CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
luxuryguideps.com.7z
541.2 KB
http://luxuryguideps.com, Hotel Supplier Luxury Guide - News, Products and Services for the Hospitality Industry!
Forwarded from 卩ro 爪Cracker
nanougat.alwaysdata.net.7z
68 KB
Forwarded from 卩ro 爪Cracker
old.humanasia.org.7z
67 KB
http://old.humanasia.org, 사단법인 휴먼아시아에 오신것을 환영합니다.
This media is not supported in your browser
VIEW IN TELEGRAM
1500 Members Special :-
Direct Access To Private Group
Link Valid Only 24 Hours

Only 50 Members Allowed (Members Full)
Link Expired
https://t.me/+5rgE1-1OG981ZDc1
4😁2
👍5
Hello friends, I am going to be offline for 7-8 days because I am going on a spiritual journey (himachal). So my friends, now it is the job of all of you to take care of this channel.
11👍4🥰2
EyeRat: A tool for building remote access trojan

Whenever the user has an instruction to send to RAT, the user's application sends a special command to RAT such as: Tpict (to take a photo from the camera).

📖 Read

#infosec #cybersecurity #redteam #pentest #pentesting #hacking #hackers #opensource #linux #rat #trojan #tools #kali

@YourJiniNews
👍2
Forwarded from 卩ro 爪Cracker
diia.gov.ua.tar
1.3 GB
Forwarded from 卩ro 爪Cracker
kiyafoods.in.gz
1.2 GB
Forwarded from 卩ro 爪Cracker
windows-kernel-exploits-mini-pack.zip
141.6 KB
Windows Kernel Exploits
miniPack + bonus (HEVD-HackSys Extreme Vulnerable Driver)
Forwarded from 卩ro 爪Cracker
CVE-2022-24500 RCE Exploit

Windows SMB Remote Code Execution Vulnerability

Vulnerability: Windows 7 - Windows 2022
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500

#cve #smb #exploit #rce
Forwarded from 卩ro 爪Cracker
CVE-2022-26809 RCE Exploit

Weakness in a core Windows component (RPC) earned a CVSS score of 9.8 not without a reason, as the attack does not require authentication and can be executed remotely over a network, and can result in remote code execution (RCE) with the privileges of the RPC service, which depends on the process hosting the RPC runtime.

That critcal bug, with a bit of luck, allows to gain access to unpatched Windows host running SMB. The vulnerability can be exploited both from outside the network in order to breach it as well as between machines in the network.

https://github.com/rkxxz/CVE-2022-26809

Vendor Information:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26809
https://www.pwndefend.com/2022/04/14/cve-2022-26809/

#cve #poc #exploit
Forwarded from 卩ro 爪Cracker
Forwarded from Bhartiya Hunters🇮🇳 (Founder & CEO •)
An Interesting IDOR Story 😎 -
https://quip.com/Uks4AzL33oAu

Shared by @Indianshunters
Forwarded from 卩ro 爪Cracker
API Unhooking

An article about a new method of avoiding AV/EDR by creating a process in a suspended state and getting a copy of the ntdll from the new process before it is hijacked by AV/EDR.

Research:
https://dosxuz.gitlab.io/post/perunsfart/

PoC:
https://github.com/dosxuz/PerunsFart
👍4