CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
CVE-2023-20887 VMWare Aria Operations for Networks unauthenticated RCE Exploit

https://system32.ink/d/cve-2023-20887-vmware-aria-operations-for-networks-unauthenticated-rce-exploit/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ–ฅDatabases:

๐Ÿ”ฑLeak areashopping_eu : https://system32.ink/d/leak-areashopping-eu/

๐Ÿ”ฑLeak sportfood40_ru : https://system32.ink/d/leak-sportfood40-ru/

๐Ÿ”ฑLeak sport-fashion_sk : https://system32.ink/d/leak-sport-fashion-sk/

๐Ÿ–ฅExploits:

๐Ÿ”ฑUbuntu 22.04 - udmabuf, CVE-2023-2008 Exploit : https://system32.ink/d/ubuntu-22-04-udmabuf-cve-2023-2008-exploit/

๐Ÿ”ฑCVE-2022-4262: Incorrect Bytecode Generation by JavaScript Parse POC : https://system32.ink/d/cve-2022-4262-incorrect-bytecode-generation-by-javascript-parse-poc/

๐Ÿ–ฅTools:

๐Ÿ”ฑTheRestarter is a tool is designed to interact with the Windows Restart Manager. : https://system32.ink/d/therestarter-is-a-tool-is-designed-to-interact-with-the-windows-restart-manager/

@crackcodes | crackcodes.in | system32.ink | promcracker.me | mcracker.org
๐Ÿ‡ฌ๐Ÿ‡ท Greece

Eight Pakistanis arrested in Greece in connection with the terror plot.
Anyone Taking part in Darkwebathon 2023 BY Team ATII Dm @hacklathon
Forwarded from Tส€ษชแด„แด‹ส Pแด‡ษดษขแดœษชษด ( trickypenguin.ink )
gmail-osint.activetk.jp

Ghunt online version.

Get info about Google account by email:
- name
- default profile and cover pictures;
- calendar events and timezone;
- Google Maps reviews;
- Google Plus and Google Chat data;

#osint #socmint
๐Ÿ‘2
Webinar: OSINT: The Ultimate Truth-Seeker on the Internet

Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.

We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.

Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.

We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.

Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.

By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!

Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!

Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com

Register Now: https://forms.gle/y46RfWhJ7H3EahBS9
๐Ÿ”ฑLeak BilgeAdam IT Group : https://system32.ink/d/leak-bilgeadam-it-group/

๐Ÿ”ฑdata leak of Concremat Companies : https://system32.ink/d/data-leak-of-concremat-companies/

๐Ÿ”ฑBanshee _ Windows x64 Kernel Driver/Rootkit : https://system32.ink/d/banshee-_-windows-x64-kernel-driver-rootkit/

๐Ÿ”ฑphishing script Sberbank online : https://system32.ink/d/phishing-script-sberbank-online/

๐Ÿ”ฑskybuzz Leak : https://system32.ink/d/skybuzz-leak/

๐Ÿ”ฑMobSecco | Clone Cordova application for bypassing security restrictions : https://system32.ink/d/mobsecco-clone-cordova-application-for-bypassing-security-restrictions/
๐Ÿ‘2
๐Ÿ”ฑLeak Fiduagraria is a joint-stock company : https://system32.ink/d/leak-fiduagraria-is-a-joint-stock-company/

๐Ÿ”ฑCVE-2023-34830: Reflected XSS found in i-doit Open : https://system32.ink/d/cve-2023-34830-reflected-xss-found-in-i-doit-open-v-24/

@crackcodes | crackcodes.in |system32.ink
๐™ˆ๐™ค๐™จ๐™ฉ ๐™ช๐™ฃ๐™™๐™š๐™ง๐™š๐™จ๐™ฉ๐™ž๐™ข๐™–๐™ฉ๐™š๐™™ ๐™‘๐™ช๐™ก๐™ฃ๐™š๐™ง๐™–๐™—๐™ž๐™ก๐™ž๐™ฉ๐™ฎ : ๐˜พ๐™Š๐™๐™Ž ๐™ˆ๐™ž๐™จ๐™˜๐™ค๐™ฃ๐™›๐™ž๐™œ๐™ช๐™ง๐™–๐™ฉ๐™ž๐™ค๐™ฃ


๐™๐™Š๐™‹๐™„๐˜พ:
1. What is SOP?
2. Working of CORS.
3. CORS Script (Given in desc)
4. Practical Labs of CORS.


๐™‡๐™ž๐™ฃ๐™ : https://youtu.be/IAyAg540Wxc
๐Ÿ–ฅExploits:

๐Ÿ”ฑCVE-2023-29343 Arbitrary file write in Sysmon version 14.14 Exploit : https://system32.ink/d/cve-2023-29343-arbitrary-file-write-in-sysmon-version-14-14-exploit/

๐Ÿ”ฑCVE-2022-44666 jar-poc : https://system32.ink/d/cve-2022-44666-jar-poc/

๐Ÿ–ฅDataleaks:

๐Ÿ”ฑLeak Safiran Airport Services Company : https://system32.ink/d/leak-safiran-airport-services-company/

๐Ÿ”ฑLeak dashboard.bkkbn_go_id : https://system32.ink/d/leak-dashboard-bkkbn-go-id/

๐Ÿ”ฑLeak islamicreminder_net : https://system32.ink/d/leak-islamicreminder-net/

๐Ÿ”ฑLeak newmtcap_com_br : https://system32.ink/d/leak-newmtcap-com-br/

๐Ÿ–ฅTools:

๐Ÿ”ฑPayloads All The PDFs - A list of crafted malicious PDF files : https://system32.ink/d/payloads-all-the-pdfs-a-list-of-crafted-malicious-pdf-files/