CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://system32.ink/officertool-v10.2-install-activate-and-configure-office-2016-2019-and-2021/

OfficeRTool v10.2 - Install, Activate, And Configure Office 2016, 2019 and 2021
๐Ÿ‘2
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
Lahore PAKISTAN power grid Hacked By TEAM-NETWORK-NINE

Threat Actor: P10n3

Greetings to
#Team ucc
#Team Network Nine
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#indiancybermafia

For truly this realityโ€ฆis a hell
โšก2
โค5
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
BANGLADESH ๐Ÿ’‰NATIONAL API ALONG WITH NATIONAL DATABASE CREDENTIALS HACKED

โ˜ ๏ธNOTE:- THIS API IS INTEGRATED IN YOUR ALL GOV WEBSITE APPROX 3000

TEAM-NETWORK-NINE

Threat Actor: P10n3

Greetings to
#Team ucc
#Team Network Nine
#Team BlackDragonsec
#Team NWH Security
#KERALA CYBER BLACK SQUAD
#Kerala Cyber Xtractors
#indiancybermafia
๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
Indian Navy's Mission Deployed platforms responded swiftly to a maritime incident in Arabian Sea involving a hijacking attempt onboard a Liberia-flagged bulk carrier. The vessel had sent a message on UKMTO portal indicating boarding by approx five to six unknown armed personnel in the evening on 04 Jan 24: Indian Navy

Marcos ๐Ÿ”ฅ
๐Ÿ”ฅ1
This media is not supported in your browser
VIEW IN TELEGRAM
Marcos went, Marcos did what they do best, Marcos got out..
https://system32.ink/wp-compress-6.10.34-unauthenticated-arbitrary-file-read-cve-2023-6699-exploit/

WP Compress < 6.10.34 - Unauthenticated Arbitrary File Read CVE-2023-6699 Exploit
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Which one should we use for publishing our upcoming blogs?
Anonymous Poll
63%
Official website
37%
Medium blogs
https://crackcodes.in/stirling-pdf-pdf-manipulation-tool/

Stirling-PDF โ€“ PDF manipulation Tool
Forwarded from OSINT AMBITION (Dheeraj Yadav)
IMPORTANT ANNOUNCEMENT

We have recieved a lot of good response as of now. 73people want to read blogs from our website and 50people voted for medium blog.

https://www.osintambition.org/

If we hit 100members on our website, then we will continue running it and a lot of awesome content will be published soon.
Right now, it's 43members, so subscribe to the website by registering via your email so that you can directly all new post in your inbox.

If we didn't hit target of 100 in next 4days, we will shut down the website as of now. All our blogs will be available on medium, so you can always read them from their.

Apart from that, we have discontinued the 30DaysOfOSINT, and will post content from now onwards anytime.

https://www.osintambition.org/

Thanks for showing so much love to OSINT Ambition.

@osintambition
โค1
Forwarded from Cybertix
๐˜ผ๐™ช๐™ฉ๐™ค๐™ข๐™–๐™ฉ๐™ž๐™ฃ๐™œ ๐˜พ๐™๐™‡๐™ ๐™„๐™ฃ๐™Ÿ๐™š๐™˜๐™ฉ๐™ž๐™ค๐™ฃ

๐™๐™ค๐™ฅ๐™ž๐™˜๐™จ ๐™˜๐™ค๐™ซ๐™š๐™ง๐™š๐™™:
๐Ÿญ.What is CRLF & How it works๐Ÿค”

๐Ÿฎ. How to find CRLF Injection Bugs ๐Ÿง

๐Ÿฏ. Automating CRLF Vulnerability for Bug Bounty๐Ÿค‘

๐—ช๐—ฎ๐˜๐—ฐ๐—ต ๐—ก๐—ผ๐˜„ ๐Ÿ‘‡๐Ÿป๐Ÿ˜‹

https://youtu.be/_4pLtdxUBQ4?si=mFJMjACf6Ru9uo1j
CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ pinned ยซhttps://system32.ink/the-post-smtp-mailer-cve-2023-7027-exploit/ The POST SMTP Mailer CVE-2023-7027 Exploitยป