CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
โœ…๏ธ Official site of Election Commission of India:

https://results.eci.gov.in/PcResultGenJune2024/index.htm
CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
EVM Hacking Process will be Start tomorrow at 7am be ready ๐Ÿ˜
Processing............................72%
๐Ÿ˜Ž3๐Ÿ”ฅ1
CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
Processing............................72%
Error:
[{"id":"c72e0b9a.e87398","type":"s7 in","z":"62eaacbc.ac7aa4","endpoint":"4e82455b.a4e7dc","mode":"single","variable":"Tampring","diff":true,"name":"S7Read","x":100,"y":320,"wires":[["650fea48.efd0f4"]]},{"id":"4e82455b.a4e7dc","type":"s7 endpoint","z":"}]]
๐Ÿคฃ11
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
It's party time ๐ŸŽ‡๐ŸŽ‰๐ŸŽŠ

So, we have completed 500 subscribers on our newsletter last week. As always, we are late again.

As we have accomplished this goal, we will now be moving forward to achieve 1k subs soon.

Also, we will be changing the newsletter design and it will be having many new section and a lot more useful information than ever before.

If you are interested in helping us by giving us feedback, drop a dm to @dheerajydv19

https://osintambition.substack.com/

Don't forget to subscribe if you haven't done yet.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://system32.ink/andromeda-rat-working/

Andromeda Rat 4.5 100% Working | Tested
๐ŸŽ‰1
https://system32.in/topic/automate-xss-using-dalfox-waybackurl-gf-patterns/

Automate XSS using Dalfox, WaybackURL, GF Patterns
๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
https://system32.ink/php-cgi-argument-injection-cve-2024-4577-rce-exploit/

PHP CGI Argument Injection (CVE-2024-4577) RCE Exploit
๐Ÿ‘2
https://system32.ink/hidden-cplapplet-builder-v3-cracked-with-source-code/

Hidden CPLApplet Builder V3 Cracked With Source Code
https://system32.ink/cosanostra-v-1-2-http-botnet-source-code/

CosaNostra v.1.2 HTTP Botnet + Source Code
๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
MAIN NARENDRA DAMODARDAS MODI

MODI 3.0 IS OFFICIALLY HERE ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ
๐Ÿ”ฅ18๐Ÿ’”2๐Ÿพ1๐Ÿ‘พ1
https://system32.ink/enccn-ransomware-builder/

ENCCN Ransomware Builder Download


The latest edition of this software is beautifully established, that can help you to encrypt documents on the inflamed device. It allows the users to display a message to inform other users that their files are locked.

Cybercriminals can demand a fee from their targets to restore their data, and in this way after they get the fee so it is on them whether they restore the victim's data or not.

โ€‹
Featuresโ€‹
There are so many features in the enccn ransomware builder windows 10 software and some of them are as follows below.
Download Malware
Fully featured
Media library
Execute the malware
Windows shortcut exploit
Using reg
Easy handling
Windows shortcuts
Registry injection
Premium version
Malicious email attachments
Configuration
Fast
Stable
Come with advanced features
Support all kinds of browsers
Grab information about anyone
Malware maker
Encrypt files
Multiple languages
Spreader
Customizable
Many more.
TRYHACKME ONE MONTH VOUCHER AVAILABLE (PAID)

DM
@CYBERDIN IF YOU NEED

CHECK
@PROOFSCDI FOR PROOFS
https://system32.ink/veeam-backup-enterprise-manager-authentication-bypass-cve-2024-29849-exploit/

Veeam Backup Enterprise Manager Authentication Bypass CVE-2024-29849 Exploit