CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://system32.ink/magento-adobe-commerce-xml-entity-injection-cve-2024-34102-exploit/

POC for CVE-2024-34102. A pre-authentication XML entity injection issue in Magento / Adobe Commerce.

Magento / Adobe Commerce XML Entity Injection CVE-2024-34102 Exploit
Forwarded from ฤฑllฤฑll โ€ข TeAm UcC OpErAtIoNs โ€ข ฤฑllฤฑll
Bangladesh Navy Military Mail Inbox Dump.tar
579.7 MB
[~] Leaked By Team UCC India !!

~> We entered the Bangladesh Navy's military email system and are now exposing the material we discovered. This dump contains critical information, confidential documents, and even high-ranking military personnel's phone numbers, making it a veritable goldmine of intelligence.

#Team_UCC #Network_Nine #All_Indian_Hacker
๐Ÿ”ฅ8
https://system32.ink/mozilla-firefox-spidermonkey-jit-rce-cve-2024-29943-exploit/

Mozilla FireFox SpiderMonkey JIT RCE CVE-2024-29943 Exploit
๐Ÿ‘1
๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰

INDIA WINS THE T20 WORLD CUP !!!

๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰ ๐ŸŽ‰
๐Ÿฅฐ7๐Ÿ†2๐Ÿ—ฟ1
This media is not supported in your browser
VIEW IN TELEGRAM
The emotions The Flag
โค9
This media is not supported in your browser
VIEW IN TELEGRAM
Celebrations going on in style through out the nation...
๐Ÿ†9๐Ÿ‘2๐ŸŽ‰1
https://system32.ink/wannacry-ransomware-builder/

GhostCrypt is a type of malware that encrypts your files and demands a ransom to decrypt them. This ransomware may add an extension to your encrypted files, making them unable to be opened without the decryption key.

WannaCRY GhostCrypt Ransomware Builder
โšก3
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
[~] Greetings Citizens [~]

๐ŸŽฎ Our Team Was Able To Breach Database Of One Of The Most Popular Taxi Services Of Bangladesh "PRABASHIIR TAXI"

๐Ÿ•ท๏ธThreat actor: Doremon

We Compressed The File's Size


Counter Cyberattack

GREETZ๐ŸŽฎ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ3๐Ÿ‘3๐Ÿ—ฟ1
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
probashirtaxi.com.zip
856.2 KB
โค4
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
๐ŸŽฎ[~] Good Morning [~]๐ŸŽฎ

Our Team Was Able To Breach More Than 5 Sites Databases Of Bangladeshi Websites Including Goverment,food, Municipality And More...

Web List
1 Office of the Chief Account's Finance Officer

2 Bangladesh Geographical Information System Platform

3 Bangladesh Computers

4 BD Foods Limited Company

5 Baizi STEEL COMPANY

Just A Simple Warning For Bd Skids
Do Not Attack On Indian Cyberspace


Counter Cyberattack

GREETZ๐ŸŽฎ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ4๐Ÿ‘3๐Ÿ†1๐Ÿ—ฟ1
https://system32.in/product/oscp-ethical-hacking-with-bug-bountyclouddefensive-mobile/

OSCP Ethical Hacking With Bug Bounty,Cloud,Defensive & Mobile
๐Ÿ”ฅ2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿ‘2โค1
https://system32.ink/openssh-unauthenticated-rce-flaw-regresshion-cve-2024-6387-exploit/

CVE-2024-6387: Critical OpenSSH Unauthenticated RCE Flaw โ€˜regreSSHionโ€™ Exposes Millions of Linux Systems

OpenSSH Unauthenticated RCE Flaw โ€˜regreSSHionโ€™ CVE-2024-6387 Exploit
โค2
https://system32.in/product/certified-mobile-application-penetration-tester-android-red-team-360/

Certified Mobile Application Penetration Tester (Android) By RedTeam 360
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
WEEKLY SUPER SEVEN NEWS CHANNEL OF PAKISTAN HAS BEEN HACKED BY TEAM-NETWORK-NINE

โ˜ข๏ธ Site https://weeklysuperseven.com.pk/
โ˜ข๏ธ Site https://e.weeklysuperseven.com.pk/
โœ… Poc https://ownzyou.com/zone/239536
โœ… Poc https://ownzyou.com/zone/239535

โ˜ข๏ธ Threat Actor : Solveig & odiyan

Greetz to

#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#ส€แด€sสœแด›ส€ษชสแด€ แด„สส™แด‡ส€ า“แดส€แด„แด‡
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
โค4โคโ€๐Ÿ”ฅ1๐Ÿ‘1๐Ÿ†1
๐Ÿ‘5๐Ÿ’”4
Forwarded from darkdrag0nz
Media is too big
VIEW IN TELEGRAM
Bhitai Dental & Medical College

Pwned by Darkdrag0nz

M4D_GH057 was here

https://bdmch.edu.pk/

https://mirror-h.org/zone/5693038/
๐Ÿ”ฅ5๐Ÿ‘2
https://system32.ink/geoserver-reverse-system-shell-cve-2024-36401-rce-exploit/

GeoServer Reverse System Shell CVE-2024-36401 RCE Exploit



How it Works

Sets up a listener on your machine for incoming reverse shell from the target.

This POC will send a post request with the payloads.

Attempts to establish a shell on the target server.

This technique assumes nc is installed on the target.
https://system32.ink/prince-ransomware-chacha20-and-ecies-encryption/

Prince Ransomware - ChaCha20 And ECIES Encryption


Prince is a ransomware written from scratch in Go. It uses a mixture of ChaCha20 and ECIES cryptography in order to encrypt files securely so that they cannot be recovered by traditional recovery tools. Files which have been encrypted by Prince can only be decrypted using the corresponding decryptor.