CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Here are some suggestions for practicing Python:

Write code: One of the best ways to practice Python is to write code. You can start by working through tutorials and exercises to get a feel for the language, and then try writing your own small programs.
Solve problems: There are many websites and resources that offer programming challenges and exercises. You can use these to practice your Python skills by solving problems and writing code to solve them.
Work on a project: Choose a project that interests you and use Python to build it. This could be a simple program or a more complex application. Working on a project will give you a chance to apply your skills and learn new concepts.
Join a community: There are many online communities and forums where you can ask questions and get help with your Python learning. You can also join local meetups or groups to connect with other Python learners and developers.
Use online resources: There are many online resources and tutorials available for learning Python. You can use these to learn new concepts and practice your skills.
Remember to be patient and persistent as you practice Python. It can take time to become proficient in any new skill, but with practice and dedication, you will improve.
โค2
๐Ÿ’ฅCVE-2017-6195 (SQL-Injection in MOVEit Transfer aka MOVEit DMZ)

https://system32.ink/d/cve-2017-6195-exploit/
*โš ๏ธ Researchers claim Windows โ€œbackdoorโ€ affects hundreds of Gigabyte motherboards โš ๏ธ*

_It's a backdoor, Jim, but not as we know it... here's a sober look at this issue._

Link:https://nakedsecurity.sophos.com/2023/06/02/researchers-claim-windows-backdoor-affects-hundreds-of-gigabyte-motherboards/

via _"Naked Security"_

#hacker_bano_chutiya_nhe ๐Ÿซ‚
Forwarded from Bug Hunting Resources
Leak Databases:

๐Ÿ‘‰๐ŸปLeak bamsi org : https://system32.ink/d/leak-bamsi-org/

๐Ÿ‘‰๐ŸปAl Tamimi: https://system32.ink/d/leak-tamimi-com/

Tools:

๐Ÿ‘‰๐ŸปKittyStager: https://system32.ink/members/mcracker2002/activity/392/

A simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this project is to be able to have a web server and some kitten and be able to use the with any shellcode.
๐Ÿ”ฅ2
Real time attempts to break into my servers by attackers trying to guess usernames and passwords. No legitimate services are offered on the addresses receiving these attempts, so there is no chance of a real user accidently submitting their credentials. (Yes things other than SSH occasionally show up)

brute.fail
I Want A VPS If SomeOne VPS Seller Contact Me

@MynK0x00
๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ปBest ASUS Laptop for Programming๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

ASUS laptops for programming are known for their powerful performance, including fast processors and ample RAM. They also feature high-quality displays, which are crucial for coding and viewing code.

๐Ÿš€Link:
https://pentestingguide.com/asus-laptop-for-programming/
๐Ÿ–ฅTools:

๐Ÿ‘‰๐ŸปLightsOut : Generate an obfuscated DLL that will disable AMSI & ETW

https://system32.ink/d/lightsout-generate-an-obfuscated-dll-that-will-disable-amsi-etw/

๐Ÿ‘‰๐ŸปBinder Trace is a tool for intercepting and parsing(trace, filter and inspect) Android Binder messages. Think of it as "Wireshark for Binder".
Very useful when Android reversing and VR.

https://system32.ink/d/%f0%9f%92%a5binder-trace/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Forwarded from WE ARE BLOODNET
==================
โ˜ ๏ธ[SITE]: https://mopa(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/10228d8bkb16
==================
โ˜ ๏ธ[SITE]: https://pifra(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/10227de5k96a
==================
โ˜ ๏ธ[SITE]: https://pspc(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/10227e1fk490

==================
โ˜ ๏ธ[SITE]: https://nspp(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/102287b0kee8
==================
โ˜ ๏ธ[SITE]: http://csa(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/10229174kc21
==================
โ˜ ๏ธ[SITE]: http://ecopsc(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/1022926bkfa8
==================
โ˜ ๏ธ[SITE]: https://pbrr(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/1022971ak781
==================
โ˜ ๏ธ[SITE]: http://ncndt(.)org(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/1022a280ke5d
==================
โ˜ ๏ธ[SITE]: https://onsa(.)gov(.)pk

โ™พ๏ธ[PROOF]: https://check-host.net/check-report/1022a481ke39
==================
#FuckNato
#BLOODNET
#Phoenix
#PhoenixALLIANCE
#DDoS_Attack
=========BLOODNET========
Forwarded from CYBER DEMONS (INDIA๐Ÿ‡ฎ๐Ÿ‡ณ) ๐Ÿค–CHANNEL๐Ÿค– (HackLock)
SO HERE'S THE CHANNEL FOR YOU GUYS WHERE WE WILL GONNA POST ALL POSSIBLE JOBS AND INTERNSHIPS OFFERS IN INDIA FOR FRESHERS AND EXPERIENCED BOTH โœŒ๏ธ๐Ÿ‡ฎ๐Ÿ‡ณ

๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

https://t.me/cyberdemonsindiaDDJ


TEAM @cyberdemonsindia ๐Ÿ‡ฎ๐Ÿ‡ณ

JAY SHREE RAAM ๐Ÿฅฐ
Injecting scripts into web pages

Draining the theme of injections, chromium extension for working with bots

Functional:

Injecting scripts into web pages

Collection of cookies in .json format

Sending PUSH notifications

Create a hidden screenshot of the current browser screen

View all installed extensions and enable/disable them

Getting the actual URL where the bot is located

Download browser history in .json format

Using the botโ€™s IP and its cookies (reverse proxy)

link https://xss.is/threads/80558/

Product price on the forum : 5.000$

Download: https://system32.ink/d/injecting-scripts-into-web-pages/
๐Ÿ”ฅ2
๐Ÿค“2๐Ÿคฉ1
DataLeak:

๐Ÿ‘‰๐ŸปLeak haztutienda com : https://system32.ink/d/leak-haztutienda-com/

๐Ÿ‘‰๐ŸปLeak voiswitch : https://system32.ink/d/leak-voiswitch-net/

๐Ÿ‘‰๐ŸปLeak unja.ac.id : https://system32.ink/d/leak-unja-ac-id/

Tools:

๐Ÿ‘‰๐ŸปPyrai - Mirai python variant : https://system32.ink/d/pyrai-mirai-python-variant/

Exploit:

๐Ÿ‘‰๐ŸปCVE-2023-33246 RocketMQ Remote Code Execution Exploit : https://system32.ink/d/cve-2023-33246-rocketmq-remote-code-execution-exploit/
๐Ÿ‘1
Forwarded from ๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™