CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
University of Dir Pakistan HACKED

https://uodir.edu.pk/
http://lms.uodir.edu.pk/

Mirror โœ…

@BlackDragonSec

Greetings to ALL INDIAN HACKERS

Jai Hind ๐Ÿ‡ฎ๐Ÿ‡ณ
โคโ€๐Ÿ”ฅ5๐Ÿ‘1
SSH Harvester | We get ssh passwords of users in plain text.

Well, yes, yes, yes, a couple of years ago there was an article that, during authorization, the ssh server spawns 2 processes, on one of which the pass rolls in the clear, in fact, at this moment it is pulled out.

In general, they put the script, fishing goes by itself
๐Ÿ‘6
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
It was not necessary to show these stupid stuff but for the shake of my son's (Top porkis hemkers) knowledge I'm showing you. Btw congratulations beta you are advance than us in that field. It's a shame though. Read Reference here .

#PKMKB FOREVER
๐Ÿ’ฏ2
PowerLessShell

PowerLessShell rely on MSBuild.exe to remotely execute PowerShell scripts and commands without spawning powershell.exe. You can also execute raw shellcode using the same approach.
๐Ÿ‘2
Website administrators invest significant efforts into securing their admin panels, the gateways to sensitive data and system controls. However, understanding the vulnerabilities that can lead to bypassing these panels is essential for both developers and security professionals.

https://system32.ink/mastering-website-admin-panel-bypass-techniques-2023/
๐Ÿ‘2
Unveiling the Gallery & SMS Spy App: Setup and Installation Guide

Introduction:
In the world of technology, privacy and security are of paramount importance. For various reasons, individuals may find themselves needing to monitor and protect their personal data, particularly their photo gallery and SMS communications. The Gallery & SMS Spy App, an Android application accessible through Telegram, offers a comprehensive solution for monitoring and safeguarding these aspects of your digital life. This guide will walk you through the setup and installation process, ensuring a seamless experience with the app.

App Overview:
The Gallery & SMS Spy App leverages the capabilities of Telegram to provide a powerful and discreet method of monitoring your photo gallery and SMS messages. Key features of this app include:

1. Telegram Integration: The app operates within the Telegram messaging platform, making it easily accessible and convenient for users.

2. Photo and SMS Transfer: Users can send photos and SMS messages directly to the Telegram bot associated with the app, allowing for monitoring and storage of this data.

3. Undetectability (GalleryEye): The GalleryEye module of the app is designed to operate discreetly, ensuring that your photo gallery remains hidden and secure.

4. SmsEye Functionality: The SmsEye module provides the ability to monitor SMS messages, although it is worth noting that it may not be fully undetectable.

Setup and Installation:
Follow these steps to set up and install the Gallery & SMS Spy App:

1. Telegram Account: If you don't already have one, create an account on Telegram (available on Android and iOS) and log in.

2. Download App Files: Visit the provided link or source for the Gallery & SMS Spy App (please exercise caution when obtaining apps from unofficial sources).

3. Bot Creation: In Telegram, search for "BotFather" and create a new bot by following the provided instructions. Note down the generated bot token.

4. App Configuration: Open the app files you downloaded and locate the configuration file. Edit it using a text editor and enter your bot token in the designated field.

5. App Installation: Install the modified app file on the target Android device. Ensure that the device allows installations from unknown sources by enabling the "Unknown Sources" option in the device settings.

6. Launch the App: Open the installed app on the target device. Follow any on-screen prompts or instructions to complete the setup process.

7. Linking with the Bot: Once the app is launched, link it to the Telegram bot you created by providing the necessary credentials.

8. Sending Photos and SMS: You can now begin using the app by sending photos and SMS messages to the associated Telegram bot. This will allow you to monitor and store this data securely.

Note of Caution:
It is crucial to respect the privacy and legal considerations of individuals when using such apps. Ensure that you have proper authorization to monitor or access someone's photo gallery or SMS messages. Misuse or unethical use of this app may infringe upon privacy rights and potentially violate local laws.

Conclusion:
The Gallery & SMS Spy App offers a convenient and discreet means of monitoring and protecting your photo gallery and SMS communications. By following the setup and installation process outlined in this guide, you can leverage the app's features to enhance your privacy and security. Remember to use this app responsibly, respecting the privacy and legal boundaries of others. Safeguard your digital life effectively and ethically with the Gallery & SMS Spy App.
๐Ÿ‘3
Forwarded from โ˜ ๏ธLรจx Lรฉgรฎรธnโ˜ ๏ธ
Available Just @10$ for a 6 month

Indian Currency @800โ‚น for a 6 Month


Payment Method Accepted:-
UPI , USD (TRC20), BTC
โคโ€๐Ÿ”ฅ3
Especially when it comes to Bug Bounty hunting, reconnaissance is one of the most valuable things to do. There are still โ€œeasy winsโ€œ out there which can be found, if you have a good strategy when it comes to reconnaissance.

Read: https://bit.ly/AdvanceRecon_Guide
๐Ÿ‘2
๐Ÿ˜‰Learn How to Bypass 2FA & MFA๐Ÿ˜‰

Bypassing 2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) refers to the act of bypassing the additional security measures implemented to protect online accounts and systems.

