CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣13
*Rest is history
🤣263👍1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
We have achieved 1k followers on LinkedIn.

Thanks to everyone who had followed us on LinkedIn, those who haven't followed yet, please follow now.

https://www.linkedin.com/company/osintambition/

#osint #socmint #infosec #cybersec
3
😠🔤🔤🔤🔤🔤🔠🔠💻: https://system32.ink/apache-cve-2024-40725-and-cve-2024-40898-exploit/

CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.


⌨️Apache CVE-2024-40725 and CVE-2024-40898 Exploit☺️
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥3
💻 😐TRYHACKME 😒 PREMIUM AVAILABLE ( PAID ) ⚡️



🔣🤓ONE MONTH : 250 RUPEES🤑💲

🔣6️⃣ month : 899 RUPEES 🤑💲



🔠🔠 @protocolnick ✈️ IF YOU NEED

1️⃣0️⃣0️⃣🔣 TRUSTED
1️⃣0️⃣0️⃣🔤 MONEY BACK GUARANTEE
Please open Telegram to view this post
VIEW IN TELEGRAM
🔠🔠🔠🟰 https://system32.ink/bazaar-v1-4-3-directory-traversal-cve-2024-40348-exploit/ 🖥

😬Bazaar v1.4.3 Directory Traversal CVE-2024-40348 Exploit🔥


⭐️An issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal.🖥
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Team-Network-Nine 🇮🇳
Happy Shrawan month from Entire Team Network Nine to all our wonderful mates around the globe .

May this auspicious time bring you joy, prosperity, and blessings.

Let's celebrate the spirit of this holy month together, with prayers, devotion, and gratitude.

Wishing you all a blessed and joyous Shrawan
🙏7❤‍🔥2👍2
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
🌩 Pentest in the clouds.

• Clouds are a great tool to create a convenient infrastructure for applications and services. Companies and independent developers move their projects to AWS or Azure, often without thinking about security. But in vain.

• I will share with you some resources (known vulnerable laboratories) that will help pentesters, specialists or enthusiasts, gain practical experience in searching for vulnerabilities in cloud applications deployed on Google Cloud, AWS or Azure. Resources contain practical and theoretical material:

FLAWS;
FLAWS2;
CONVEX;
Sadcloud;
GCP Goat;
Lambhack;
caponeme;
CloudGoat;
Thunder CTF;
CloudFoxable;
IAM Vulnerable;
AWS Detonation Lab;
OWASP WrongSecrets;
OWASP ServerlessGoat;
AWS S3 CTF Challenges;
The Big IAM Challenge by Wiz;
AWS Well Architected Security Labs;
Damn Vulnerable Cloud Application;
CdkGoat - Vulnerable AWS CDK Infrastructure;
Cfngoat - Vulnerable Cloudformation Template;
TerraGoat - Vulnerable Terraform Infrastructure;
AWSGoat - A Damn Vulnerable AWS Infrastructure;
AzureGoat - A Damn Vulnerable Azure Infrastructure;
Breaking and Pwning Apps and Servers on AWS and Azure.
👍3
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Blind sql injection payload used

>'%3bWAITFOR+DELAY+'00%3a00%3a5'--

Microsoft sql server

credit: @Gotcha1G

#bugbountytips #BugBounty
🥰3
🔠🔤🔤🔤🔤🔤🅰️🚩🔣 https://system32.ink/meta-llama-3-1-700gb-data-leak/

📱 Meta 🐾LLaMA 3.1 700Gb+ Data Leak🎮


⚠️#DataLeak - Llama 3 leaked before official release?

A 🎮4chan user claims to have leaked the base model of Meta LLaMA 3.1-405B a few days (possibly hours, according to speculations) before the official release of Meta LLaMA 3.0.☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍41
Forwarded from OSINT AMBITION (Dheeraj Yadav)
ScrapIn - Scrape Any Data from LinkedIn, without limit.

