CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
เค…เค‚เคคเคฐเคฐเคพเคทเฅเคŸเฅเคฐเฅ€เคฏ เคฏเฅ‹เค— เคฆเคฟเคตเคธ เค•เฅ€ เคถเฅเคญเค•เคพเคฎเคจเคพเคเค!

Indian Army personnel perform Yoga in icy heights on the northern frontier on #InternationalYogaDay2024
๐Ÿซก8๐Ÿ‘1๐Ÿ—ฟ1
https://system32.ink/horuseyes-rat/

Horus Eyes RAT (HE-RAT) is a tool used by cybercriminals to bypass security mechanisms. It has been used in high-profile activities, such as the Warsaw banking trojan, which tricks victims into infecting their systems using a fake bank overlay window. HE-RAT has the following features: Persistence, Gathering details, Capturing data, Matching data, and Executing remote commands.  {2021 Report}

HorusEyes Rat
๐Ÿ”ฅ1
https://system32.in/product/aerospace-cybersecurity-satellite-hacking-w53-pentestmag/

Aerospace Cybersecurity: Satellite Hacking (W53) [PentestMag]
๐Ÿ‘3๐Ÿ”ฅ1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
How to read paid medium articles for free ?

https://youtu.be/Ke7J3iGhhEc?si=fvn2J5f8ypNihA8P
๐Ÿ‘2๐Ÿ”ฅ1
https://system32.ink/soul-stealer-most-powerful-stealer/

The MOST powerful stealer (Cookie stealer, Discord token stealer, Roblox stealer, Password stealer, Credit card stealer, Autofill stealer, Steam stealer) Much MORE

Soul Stealer - Most Powerful Stealer
๐Ÿ”ฅ1
๐Ÿ”ฅ2
https://system32.ink/opencart-sql-injection-cve-2024-21514-exploit/

OpenCart Sql Injection CVE-2024-21514 Exploit


SQL Injection POC for CVE-2024-21514: Divido payment extension for OpenCart
๐Ÿ‘3
https://system32.ink/php-injection-m4-pdf-extensions-cve-2023-50029-exploit/

CVE-2023-50029 is a PHP injection vulnerability in the M4 PDF Extensions module. This vulnerability allows attackers to inject and execute arbitrary PHP code on the server, enabling them to gain full control over the targeted system. The issue lies in the improper validation of inputs, allowing malicious code to be passed through user parameters.

PHP Injection M4-PDF Extensions CVE-2023-50029 Exploit
https://system32.in/product/sensepost-training-pragmactic-api-exploration-orange-cyberdefence/

SensePost training: Pragmactic API Exploration [Orange Cyberdefence]
๐Ÿ˜Ž4
https://crackcodes.in/weeablind-program-to-dub-non-english-media-with-modern-ai-speech-synthesis-diarization-and-voice-cloning/

Weeablind - program to dub non-english media with modern AI speech synthesis, diarization, and voice cloning
๐Ÿซก3
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐ŸŒWeb Attack Cheat Sheet๐Ÿ‘จ๐Ÿ’ป

Table of Contents

Discovering
Targets
IP Enumeration
Subdomain Enumeration
Wayback Machine
Cache
Crawling
Wordlist
Directory Brute Forcing
Parameter Brute Forcing
DNS and HTTP detection
Acquisitions/Names/Addresses/Contacts/Emails/etc.
HTML/JavaScript Comments
Google Dorks
Content Security Policy (CSP)
Tiny URLs Services
GraphQL
General
Enumerating
Fingerprint
Buckets
Cloud Enumeration
Containerization
Visual Identification
Scanning
Static Application Security Testing
Dependency Confusion
Send Emails
Search Vulnerabilities
Web Scanning
HTTP Request Smuggling
Subdomain Takeover
SQLi (SQL Injection)
XSS
Repositories Scanning
Secret Scanning
Google Dorks Scanning
CORS Misconfigurations
Monitoring
CVE
Attacking
Brute Force
Exfiltration
General
Manual
Payloads
Bypass
Deserialization
SSRF (Server-Side Request Forgery)
OAuth
DNS Rebinding
SMTP Header Injection
Web Shell
Reverse Shell
SQLi (SQL Injection)
XSS
XPath Injection
LFI (Local File Inclusion)
SSTI (Server Side Template Injection)
Information Disclosure
WebDAV (Web Distributed Authoring and Versioning)
Generic Tools
AI
General


https://lnkd.in/gE9uXvKS


๐Ÿ”ฅ Join @cybertrickzone For More Amazing Updates ๐Ÿ’ฏโœŒ๏ธ
๐Ÿ‘2
Tryhackme vouchers available at best rates

๐Ÿช…Monthly available ๐Ÿช…

inbox: @protocolnick to purchase
https://system32.ink/the-ejs-aka-embedded-javascript-templates-package-rce-cve-2024-33883-exploit/

The ejs (aka Embedded JavaScript templates) Package RCE CVE-2024-33883 Exploit


Insufficient Prototype Pollution Validation Leading to RCE Exploitation

With prototype pollution, set opts.client to truthy value (condition)

Then, when render() runs, ejs will run opts.escapeFunction value as JS code.
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
๐Ÿ”ฅ1