CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://t.me/globeEye

Join For Latest current affairs News
๐Ÿšจ๐— ๐—ผ๐˜‡๐—ถ๐—น๐—น๐—ฎ ๐Ÿฌ-๐——๐—ฎ๐˜† ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ถ๐˜. ๐Ÿšจ

Make sure you UPDATE Your Browser ๐Ÿ‘


๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtube.com/shorts/rNVi-TsKL1k?si=d7ZLICF1Q9N8cxJ9
๐Ÿ“ŒRCE in Juniper JunOS CVE-2023-36844-47 Exploit : Download

๐Ÿช…Pocket Access โ€“ Telegram Bot For Remote Access To Computer Files : Download

๐ŸธInternational Civil Defense Organization Data Leak : Download

๐Ÿค–CVE-2023-40930 POC: Skyworth 3.0 (Android) โ€“ Directory Traversal : Explore

๐Ÿ•ธInvicti Standard v23.9.0.42095 Crack : Download

๐Ÿ“ฏSartrouville Company France Data Leak : Download

๐ŸŒšAranui Cruises Data Leak : Download

๐Ÿ€Craxs Rat V6.7 : DOwnload

๐ŸชฌURL Infection: Exploit Silent Java Drive By Downloads Chrome : Explore

๐ŸงฎCVE-2023-41362 โ€“ MyBB ACP RCE Exploit : Explore

๐Ÿ‘พCVE-2023-3244 POC: WordPress Missing Authorization: Explore

๐Ÿ“OpenText EnCase Forensic Tool : Download

๐ŸฒTelegram Get remote IP: Get IP Address on Other Side Audio Call In Telegram : Check
This Is My Kali, Send Yours in Comment ๐Ÿ’
๐Ÿ”ฅ7
A Beginner's Guide to OSINT Flyer.png
1.2 MB
A Beginner's Guide to OSINT Webinar

OSINT Ambition presents you a free webinar on A Beginner's Guide to Open Source Intelligence. The webinar details are described below:
Platform: Google Meet
Date: September 23th, 2023

Link: https://forms.gle/6jNxvm3A5aANssJa7
ChatGPT Next Web : Explore

Shodan Dorks 2023 : Explore

SQL Injection URL Scraper : Explore

HUMAN GENERATOR Online : Explore

HackBot - AI Cybersecurity Chatbot : Explore

Canadian Nurses Association Data Leak : Explore

XWorm V5.0 Cracked : Download

Anti-kill PHP Trojan Generator : Explore
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
โ˜€๏ธPassword cracking techniquesโ˜€๏ธ

There are a number of techniques that can be used to crack passwords. We will describe the most commonly used ones below;

โœ”๏ธDictionary attackโ€“ This method involves the use of a wordlist to compare against user passwords.

โœ”๏ธBrute force attackโ€“ This method is similar to the dictionary attack. Brute force attacks use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value โ€œpasswordโ€ can also be tried as p@$$word using the brute force attack.

โœ”๏ธRainbow table attackโ€“ This method uses pre-computed hashes. Letโ€™s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.

โœ”๏ธGuessโ€“ As the name suggests, this method involves guessing. Passwords such as qwerty, password, admin, etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.

โœ”๏ธSpideringโ€“ Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.
๐Ÿ‘1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Media is too big
VIEW IN TELEGRAM
โญ๏ธ Start Kali Linux with Ethical Hacking and Penetration Testing 2023

๐Ÿ˜€๐Ÿ˜€โž–โž–โž–โž–โž–โž–โž–

โœ…Duration : 4 Hours 12 Minutes
โคPlatform : Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Google is offering FREE online courses.

No payment needed.

Here're 10 Google courses to get certified:

1. Applied Data Science with Python

Become a Data Scientist with this awesome program.

โ†’ 6 hours to complete
โ†’ 8 Chapters
โ†’ FREE Certificate

๐Ÿ”— https://lnkd.in/dTf3QUMb

2. Fundamentals of Digital Marketing

Learn how to use the internet to grow your business or career.

โ†’ 40 hours to complete
โ†’ Beginner friendly
โ†’ FREE Certificate

๐Ÿ”— https://lnkd.in/df_2wSDX

3. Google Analytics 4 Certification

Learn how to use Google Analytics 4, the best web analytics tool, to grow your online business.

โ†’ 5 hours to complete
โ†’ Intermediate level
โ†’ Data-driven marketing
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/ddjFSQcM

4. Google Ads Search Certification

Show your skill in creating and optimizing Google Search campaigns that reach your goals.

โ†’ 4 hours to complete
โ†’ Intermediate level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/duH6e3Z4

5. Google Ads Display Certification

Learn how to use Google Display features, optimize your campaigns, and measure your results.

โ†’ 3 hours to complete
โ†’ Beginner level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/dDCSAwSk

6. YouTube Music Certification

Learn how to use YouTube Music, the best music streaming service, to grow your audience, monetize your content, and optimize your performance.

โ†’ 4 hours to complete
โ†’ Advanced level
โ†’ FREE certificate

๐Ÿ”— https://lnkd.in/dRtUDUmS

7. Get started with Google Maps Platform

Learn how to use Google Maps Platform to create interactive web maps and manage your projects in the Google Cloud Console.

๐Ÿ”— https://lnkd.in/dmfKbWnu

8. Build apps with Flutter

Learn the skills to create visually appealing desktop, mobile, and web applications using Flutter, all built from a single codebase.

๐Ÿ”— https://lnkd.in/dAJ4tXy8

9. Introduction to SQL

Discover the fundamentals of utilizing SQL for extracting and controlling data within a relational database.

๐Ÿ”— https://lnkd.in/dtbGAEu4

10. Generative AI [Mega Course]

Learn everything you need to know about generative AI products and technologies in this comprehensive course.

๐Ÿ”— https://lnkd.in/dcUbCAPB

Happy Learning ๐ŸŒŸ
----------------------------------------------------------------------
if you found this post helpful:

1๏ธโƒฃ Join Telegram for more Free Coding & AI Courses, hacking courses , tech and tips https://telegram.me/cybertrickzone
๐Ÿ‘3
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐—™๐—ฅ๐—˜๐—˜ (๐—š๐—ผ๐—ผ๐—ด๐—น๐—ฒ) ๐—–๐—ผ๐˜‚๐—ฟ๐˜€๐—ฒ๐˜€ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ถ๐—น๐—น ๐—ฟ๐—ฒ๐—ด๐—ฟ๐—ฒ๐˜ ๐—ป๐—ผ๐˜ ๐˜๐—ฎ๐—ธ๐—ถ๐—ป๐—ด ๐—ถ๐—ป ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฏ.

1. Google Project Management

๐Ÿ”—https://lnkd.in/deM4-ATJ

2. Agile Project Management

๐Ÿ”—https://lnkd.in/dzBGr4Xp

3. Project Execution: Running the Project

๐Ÿ”—https://lnkd.in/dB5aZ4Fn

4. Foundations of Project Management

๐Ÿ”—https://lnkd.in/dGkjks2x

5. Project Initiation: Starting a Successful Project

๐Ÿ”—https://lnkd.in/d_NzEpaH

6. Project Planning: Putting It All Together

๐Ÿ”—https://lnkd.in/dF2BP4uA

7. Google Analytics for Power Users

๐Ÿ”—https://lnkd.in/dhPzZYKu

8. Fundamentals of digital marketing

๐Ÿ”—https://lnkd.in/dBS58kFc

9. Python Basics for Data Analysis

๐Ÿ”—https://lnkd.in/dsihXekD

10. Data Science Foundations

๐Ÿ”—https://lnkd.in/dRNWbj_r

11. Advanced Google Analytics

๐Ÿ”—https://lnkd.in/dMpbPc_h

14. Google Cloud Computing Foundations:

๐Ÿ”—https://lnkd.in/duxCQG7X

15. Data, ML, and AI in Google Cloud

๐Ÿ”—https://lnkd.in/dx3YJ7HG

17. Machine Learning Crash Course

๐Ÿ”—https://lnkd.in/dYPwDH5G

18. Basics of Machine Learning

๐Ÿ”—https://lnkd.in/dKRZPDpE

19. Data Science with Python

๐Ÿ”—https://lnkd.in/dKDQvhFs

Share and support us โค๏ธ

By : @cybertrickzone
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐‘๐ž๐ ๐“๐ž๐š๐ฆ ๐“๐จ๐จ๐ฅ๐ฌ ๐Ÿ”ฅ

๐Ÿ”ด RECONNAISSANCE:
- RustScan ==> https://lnkd.in/ebvRfBNy
- NmapAutomator ==> https://lnkd.in/gu5wxzf6
- AutoRecon ==> https://lnkd.in/g3DeG6YT
- Amass ==> https://lnkd.in/e7V569N5
- CloudEnum ==> https://lnkd.in/ePHDeGZv
- Recon-NG ==> https://lnkd.in/edwaXFjS
- AttackSurfaceMapper ==> https://lnkd.in/ebbcj6Rm
- DNSDumpster ==> https://dnsdumpster.com/

๐Ÿ”ด INITIAL ACCESS:
- SprayingToolKit ==> https://lnkd.in/eBSAPz5z
- o365Recon ==> https://lnkd.in/eJwCx-Ga
- Psudohash ==> https://lnkd.in/gcaxV6fR
- CredMaster ==> https://lnkd.in/gtMEDVuS
- DomainPasswordSpray ==> https://lnkd.in/guWj4TYv
- TheSprayer ==> https://lnkd.in/gZVuQYiv
- TREVORspray ==> https://lnkd.in/gHgcbjgV

๐Ÿ”ด DELIVERY:
- o365AttackToolKit ==> https://lnkd.in/etCCYi8y
- EvilGinx2 ==> https://lnkd.in/eRDPvwUg
- GoPhish ==> https://lnkd.in/ea26dfNg
- PwnAuth ==> https://lnkd.in/eqecM7de
- Modlishka ==> https://lnkd.in/eds-dR5C

๐Ÿ”ด COMMAND AND CONTROL:
- PoshC2 ==> https://lnkd.in/eqSJUDji
- Sliver ==> https://lnkd.in/ewN9Nday
- SILENTTRINITY ==> https://lnkd.in/eeZGbYMs
- Empire ==> https://lnkd.in/egAPa8gY
- AzureC2Relay ==> https://lnkd.in/efmh2t3g
- Havoc C2 ==> https://lnkd.in/gEFp2iym
- Mythic C2 ==> https://lnkd.in/gnCGwfWk

๐Ÿ”ด CREDENTIAL DUMPING:
- MimiKatz ==> https://lnkd.in/etEGfvJK
- HekaTomb ==> https://lnkd.in/eJx5Ugu5
- SharpLAPS ==> https://lnkd.in/eA28n9FT
- Net-GPPPassword ==> https://lnkd.in/e3CTez5A
- PyPyKatz ==> https://lnkd.in/eeb5b6Tz

๐Ÿ”ด PRIVILEGE ESCALATION:
- SharpUp ==> https://lnkd.in/etR2Pe_n
- MultiPotato ==> https://lnkd.in/eq53PXcJ
- PEASS ==> https://lnkd.in/eWA66akh
- Watson ==> https://lnkd.in/eZfYMSMX
- Bat-Potato ==> https://lnkd.in/gjziyG8q

๐Ÿ”ด DEFENSE EVASION:
- Villain ==> https://lnkd.in/gquyGFm5
- EDRSandBlast ==> https://lnkd.in/e8g8zYFT
- SPAWN - Cobalt Strike BOF ==> https://lnkd.in/e223PbqZ
- NetLoader ==> https://lnkd.in/ef5wCD4y
- KillDefenderBOF ==> https://lnkd.in/eVd54HUp
- ThreatCheck ==> https://lnkd.in/eHvSPakR
- Freeze ==> https://lnkd.in/eNUh3zCi
- GadgetToJScript ==> https://lnkd.in/egPQBBXJ

๐Ÿ”ด PERSISTENCE:
- SharPyShell ==> https://lnkd.in/eXm8h8Bj
- SharpStay ==> https://lnkd.in/erRbeFMj
- SharpEventPersist ==> https://lnkd.in/e_kJFNiB

๐Ÿ”ด LATERAL MOVEMENT:
- SCShell ==> https://lnkd.in/e256fC8B
- MoveKit ==> https://lnkd.in/eR-NUu_U
- ImPacket ==> https://lnkd.in/euG4hTTs

๐Ÿ”ด EXFILTRATION:
- SharpExfiltrate ==> https://lnkd.in/eGC4BKRN
- DNSExfiltrator ==> https://lnkd.in/epJ-s6gp
- Egress-Assess ==> https://lnkd.in/eXGFPQRJ

#redteam #cybersecurity #penetrationtesting #security #ethicalhacking #tools
๐Ÿ“ŸXavier Marks Indonesian Data Leak : Download

