CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from OSINT AMBITION (Dheeraj Yadav)
๐Ÿ‘1
Forwarded from Cybertix
๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ ๐— ๐—ฒ ๐—”๐—ฑ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†-๐Ÿฏ

๐—•๐—ฟ๐˜‚๐˜๐—ฒ ๐—ณ๐—ผ๐—ฟ๐—ฐ๐—ถ๐—ป๐—ด ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ๐Ÿ˜

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต: https://youtu.be/tbNuQH8vFMU

Please Like & Subscribe to our YouTube Channel๐Ÿ˜„
๐Ÿ‘2
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Vehicle OSINT

You can find the following details by just knowing the vehicle number(RC) -
1. Ownership details
2. Vehicle details
3. Insurance details
4. Current challans

(Works only for Indian Vehicle)

Download the below app and go to RC search, enter the number and that's it.

https://play.google.com/store/apps/details?id=com.cuvora.carinfo

Join @osintambition for more.
๐Ÿ‘1
Forwarded from Cybertix
๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ ๐— ๐—ฒ ๐—”๐—ฑ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†-๐Ÿฐ

Creating ๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ ๐—ช๐—ผ๐—ฟ๐—ฑ๐—น๐—ถ๐˜€๐˜ & ๐—™๐˜‚๐˜‡๐˜‡๐—ถ๐—ป๐—ด ๐—จ๐˜€๐—ฒ๐—ฟ๐—ป๐—ฎ๐—บ๐—ฒ - ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐Ÿ˜

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต: https://youtu.be/k1WfwaUusSo?si=L4qZCuaDHRUm0paf

Please Like & Subscribe to our YouTube Channel๐Ÿ˜„
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ”–#SEARCH ENGINES FOR PENTESTERS

01. shodan.io โ€”> (Server , Vulnerabilities)
02. google.com โ€”> (Dorks)
03. wigle.net โ€”> (Wifi Networks)
04. grep.app โ€”> (Codes Search)
05. app.binaryedge.io โ€”> (Threat Intelligence)
06. onyphe.io โ€”> (Server)
07. viz.greynoise.io โ€”> (Threat Intelligence)
08. censys.io โ€”> (Server)
09. hunter.io โ€”> (Email Addresses)
10. fofa.info โ€”> (Threat Intelligence)
11. zoomeye.org โ€”> (Threat Intelligence)
12. leakix.net โ€”> (Threat Intelligence)
13. intelx.io โ€”> (OSINT)
14. app.netlas.io โ€”> (Attack Surface)
15. searchcode.com โ€”> (Code Search)
16. urlscan.io โ€”> (Threat Intelligence)
17. publicwww.com โ€”> (Code Search)
18. fullhunt.io โ€”> (Attack Surface)
19. socradar.io โ€”> (Threat Intelligence)
20. binaryedge.io โ€”> (Attack Surface)
21. ivre.rocks โ€”> (Server)
22. crt.sh โ€”> (Certificate Search)
23. vulners.com โ€”> (Vulnerabilities)
24. pulsedive.com โ€”> (Threat Intelligence)

โ€” Share & Support Us โ€”
โžฏ Channel : @cybertrickzone
๐Ÿ‘4โค1
https://system32.ink/slip-malicious-archive-generator-to-exploit-path-traversal-vulnerabilities/

Slip - Malicious Archive Generator To Exploit Path Traversal Vulnerabilities
Forwarded from Cybertix
๐—™๐—ถ๐—ป๐—ฎ๐—น๐—น๐˜† ๐˜๐—ต๐—ฒ ๐—ฆ๐˜๐—ฟ๐—ถ๐—ธ๐—ฒ ๐—ต๐—ฎ๐˜€ ๐—ฏ๐—ฒ๐—ฒ๐—ป ๐—ฅ๐—ฒ๐—บ๐—ผ๐˜ƒ๐—ฒ๐—ฑ ๐Ÿฅณ

๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ๐— ๐—ฒ ๐——๐—ฎ๐˜†-๐Ÿฐ

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต: https://youtu.be/qLusVF1owU0?si=kXfDTMpWTx60giSA
Forwarded from Angry Saffron & Treeni (ใ…ค)
Full-time only.

Applications on Email only.

๐Ÿ”บ@AngrySaffron
Forwarded from Cybertix
๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ๐— ๐˜€ ๐—”๐—ฑ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†-๐Ÿฑ

๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ฅ๐—ฒ๐˜ƒ๐—ฒ๐—ฟ๐˜€๐—ฒ ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ ๐—ฎ๐—ป ๐—”๐—ฝ๐—ฝ๐—น๐—ถ๐—ฐ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐Ÿ˜จ

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ:

https://youtu.be/8GvU3wIMEZE?si=GAyVNq3VczzvQarZ

Please like & Subscribe to our YouTube channel๐Ÿ™Œ
Forwarded from Cybertix
๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ๐— ๐—ฒ ๐—”๐—ฑ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†-๐Ÿฒ

๐—Ÿ๐—ฒ๐—ฎ๐—ฟ๐—ป ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐— ๐—ฒ๐—บ๐—ผ๐—ฟ๐˜† ๐—–๐—ผ๐—ฟ๐—ฟ๐˜‚๐—ฝ๐˜๐—ถ๐—ผ๐—ป๐Ÿ”ฅ

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ:
https://youtu.be/dljy-fchoik?si=DhU2SVcjuGJTy-uT

Please like & Subscribe to our YouTube channel๐Ÿ™Œ
https://system32.ink/d-link-go-rt-ac750-cve-2023-48842-command-injection-exploit/

D-Link Go-RT-AC750 CVE-2023-48842 Command Injection Exploit
Forwarded from Cybertix
๐—ง๐—ฟ๐˜†๐—›๐—ฎ๐—ฐ๐—ธ๐— ๐—ฒ ๐—”๐—ฑ๐˜ƒ๐—ฒ๐—ป๐˜ ๐—ผ๐—ณ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐——๐—ฎ๐˜†-๐Ÿณ

๐—”๐—ป๐—ฎ๐—น๐˜†๐˜‡๐—ถ๐—ป๐—ด ๐˜๐—ต๐—ฒ ๐—Ÿ๐—ผ๐—ด๐˜€ ๐Ÿ˜Ž๐Ÿ”ฅ

๐—ช๐—ฎ๐—น๐—ธ๐˜๐—ต๐—ฟ๐—ผ๐˜‚๐—ด๐—ต ๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ:
https://youtu.be/5O1L1M9Dg9s?si=Qly33pjm02bK3j2f

Please like & Subscribe to our YouTube channel๐Ÿ™Œ
https://system32.ink/conquest-dicom-server-1.5.0d-remote-command-execution-exploit/

ConQuest Dicom Server 1.5.0d Remote Command Execution Exploit
โค3