CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://system32.ink/covenant-c2-framework-for-red-teamers/

Covenant โ€“ C2 Framework For Red Teamers
โคโ€๐Ÿ”ฅ1
https://system32.ink/qatar-national-bank-data-leak/

Qatar National Bank Data Leak (1.5Gb)
๐Ÿ‘2
Forwarded from Cybertix
๐—ฃ๐—ฟ๐—ถ๐˜ƒ๐—ถ๐—น๐—ฒ๐—ด๐—ฒ ๐—˜๐˜€๐—ฐ๐—ฎ๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—ง๐—ฒ๐—น๐—ฒ๐—ฝ๐—ผ๐—ฟ๐˜.


๐—•๐—ผ๐˜‚๐—ป๐˜๐˜† : $ ๐Ÿฎ๐Ÿญ,๐Ÿฌ๐Ÿฌ๐Ÿฌ ๐Ÿ˜ฑ

๐—ฉ๐—ถ๐—ฑ๐—ฒ๐—ผ ๐—ฃ๐—ผ๐—– ๐Ÿ‘‡๐Ÿป:
https://youtu.be/i_vbEXmhxFU?si=E-mkMIbH_1_vLxmT
Forwarded from ใ€โœ˜๐™’๐™ƒโ„ขใ€‘๐’†œโคอŸอžอŸอž๐Ÿ‡บ๐Ÿ…ฒ๐Ÿ„ฒโ™›White Hatเฟ
INFORMATION DISCLOSURE AT NASA : HERE
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐‚๐˜๐๐„๐‘ ๐’๐„๐‚๐”๐‘๐ˆ๐“๐˜ ๐Ž๐๐„๐ ๐’๐Ž๐”๐‘๐‚๐„ ๐“๐Ž๐Ž๐‹๐’
๐ŸŽฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ŸŽฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ŸŽฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ŸŽฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ŸŽฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ŸŽฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ŸŽฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ŸŽฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ŸŽฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ŸŽฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ŸŽฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ŸŽฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ŸŽฏ 13. Kali: https://www.kali.org/ Security OS
๐ŸŽฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ŸŽฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ŸŽฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ŸŽฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ŸŽฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ŸŽฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ŸŽฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ŸŽฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ŸŽฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ŸŽฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ŸŽฏ 24. OpenEDR: https://openedr.com/ EDR
๐ŸŽฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ŸŽฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi

#cybersecurity #cybersecuritytools #opensource
Anyone Know Any Cybersecurity Related Webui Panel Based Tools Plz Drop In my dm @mynk0x00 I will host it on system32.in on vps
Forwarded from ฤฑllฤฑll โ€ข TeAm UcC OpErAtIoNs โ€ข ฤฑllฤฑll
Media is too big
VIEW IN TELEGRAM
๐Ÿ”ฅ Maldives Business Times Official Website Hacked By Team UCC ๐Ÿ”ฅ

โœ…๐Ÿ‡ฒ๐Ÿ‡ป SITE :-
https://mbt.mv/
โœ…๐Ÿ‡ฒ๐Ÿ‡ป POC :-
https://ownzyou.com/zone/198537

This is Just A Demo Of Our Attacks We Can Do More Better If Your Government Wants ๐Ÿ‘พ !!

#WeAreIndiansHackers

#TEAM_ANON_101 #TEAM_UCC #TEAM_ICP #AnonymousIndia #UnknownCyberCult #Indian_Cyber_Punk #TeamNwh #All_Indian_Hackers #Network_Nine #Black_Dragon_Sec #DarkCyberWarrior #GlorySec

โšœ๏ธโ™ค
@UCC_TEAM โ™คโšœ๏ธ
https://system32.ink/android-privilege-escalation-cve-2023-48418-exploit/

Android Privilege Escalation CVE-2023-48418 Exploit
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
โ˜‘๏ธ TOP 10 PHISHING TOOLS TO USE IN 2024

Setoolkit -
https://github.com/trustedsec/social-engineer-toolkit

SocialFish -
https://github.com/UndeadSec/SocialFish

HiddenEye -
https://github.com/DarkSecDevelopers/HiddenEye-Legacy

Evilginx2 -
https://github.com/kgretzky/evilginx

SeeYou - (Get Location using phishing attack) -
https://github.com/Viralmaniar/I-See-You

SayCheese - (Grab target's Webcam Shots) -
https://github.com/hangetzzu/saycheese

QR Code Jacking -
https://github.com/cryptedwolf/ohmyqr

ShellPhish -
https://github.com/An0nUD4Y/shellphish

BlackPhish -
https://github.com/iinc0gnit0/BlackPhish

โžก๏ธ Give Reactions for More Such Content ๐ŸคŸ
๐Ÿ‘3
https://system32.ink/payload-generator-automate-payload-building-in-cobalt-strike/

Payload-Generator - Automate Payload Building in Cobalt Strike
Please all Use this dp on your profile
โค8๐Ÿ‘2
https://system32.ink/cve-2023-36003-windows-lpe-xaml-diagnostics-api-exploit/

CVE-2023-36003 (Windows LPE XAML diagnostics API) Exploit
https://system32.ink/positive-technologies-network-attack-discovery-crack-v11-keygen/

Positive Technologies Network Attack Discovery Crack v11 Keygen
https://system32.ink/gitlab-account-takeover-via-password-reset-cve-2023-7028-poc

Gitlab Account Takeover via Password Reset CVE-2023-7028 PoC
Hello Guys wait is over and new version of Subdominator is released which is now better than previous versions and other tools now you can update or install the Subdominator's latest version and find the secret domains which
are in dept by using subdominator for more information you can visit: https://github.com/sanjai-AK47/Subdominator