Its paid but giving 20free credits for everyone. GO and try.


https://www.scrapin.io/

Join @osintambition for more.
#osint #socmint #geoint #humint #linkedin #infosec #cybersec
🤣32
This media is not supported in the widget
VIEW IN TELEGRAM
🥰51🔥1👌1🤣1
🔗 https://system32.ink/apache-cloudstack-cve-2024-41107-exploit/ 🖥

📌Apache CloudStack CVE-2024-41107 Exploit🛡


🔖An exploit for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack. This vulnerability affects versions 4.5.0 through 4.18.2.1 and 4.19.0.0 through 4.19.0.2. The flaw lies within the Security Assertion Markup Language (SAML) authentication mechanism, allowing attackers to submit unsigned SAML responses to gain unauthorized access to user accounts and control over cloud resources.☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
This media is not supported in the widget
VIEW IN TELEGRAM
🤣121👍1😎1
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
This media is not supported in your browser
VIEW IN TELEGRAM
As A Response To Recent Cyber Attacks On India 🎮
Some Tunisian Websites Hacked By The Night Hunters
🎮

"You are responsible for your action"🎮


🎮Sites🎮

https://www.sbs.yasat.tn/Admin_dashboard/login

User
http://ziedbm@gmail.com

Pass 20096385e

http://multi-panel.tn/admin/login:admin:admin

User: admin

Pass: admin

https://sunshinebooking.tn/admin/login.php

User: sunshine2022

Pass: 21979812sarrafb

http://kmandi.com.tn/admin357li7ikd/index.php

User:
machat@gmail.com
Pass: 12658550

http://www.casashoes.tn/admin665way5se/index.php

User:
contact@casashoes.tn

Pass: meddaoud@123---


Counter Cyberattack

GREETZ
😈
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
🫡6👍42🔥2
Forwarded from 57575704
अपने अदम्य साहस, वीरता और दृढ़ निश्चय से 1999 के कारगिल युद्ध में भारत की विजय पताका लहराने वाले हमारे वीर जवानों को 'कारगिल विजय दिवस' पर नमन।

अद्भुत शौर्य व बलिदान की सर्वोच्च परंपरा का निर्वाह कर, हमारे वीर सैनिकों ने मां भारती का मस्तक ऊंचा रखने के लिए अपना सर्वस्व समर्पित किया है।

राष्ट्र की सुरक्षा हेतु अपना सर्वोच्च बलिदान देने वाले उन हुतात्माओं के प्रति कृतज्ञ राष्ट्र सदैव ऋणी रहेगा।

जय हिंद!
7💔31🔥1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Wednesday Updates #6 is out now.

Highlights: 10 blogs, 8 external reading, 4 videos, 2 podcast episodes, 2 new events, 4 tool updates, 4 awesome tools, a resource collection and many more.

🔗 https://osintambition.substack.com/p/wednesday-updates-6

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
🔥2
Forwarded from 𝙇𝙤𝙨𝙩𝙨𝙚𝙘
today i just searched coffinxp on google and get so many good results i dont know i am mentioned in everywhere ❤️just type coffinxp or you can also type lostsec for same very good SEO on google..
check out some results i don't know this but after google i get some results thnq all who mentioned me ❤️😇

https://medium.com/@tom.sh/best-bug-hunting-methodology-for-ez-money-58b7fe928e6f

https://www.linkedin.com/posts/ethan-quinn-11621a238_bugbounty-pentesting-cybersecurity-activity-7201326813971693568-I_nE?utm_source=share&utm_medium=member_android

https://combot.org/stickers/coffin3

https://system32.in/topic/bug-hunting-methodology/

https://communityin.oppo.com/thread/1608156645420957702
😒 A Hacker Story About How He Hacked Anki,The 🛟 World's Most Popular 🩹Flashcard App


❗️Intro: It took him 10 days to go from “We think this might be vulnerable” to full-blown remote code execution, including the 7️⃣ days we were both on 🍿holiday.

🔠🔠🔠🔠 Full Blog : Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM