CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from Jeetendra Joshi
## Test For SQL Injection

[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL

Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโ€ฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r

#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
๐Ÿ‘1
Forwarded from Cybertix
๐—ญ๐—ฒ๐—ฟ๐—ผ-๐——๐—ฎ๐˜† ๐—ฅ๐—–๐—˜ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜†๐Ÿ˜ฒ

๐—ฃ๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜: Palo Alto Global Protect

๐—–๐—ฉ๐—˜-๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ-๐Ÿฏ๐Ÿฐ๐Ÿฌ๐Ÿฌ


๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtube.com/shorts/H6Lskmn8ywU?si=CntyK-0hGQBWlgnU
เค†เคจเฅƒเคถเค‚เคธเฅเคฏเคฎเคจเฅเค•เฅเคฐเฅ‹เคถเคƒ เคถเฅเคฐเฅเคคเค‚ เคถเฅ€เคฒเค‚ เคฆเคฎเคƒ เคถเคฎเคƒเฅค
เคฐเคพเค˜เคตเค‚ เคถเฅ‹เคญเคฏเคจเฅเคคเฅเคฏเฅ‡เคคเฅ‡ เคทเคกเฅเค—เฅเคฃเคพเคƒ เคชเฅเคฐเฅเคทเฅ‹เคคเฅเคคเคฎเคฎเฅเฅฅ

เคฐเคพเคฎ เคจเคตเคฎเฅ€ เค•เฅ€ เคนเคพเคฐเฅเคฆเคฟเค• เคถเฅเคญเค•เคพเคฎเคจเคพเคฏเฅ‡ โค๏ธ๐Ÿ™๐Ÿป

เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ๐Ÿ™๐Ÿป
โคโ€๐Ÿ”ฅ11๐Ÿ™2
https://system32.in/product/windows-process-injection-for-red-blue-teams/

Windows Process Injection for Red-Blue Teams BY PentesterAcademy
Forwarded from Cybertix
๐—ข๐—ฆ ๐—–๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—š๐—ถ๐˜๐—น๐—ฎ๐—ฏ๐Ÿ˜ฑ


They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.

๐˜ฝ๐™ค๐™ช๐™ฃ๐™ฉ๐™ฎ : 6500$

๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
๐Ÿ—ฟ2
https://system32.ink/issabel-pbx-4.0.0-rce-authenticated-cve-2024-0986-exploit/

Issabel PBX 4.0.0 RCE โ€“ Authenticated (CVE-2024-0986) Exploit
Forwarded from K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ (๐˜ผ๐™œ๐™š๐™ฃ๐™ฉ ๐˜ผ๐™จ๐™˜๐™ค๐™ฉ)
๐Ÿ”ฐPakistan ๐Ÿ‡ต๐Ÿ‡ฐ Federal Board of Revenue Credential Leaked By K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ”ฐ

Threat Actor : K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ

Type : Government

SPL MSG : Focus on Economics of your country and do not support Terrorism ๐Ÿ‘

https://iris.fbr.gov.pk 4420689545809:Hamza@59

https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh

https://iris.fbr.gov.pk 3110575024055:Iru#123*

https://iris.fbr.gov.pk 3520296235408:4263BEC2

https://iris.fbr.gov.pk 3530108287975:4upinbpx3x

#All_Indian_Hackers
#KINGSMAN


JAI HIND ๐Ÿ‡ฎ๐Ÿ‡ณ

JAI SHREE RAM ๐Ÿšฉ

@KINGSMAN_INDIA
โค4๐Ÿ‘3๐Ÿ‘Œ1
Forwarded from Cybertix
๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ซ๐—ฆ๐—ฆ ๐—ถ๐—ป ๐—ซ-๐—™๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ๐—ฒ๐—ฑ-๐—›๐—ผ๐˜€๐˜ ๐—›๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ



๐—ข๐—ป๐—ฒ๐—น๐—ถ๐—ป๐—ฒ๐—ฟ ๐—Ÿ๐—ถ๐—ป๐—ธ๐Ÿ‘‡๐Ÿป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
โค1