CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐ŸŒŸSubdominator๐ŸŒŸ is a powerful tool for passive subdomain enumeration during bug hunting and reconnaissance processes.

๐Ÿ“ฅ https://github.com/sanjai-AK47/Subdominator
๐Ÿ‘6
๐Ÿ”ฅ1
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
"โšก๏ธเคฏเคฆเฅ เคนเฅƒเคทเฅ€เค•เฅ‡เคถเคƒ เคคเคฆเฅ เคตเคพเคฆเคƒ เคคเคฆเฅ เคตเคพเคฆเคƒ เคชเคฐเคฎเคƒ เคถเคฟเคตเคƒ"


โ˜ข๏ธRESPONSE TO RECENT CYBERATTACKSโ˜ข๏ธ

๐ŸŽฎ10 PAKISTANI WEBSITES DATABASES  HAS BEEN  SUCCESSFULLY BREACHED๐ŸŽฎ

๐ŸŒLIST๐ŸŒ

1 State Earthquake Reconstruction & rehabilitation agency (SERRA) Pakistan

2 Foaimplants Pakistan

3 Galaxy Petroleum Pakistan

4 Jinnah Business Review Pakistan

5 Gondal Memon Association Pakistan

6 Khyber Pakhtunkhwa Human Capital Investment Project Pakistan

7 Kiran Group of Companies Pakistan

8 Horizon Oil Company Pakistan

9
Rashid Latif Medical Complex Pakistan

10 Native School System Pakistan Pakistan


๐ŸŽฎGREETZ๐ŸŽฎ
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven

๐ŸŽฎCOUNTER CYBER ATTACK๐ŸŽฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘5๐Ÿ”ฅ2โคโ€๐Ÿ”ฅ1๐Ÿพ1
๐Ÿ—ฟ27๐Ÿ‘5โค4๐Ÿซก2๐Ÿ‘Œ1
Mission_SBS.txt
1.1 KB
๐Ÿ‘3๐Ÿ’”2
https://system32.ink/cosanostra-v-1-2-http-botnet-source-code/

CosaNostra v.1.2 HTTP Botnet + Source Code
โšก2โค1๐Ÿ‘1
๐Ÿ’ฏ13๐Ÿ—ฟ6๐Ÿ’”3โคโ€๐Ÿ”ฅ2โšก1๐Ÿคฉ1๐Ÿพ1
Hey everyone! Are you interested in starting your journey in cloud and along the way earn some exciting Google Cloud goodies? Then enrol in the Google Cloud Arcade Facilitator program now! We have recently been on-boarded as an Arcade Facilitator team and would love to help you in your journey to cloud. If interested, then just go to the site below and enrol using the form. While filling out the form, enter our referral code - GCAF24-IN-JTJ-ASW so that we can help you during your journey. :) Link to the form - bit.ly/arcade-facilitator.


Join This Group For More Details: https://chat.whatsapp.com/HhFoFhemImVA7vFzgO56Gk
๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
https://system32.ink/havoc-c2-ssrf-poc/

Havoc C2 0.7 Teamserver SSRF exploit
โค2
๐Ÿคฃ28โค4๐Ÿ‘1
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”ค๐Ÿ”ค๐Ÿšฉ๐Ÿšฉ: https://system32.ink/slam-ransomware-builder/

๐ŸŽฎSlam Ransomware Builder๐ŸŽฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ13
*Rest is history
๐Ÿคฃ26โšก3๐Ÿ‘1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
We have achieved 1k followers on LinkedIn.

Thanks to everyone who had followed us on LinkedIn, those who haven't followed yet, please follow now.

https://www.linkedin.com/company/osintambition/

#osint #socmint #infosec #cybersec
โค3
๐Ÿ˜ ๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ” ๐Ÿ” ๐Ÿ’ป: https://system32.ink/apache-cve-2024-40725-and-cve-2024-40898-exploit/

CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.


โŒจ๏ธApache CVE-2024-40725 and CVE-2024-40898 Exploitโ˜บ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ3
๐Ÿ’ป ๐Ÿ˜TRYHACKME ๐Ÿ˜’ PREMIUM AVAILABLE ( PAID ) โšก๏ธ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”ฃ๐Ÿค“ONE MONTH : 250 RUPEES๐Ÿค‘๐Ÿ’ฒ

๐Ÿ”ฃ6๏ธโƒฃ month : 899 RUPEES ๐Ÿค‘๐Ÿ’ฒ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ” ๐Ÿ”  @protocolnick โœˆ๏ธ IF YOU NEED

1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ TRUSTED
1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ค MONEY BACK GUARANTEE
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐ŸŸฐ https://system32.ink/bazaar-v1-4-3-directory-traversal-cve-2024-40348-exploit/ ๐Ÿ–ฅ

๐Ÿ˜ฌBazaar v1.4.3 Directory Traversal CVE-2024-40348 Exploit๐Ÿ”ฅ


โญ๏ธAn issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal.๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
Happy Shrawan month from Entire Team Network Nine to all our wonderful mates around the globe .

May this auspicious time bring you joy, prosperity, and blessings.

Let's celebrate the spirit of this holy month together, with prayers, devotion, and gratitude.

Wishing you all a blessed and joyous Shrawan
๐Ÿ™7โคโ€๐Ÿ”ฅ2๐Ÿ‘2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐ŸŒฉ Pentest in the clouds.

โ€ข Clouds are a great tool to create a convenient infrastructure for applications and services. Companies and independent developers move their projects to AWS or Azure, often without thinking about security. But in vain.

โ€ข I will share with you some resources (known vulnerable laboratories) that will help pentesters, specialists or enthusiasts, gain practical experience in searching for vulnerabilities in cloud applications deployed on Google Cloud, AWS or Azure. Resources contain practical and theoretical material:

โ€ข FLAWS;
โ€ข FLAWS2;
โ€ข CONVEX;
โ€ข Sadcloud;
โ€ข GCP Goat;
โ€ข Lambhack;
โ€ข caponeme;
โ€ข CloudGoat;
โ€ข Thunder CTF;
โ€ข CloudFoxable;
โ€ข IAM Vulnerable;
โ€ข AWS Detonation Lab;
โ€ข OWASP WrongSecrets;
โ€ข OWASP ServerlessGoat;
โ€ข AWS S3 CTF Challenges;
โ€ข The Big IAM Challenge by Wiz;
โ€ข AWS Well Architected Security Labs;
โ€ข Damn Vulnerable Cloud Application;
โ€ข CdkGoat - Vulnerable AWS CDK Infrastructure;
โ€ข Cfngoat - Vulnerable Cloudformation Template;
โ€ข TerraGoat - Vulnerable Terraform Infrastructure;
โ€ข AWSGoat - A Damn Vulnerable AWS Infrastructure;
โ€ข AzureGoat - A Damn Vulnerable Azure Infrastructure;
โ€ข Breaking and Pwning Apps and Servers on AWS and Azure.
๐Ÿ‘3
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Blind sql injection payload used

>'%3bWAITFOR+DELAY+'00%3a00%3a5'--

Microsoft sql server

credit: @Gotcha1G

#bugbountytips #BugBounty
๐Ÿฅฐ3
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿซก3