CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ (๐˜ผ๐™œ๐™š๐™ฃ๐™ฉ ๐˜ผ๐™จ๐™˜๐™ค๐™ฉ)
This media is not supported in your browser
VIEW IN TELEGRAM
19-year-old Naama Levy was born in Israel & raised in India.

On 7th October, she was abducted by Hamas terrorists.

#bringthemhomenow

We Stand with Israel ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿค๐Ÿ‡ฎ๐Ÿ‡ฑ

#KINGSMAN_INDIA
โค4๐Ÿ’”2
Forwarded from Jeetendra Joshi
## Test For SQL Injection

[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL

Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโ€ฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r

#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
๐Ÿ‘1
Forwarded from Cybertix
๐—ญ๐—ฒ๐—ฟ๐—ผ-๐——๐—ฎ๐˜† ๐—ฅ๐—–๐—˜ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†๐Ÿ˜ฒ

๐—ฃ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜: Palo Alto Global Protect

๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ-๐Ÿฏ๐Ÿฐ๐Ÿฌ๐Ÿฌ


๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
เค†เคจเฅƒเคถเค‚เคธเฅเคฏเคฎเคจเฅเค•เฅเคฐเฅ‹เคถเคƒ เคถเฅเคฐเฅเคคเค‚ เคถเฅ€เคฒเค‚ เคฆเคฎเคƒ เคถเคฎเคƒเฅค
เคฐเคพเค˜เคตเค‚ เคถเฅ‹เคญเคฏเคจเฅเคคเฅเคฏเฅ‡เคคเฅ‡ เคทเคกเฅเค—เฅเคฃเคพเคƒ เคชเฅเคฐเฅเคทเฅ‹เคคเฅเคคเคฎเคฎเฅเฅฅ

เคฐเคพเคฎ เคจเคตเคฎเฅ€ เค•เฅ€ เคนเคพเคฐเฅเคฆเคฟเค• เคถเฅเคญเค•เคพเคฎเคจเคพเคฏเฅ‡ โค๏ธ๐Ÿ™๐Ÿป

เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ๐Ÿ™๐Ÿป
โคโ€๐Ÿ”ฅ11๐Ÿ™2
https://system32.in/product/windows-process-injection-for-red-blue-teams/

Windows Process Injection for Red-Blue Teams BY PentesterAcademy
Forwarded from Cybertix
๐—ข๐—ฆ ๐—–๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—š๐—ถ๐˜๐—น๐—ฎ๐—ฏ๐Ÿ˜ฑ


They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.

๐˜ฝ๐™ค๐™ช๐™ฃ๐™ฉ๐™ฎ : 6500$

๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
๐Ÿ—ฟ2
https://system32.ink/issabel-pbx-4.0.0-rce-authenticated-cve-2024-0986-exploit/

Issabel PBX 4.0.0 RCE โ€“ Authenticated (CVE-2024-0986) Exploit