๐Ÿ‘พCVE-2023-34039 Exploit : Download

๐ŸฒCraxs Rat V6.7 : Download

๐Ÿ•ธInvicti Standard V23.9.0.42095 Crack : Download

๐Ÿช…Telegram Bot For Remote Access To Computer Files : Download

๐Ÿ“ฏGet IP Address On Other Side Audio Call In Telegram : Download
Congratulations Champions ๐ŸŽ‰

Bharat won the 8th Aisa Cup

Jai Hind ๐Ÿ‡ฎ๐Ÿ‡ณ
๐ŸŽ‰12
๐—ฆ๐—ค๐—Ÿ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป - ๐—•๐—”๐—ฆ๐—œ๐—–๐—ฆ

๐—ง๐—ผ๐—ฝ๐—ถ๐—ฐ๐˜€ ๐—–๐—ผ๐˜ƒ๐—ฒ๐—ฟ๐—ฒ๐—ฑ:
๐Ÿญ. What is SQL?
๐Ÿฎ. Explain Practically how SQL Works ๐Ÿ˜‰
๐Ÿฏ. What is SQL Injection?
๐Ÿฐ. Practicing Basic SQL Injection.


๐™๐™š๐™จ๐™ค๐™ช๐™ง๐™˜๐™š๐™จ ๐™–๐™ง๐™š ๐™–๐™™๐™™๐™š๐™™ ๐™ž๐™ฃ ๐™ฉ๐™๐™š ๐˜ฟ๐™š๐™จ๐™˜๐™ง๐™ž๐™ฅ๐™ฉ๐™ž๐™ค๐™ฃ, ๐™จ๐™ค ๐™ฎ๐™ค๐™ช ๐™˜๐™–๐™ฃ ๐™–๐™˜๐™˜๐™š๐™จ๐™จ ๐™ž๐™ฉ.

Please Like & Subscribe to our YouTube channel for More info about ๐—ฆ๐—ค๐—Ÿ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป. ๐Ÿ™๐Ÿป

๐—Ÿ๐—ถ๐—ป๐—ธ:
https://youtu.be/WYQUO8LMDmY?si=u_PN82qLDKnGXGr-
๐ŸงฎActMobile Networks Data Leak : Download

๐ŸฒInvicta Stealer: A Powerful, Native Stealer : Download

๐Ÿ“ŸGoTTY โ€“ Share Your Terminal As A Web Application : Explore

๐Ÿ‘พJPGtoMalware : Try

๐Ÿ’ŒHeart Sender V4.00.33 Crack : Download

@Crackcodes | Crackcodes.in | System32.ink
๐Ÿ‘3๐Ÿ‘Œ1
CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ pinned ยซ๐ŸงฎActMobile Networks Data Leak : Download ๐ŸฒInvicta Stealer: A Powerful, Native Stealer : Download ๐Ÿ“ŸGoTTY โ€“ Share Your Terminal As A Web Application : Explore ๐Ÿ‘พJPGtoMalware : Try ๐Ÿ’ŒHeart Sender V4.00.33 Crack : Download @Crackcodes | Crackcodes.in | System32.inkยป
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ”ด USEFUL WEBSITES FOR PENTESTERS & HACKERS โž•

Exploits Database ๐Ÿ”•
http://www.exploit-db.com/
http://www.intelligentexploit.com
http://www.shodanhq.com/
http://packetstormsecurity.com/

Vulnerabilities Database ๐Ÿน
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://nvd.nist.gov/
http://osvdb.org/
https://www.kb.cert.org/vuls/
https://secunia.com/community/advisories/search/
http://www.securityfocus.com/bid
http://lwn.net/Vulnerabilities/
http://denimgroup.com/resources-threadfix/
http://www.vulnerability-lab.com
http://www.secdocs.org/

Hacking Tutorials ๐Ÿ’ป
https://www.offensive-security.com/
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials
http://www.hacking-tutorial.com/
http://breakthesecurity.cysecurity.org/
http://www.securitytube.net/
http://www.ehacking.net/
https://vimeo.com/channels/fullscopesecurity
http://www.spacerogue.net/wordpress/

Virus Scan ๐Ÿ‘โ€๐Ÿ—จ
https://www.virustotal.com/nl/
http://anubis.iseclab.org/
http://virusscan.jotti.org/it
--Not distribute to AV--
http://v2.scan.majyx.net/?page=home
http://fuckingscan.me/
https://anonscanner.com/
http://nodistribute.com/
http://www.file2scan.net/