๐Ÿš€Link:
bit.ly/Bypass2FA-MFA

Share with Loveโค๏ธ
๐Ÿ‘1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐—ฌ๐—ข๐—จ๐—ง๐—จ๐—•๐—˜ ๐—ช๐—”๐—ง๐—–๐—›๐—ง๐—œ๐— ๐—˜ ๐— ๐—˜๐—ง๐—›๐—ข๐——

โœNOTE :-  WITHOUT PC NO NEED RDP

1.FIRST DOWNLOAD LAMUR BROWSER

Link :
- https://play.google.com/store/apps/details?id=com.lemurbrowser.exts

2. ADD WINDSCRIPT EXTENSION AND MAKE NEW ACCOUNT

3. GO TO LAMUR BROWSE AND OPEN MULTIWINDOW TAB OPEN 1-1000 TAB

4. ALL TAP CONNECT  ANOTHER SERVER

5. PLAY YOUTUBE VIDEO LINK ALL TA
PS
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Top 50 Linux Commands You Must Know as a Regular User...

1. ls - view contents of directory (list)
2. pwd - path of the current directory
3. cd - change directoryn
4. mkdir - make new directory
5. mv - move files / rename files
6. cp - copy files
7. rm - remove files
8. touch - create blank new file
9. rmdir - delete directory
10. cat - list content of file to terminal
11. clear - clear terminal window
12. echo - move data into a file
13. less - Read text file one screen at a time
14. man - show manual of Linux commands
15. sudo - enables you to perform tasks that require administrative or root permissions
16. top - task manager in terminal
17. tar - used to archive multiple files into a tarball
18. grep - used to searching words in specific files
19. head - view first lines of any text file
20. tail - view last lines of any text file
21. diff - compares the contents of two files line by line
22. kill - used for killing unresponsive program
23. jobs - display all current jobs along with their statuses
24. sort - is a command line utility for sorting lines of text files
25. df - info about system disk
26. du - check how much space a file or directory takes
27. zip - to compress your files into a zip archive
28. unzip - to extract the zipped files from a zip archive
29. ssh - a secure encrypted connection between two hosts over and insecure network
30. cal - shows calendar
31. apt - command line tool for interaction with packaging system
32. alias - custom shortcuts used to represent a command
33. w - current user info
34. whereis - used to locate the binary, source, manual page files
35. whatis - used to get one-line man page description
36. useradd - used to create a new user
37. passwd - used to changing password of current user
38. whoami - print current user
39. uptime - print current time when machine starts
40. free - print free disk space info
41. history - print used commands history
42. uname - print detailed information about your Linux system
43. ping - to check connectivity status to a server
44. chmod - to change permissions of files and directories
45. chown - to change ownership of files and directories
46. find - using find searches for files and directories
47. locate - used to locate a file, just like the search command in Windows
48. ifconfig - print ip address stuff
49. ip a - similar to ifconfig but shortest print
50. finger - gives you a short dump of info about a user
โค1
Forwarded from BlackDragonSec ๐Ÿ‡ฎ๐Ÿ‡ณ
Top hacker team belongs to porkistan called team insane pk claimed to hack www.assamrifles.gov.in, they have posted a video on it also. Let me expose these tiktokers. Given picture is a screenshot of their published video.

[ Actual Site ]
independentpowerlifting.com
[+] IP >> 69.90.29.33
[+] HOST >> ns8.i-mecca.net


[ porkishemker claimed site ๐Ÿ—ฟ]
www.assamrifles.gov.in
[+] IP >> 210.212.14.161
[+] HOST >> mailgw.nic.in

Both site aren't hosted in same server even ๐Ÿ˜‚

NOTE : Hacker bano chutiya nhi
No matter how much tiktoker behaviour you show,
PKMKB Forever โ™พ๏ธ
โคโ€๐Ÿ”ฅ4โค1๐Ÿพ1๐Ÿ‘ป1
We have created a list of some best laptops for you according to your domain๐Ÿ‘‡

๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Best Laptops for Cyber Security
๐Ÿš€
bit.ly/CyberSecurityLaptops

๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Best Laptops for Programming
๐Ÿš€
bit.ly/ProgrammingLaptops

๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Best Laptops for Data Science
๐Ÿš€
bit.ly/DataScienceLaptops

๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Best Laptops for AI & ML
๐Ÿš€
bit.ly/AI-ML-Laptops

Share & Support โค๏ธ
OpenSquat: Safeguarding Against Cyber Squatting Threats with Open-Source Intelligence

In todayโ€™s digital landscape, cybersecurity threats continue to evolve and pose significant risks to individuals, organizations, and their online assets. One such threat is cyber squatting, which encompasses various malicious activities aimed at exploiting the reputation and brand identity of specific companies or domains.

https://system32.ink/opensquat-safeguarding-against-cyber-squatting-threats-with-open-source-intelligence/
๐Ÿ‘1
Stored HTML Injection in folderName Affecting Admin in TeamPass <3.0.9 - CVE-2023-2859 (POC)

One such vulnerability is the Stored HTML Injection in folderName, affecting the administration functionality of TeamPass versions prior to 3.0.9. This vulnerability allows an attacker to inject malicious HTML code into the folderName parameter, leading to potential cross-site scripting (XSS) attacks.

https://system32.ink/stored-html-injection-in-foldername-affecting-admin-in-teampass/