CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://system32.in/product/windows-process-injection-for-red-blue-teams/

Windows Process Injection for Red-Blue Teams BY PentesterAcademy
Forwarded from Cybertix
๐—ข๐—ฆ ๐—–๐—ผ๐—บ๐—บ๐—ฎ๐—ป๐—ฑ ๐—œ๐—ป๐—ท๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ถ๐—ป ๐—š๐—ถ๐˜๐—น๐—ฎ๐—ฏ๐Ÿ˜ฑ


They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.

๐˜ฝ๐™ค๐™ช๐™ฃ๐™ฉ๐™ฎ : 6500$

๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
๐Ÿ—ฟ2
https://system32.ink/issabel-pbx-4.0.0-rce-authenticated-cve-2024-0986-exploit/

Issabel PBX 4.0.0 RCE โ€“ Authenticated (CVE-2024-0986) Exploit
Forwarded from K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ (๐˜ผ๐™œ๐™š๐™ฃ๐™ฉ ๐˜ผ๐™จ๐™˜๐™ค๐™ฉ)
๐Ÿ”ฐPakistan ๐Ÿ‡ต๐Ÿ‡ฐ Federal Board of Revenue Credential Leaked By K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ ๐Ÿ”ฐ

Threat Actor : K I N G S M A N ๐Ÿ‡ฎ๐Ÿ‡ณ

Type : Government

SPL MSG : Focus on Economics of your country and do not support Terrorism ๐Ÿ‘

https://iris.fbr.gov.pk 4420689545809:Hamza@59

https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh

https://iris.fbr.gov.pk 3110575024055:Iru#123*

https://iris.fbr.gov.pk 3520296235408:4263BEC2

https://iris.fbr.gov.pk 3530108287975:4upinbpx3x

#All_Indian_Hackers
#KINGSMAN


JAI HIND ๐Ÿ‡ฎ๐Ÿ‡ณ

JAI SHREE RAM ๐Ÿšฉ

@KINGSMAN_INDIA
โค4๐Ÿ‘3๐Ÿ‘Œ1
Forwarded from Cybertix
๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ซ๐—ฆ๐—ฆ ๐—ถ๐—ป ๐—ซ-๐—™๐—ผ๐—ฟ๐˜„๐—ฎ๐—ฟ๐—ฑ๐—ฒ๐—ฑ-๐—›๐—ผ๐˜€๐˜ ๐—›๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ



๐—ข๐—ป๐—ฒ๐—น๐—ถ๐—ป๐—ฒ๐—ฟ ๐—Ÿ๐—ถ๐—ป๐—ธ๐Ÿ‘‡๐Ÿป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
โค1
https://system32.in/product/red-team-operator-malware-development-intermediate-course-sektor7/

RED TEAM Operator: Malware Development Intermediate Course [Sektor7]
โคโ€๐Ÿ”ฅ5
โคโ€๐Ÿ”ฅ2โค1
Forwarded from Cybertix
๐—”๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ถ๐—ป๐—ด ๐—•๐—น๐—ถ๐—ป๐—ฑ ๐—ซ๐—ฆ๐—ฆ ๐—ผ๐—ป ๐—›๐—ฒ๐—ฎ๐—ฑ๐—ฒ๐—ฟ ๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐Ÿ˜Ž๐Ÿ”ฅ


๐—Ÿ๐—ถ๐—ป๐—ธ: https://youtu.be/KgEwfY3ZENE?si=TXMCAD1cBs7Ghwtk

๐—ฃ๐—น๐—ฒ๐—ฎ๐˜€๐—ฒ ๐—ฑ๐—ผ ๐—น๐—ถ๐—ธ๐—ฒ & ๐—ฆ๐˜‚๐—ฏ๐˜€๐—ฐ๐—ฟ๐—ถ๐—ฏ๐—ฒ ๐˜๐—ผ ๐—ผ๐˜‚๐—ฟ ๐—ฌ๐—ผ๐˜‚๐—ง๐˜‚๐—ฏ๐—ฒ ๐—ฐ๐—ต๐—ฎ๐—ป๐—ป๐—ฒ๐—น๐Ÿ™๐Ÿป
Which Linux OS you should go for which Purpose!!!
https://system32.ink/ciscos-cimc-command-injection-cve-2024-20356-exploit/

Cisco's CIMC Command Injection CVE-2024-20356 Exploit
https://system32.ink/oracle-virtualbox-local-privilege-escalation-cve-2024-21111-exploit/

Oracle VirtualBox Local Privilege Escalation CVE-2024-21111 Exploit
Thank You For 3M Subscribers โค๏ธ
โค6