Tools Download ๐Ÿ› 
http://tools.kali.org/tools-listing
http://insecure.org/
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
http://www.darknet.org.uk/category/hacking-tools/
http://www.kitploit.com/
http://www.toolswatch.org/
http://www.blackarch.org/tools.html
https://pentest-tools.com/reconnaissance/google-hacking
https://gexos.github.io/Hacking-Tools-Repository/
http://www.romhacking.net/utilities/

Network Online Tools ๐ŸŒ
http://www.yougetsignal.com/
http://www.dnswatch.info/
http://www.nirsoft.net/countryip/
http://www.tcpiputils.com/
http://www.coffer.com/mac_find/
http://bgp.he.net/
http://www.sockets.com/services.htm
http://services.ce3c.be/ciprg/

IP Lookup ๐Ÿ”
http://ip-api.com/#
http://www.my-ip-neighbors.com/
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://freegeoip.net/static/index.html
http://whatstheirip.com
http://ipaddress.com
http://www.ip-adress.com/ipaddresstolocation/

Encrypt / Decrypt โœˆ๏ธ
http://crypo.in.ua/tools/
http://www.tools4noobs.com/online_tools/decrypt/
http://codebeautify.org/encrypt-decrypt
http://textmechanic.com/Encryption-Generator.html
http://www.yellowpipe.com/yis/tools/encrypter/

Online Hash Crackers ๐Ÿ’ฅ
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.cmd5.org/
http://www.md5crack.com/
http://www.netmd5crack.com/cracker/
http://md5decryption.com/
http://md5.rednoize.com/
http://www.md5this.com/index.php
http://www.tydal.nu/article/md5-crack/
http://passcracking.com/
https://hdb.insidepro.com/en
https://crackstation.net/
http://www.cloudcracker.net/
https://isc.sans.edu/tools/reversehash.html
http://www.onlinehashcrack.com/ [$]
http://hashcrack.in/en [$]

File Upload ๐Ÿ•“
https://mega.co.nz/
https://www.mediafire.com/
https://infotomb.com/m/welcome
http://sharesend.com/
http://www.wss-coding.com/upload
http://zippyshare.com/
http://filetolink.com/
http://ge.tt/
http://largedocument.com/
http://rghost.net/
http://dox.abv.bg/files/share
http://secureupload.eu/

Anonymous Test ๐Ÿ‘บ
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/

Torcheck โœ…
http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion

SMS ๐Ÿดโ€โ˜ ๏ธ
http://receive-sms-now.com/
http://www.receive-sms-online.info/
http://www.receivesmsonline.net/

Fake Identity ๐Ÿ”ก
http://www.fakenamegenerator.com/
https://fakena.me/
http://names.igopaygo.com/people/fake_person

Posted by ๐Ÿ’Ž@TheGodEye๐Ÿ’Ž
๐Ÿ”ฅ2๐Ÿ‘1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Shell ๐Ÿš

๐Ÿ”น Goshell 
๐Ÿ”—https://github.com/eze-kiel/goshell

๐Ÿ”นPrint-My-Shell
๐Ÿ”—https://github.com/sameera-madushan/Print-My-Shell

๐Ÿ”นReverse-shell-generator
๐Ÿ”—https://github.com/0dayCTF/reverse-shell-generator

๐Ÿ”นGirsh
๐Ÿ”—https://github.com/nodauf/Girsh

๐Ÿ”น Blueshell
๐Ÿ”—https://github.com/whitehatnote/BlueShell

๐Ÿ”นClink
๐Ÿ”—http://mridgers.github.io/clink/

๐Ÿ”นNatpass
๐Ÿ”—https://github.com/jkstack/natpass

๐Ÿ”นPlatypus
๐Ÿ”—https://github.com/WangYihang/Platypus

๐Ÿ”นshells
๐Ÿ”—https://github.com/4ndr34z/shells/

๐Ÿ”นReverse_ssh
๐Ÿ”—https://github.com/NHAS/reverse_ssh

๐Ÿ”นHoaxshell
๐Ÿ”—https://github.com/t3l3machus/hoaxshell
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Happy Ganesh Chaturthi To Everyone โค๏ธ
โคโ€๐Ÿ”ฅ7๐Ÿ™2