web application security testing journey

Here is the links to that blog:

https://techofide.com/blogs/owasp-zap-a-powerful-web-application-security-testing-tool/

Join our group for more such Cyber Security content:

t.me/ethicalhackingtechofide
๐Ÿ‘1
Windows UAC Bypass Script

Download
๐Ÿ”ฅ How to Start Bug Bounty for Beginners ๐Ÿ”ฅ

๐ŸŒŸ Topics Covered ๐Ÿ‘‡

โœ… Introduction
โœ… Advantages of bug bounty
โœ… Steps to become bug hunter
โœ… Scope of bug bounty
โœ… Skills required to become bug hunter
โœ… Tools required for bug hunting
โœ… Common vulnerabilities in bug hunting
โœ… Reporting & Communication best practices
โœ… Legal and Ethical Considerations
โœ… Finding and joining bug bounty programs
โœ… Tips & tricks for succeeding in bug bounty

๐Ÿ”— Link :
https://pentestingguide.com/bug-bounty-for-beginners/

(Click on Ads to Support us๐Ÿฅบ)

Share if you found it helpful โค๏ธ
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still โ€œeasy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance.

Read: https://bit.ly/AdvanceRecon_Guide
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
This media is not supported in your browser
VIEW IN TELEGRAM
Team insane right now๐Ÿ˜‚
๐Ÿ”ฅ4
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Forwarded from ONE-FOUR-ONE 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
Scada system of Chemical factory of porkis has been compromised by Team 1-4-1 ๐Ÿ‡ฎ๐Ÿ‡ณ
โคโ€๐Ÿ”ฅ5
CVE-2023-21554 Windows MessageQueuing PoC

Download
This media is not supported in your browser
VIEW IN TELEGRAM
Coercer

A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.
๐Ÿ”ฅ Bad Spin : Android Binder LPE

Privilege escalation exploit from unstrusted_app for Android Binder vulnerability (CVE-2022-20421).

Run from shell:

1๏ธโƒฃCompile the libbadspin.so library by typing make push in the src/ directory. This will also push the library to /data/local/tmp.

2๏ธโƒฃRun adb shell.

3๏ธโƒฃRun LD_PRELOAD=/data/local/tmp/libbadspin.so sleep 1. This will load the library and start the exploit.

Run from demo app:

1๏ธโƒฃCompile libbadspin.so by typing make push in the src/ directory. This will copy the library to the assets directory for the demo Android app.

2๏ธโƒฃCompile the demo Android app in the app/ directory. (You might need Android Studio to do this.)

3๏ธโƒฃRun the app and click on the "Exploit" button.

4๏ธโƒฃConsume logs using: adb logcat -s BADSPIN

Download
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
PayBack For Touching Indian Sites

@BlackDragonSec

#PKMB #PKMKB
โคโ€๐Ÿ”ฅ5
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
University of Dir Pakistan HACKED

https://uodir.edu.pk/
http://lms.uodir.edu.pk/

Mirror โœ…

@BlackDragonSec

Greetings to ALL INDIAN HACKERS

Jai Hind ๐Ÿ‡ฎ๐Ÿ‡ณ
โคโ€๐Ÿ”ฅ5๐Ÿ‘1
SSH Harvester | We get ssh passwords of users in plain text.

Well, yes, yes, yes, a couple of years ago there was an article that, during authorization, the ssh server spawns 2 processes, on one of which the pass rolls in the clear, in fact, at this moment it is pulled out.

In general, they put the script, fishing goes by itself
๐Ÿ‘6
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
It was not necessary to show these stupid stuff but for the shake of my son's (Top porkis hemkers) knowledge I'm showing you. Btw congratulations beta you are advance than us in that field. It's a shame though. Read Reference here .

#PKMKB FOREVER
๐Ÿ’ฏ2
PowerLessShell

PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.
๐Ÿ‘2
Website administrators invest significant efforts into securing their admin panels, the gateways to sensitive data and system controls. However, understanding the vulnerabilities that can lead to bypassing these panels is essential for both developers and security professionals.

https://system32.ink/mastering-website-admin-panel-bypass-techniques-2023/
๐Ÿ‘2