CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from Team-Network-Nine 🇮🇳
Happy Shrawan month from Entire Team Network Nine to all our wonderful mates around the globe .

May this auspicious time bring you joy, prosperity, and blessings.

Let's celebrate the spirit of this holy month together, with prayers, devotion, and gratitude.

Wishing you all a blessed and joyous Shrawan
🙏7❤‍🔥2👍2
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
🌩 Pentest in the clouds.

• Clouds are a great tool to create a convenient infrastructure for applications and services. Companies and independent developers move their projects to AWS or Azure, often without thinking about security. But in vain.

• I will share with you some resources (known vulnerable laboratories) that will help pentesters, specialists or enthusiasts, gain practical experience in searching for vulnerabilities in cloud applications deployed on Google Cloud, AWS or Azure. Resources contain practical and theoretical material:

FLAWS;
FLAWS2;
CONVEX;
Sadcloud;
GCP Goat;
Lambhack;
caponeme;
CloudGoat;
Thunder CTF;
CloudFoxable;
IAM Vulnerable;
AWS Detonation Lab;
OWASP WrongSecrets;
OWASP ServerlessGoat;
AWS S3 CTF Challenges;
The Big IAM Challenge by Wiz;
AWS Well Architected Security Labs;
Damn Vulnerable Cloud Application;
CdkGoat - Vulnerable AWS CDK Infrastructure;
Cfngoat - Vulnerable Cloudformation Template;
TerraGoat - Vulnerable Terraform Infrastructure;
AWSGoat - A Damn Vulnerable AWS Infrastructure;
AzureGoat - A Damn Vulnerable Azure Infrastructure;
Breaking and Pwning Apps and Servers on AWS and Azure.
👍3
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
Blind sql injection payload used

>'%3bWAITFOR+DELAY+'00%3a00%3a5'--

Microsoft sql server

credit: @Gotcha1G

#bugbountytips #BugBounty
🥰3
🔠🔤🔤🔤🔤🔤🅰️🚩🔣 https://system32.ink/meta-llama-3-1-700gb-data-leak/

📱 Meta 🐾LLaMA 3.1 700Gb+ Data Leak🎮


⚠️#DataLeak - Llama 3 leaked before official release?

A 🎮4chan user claims to have leaked the base model of Meta LLaMA 3.1-405B a few days (possibly hours, according to speculations) before the official release of Meta LLaMA 3.0.☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍41
Forwarded from OSINT AMBITION (Dheeraj Yadav)
ScrapIn - Scrape Any Data from LinkedIn, without limit.

Its paid but giving 20free credits for everyone. GO and try.


https://www.scrapin.io/

Join @osintambition for more.
#osint #socmint #geoint #humint #linkedin #infosec #cybersec
🤣32
This media is not supported in the widget
VIEW IN TELEGRAM
🥰51🔥1👌1🤣1
🔗 https://system32.ink/apache-cloudstack-cve-2024-41107-exploit/ 🖥

📌Apache CloudStack CVE-2024-41107 Exploit🛡


🔖An exploit for the critical vulnerability identified as CVE-2024-41107 in Apache CloudStack. This vulnerability affects versions 4.5.0 through 4.18.2.1 and 4.19.0.0 through 4.19.0.2. The flaw lies within the Security Assertion Markup Language (SAML) authentication mechanism, allowing attackers to submit unsigned SAML responses to gain unauthorized access to user accounts and control over cloud resources.☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
This media is not supported in the widget
VIEW IN TELEGRAM
🤣121👍1😎1
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
This media is not supported in your browser
VIEW IN TELEGRAM
As A Response To Recent Cyber Attacks On India 🎮
Some Tunisian Websites Hacked By The Night Hunters
🎮

"You are responsible for your action"🎮


🎮Sites🎮

https://www.sbs.yasat.tn/Admin_dashboard/login

User
http://ziedbm@gmail.com

Pass 20096385e

http://multi-panel.tn/admin/login:admin:admin

User: admin

Pass: admin

https://sunshinebooking.tn/admin/login.php

User: sunshine2022

Pass: 21979812sarrafb

http://kmandi.com.tn/admin357li7ikd/index.php

User:
machat@gmail.com
Pass: 12658550

http://www.casashoes.tn/admin665way5se/index.php

User:
contact@casashoes.tn

Pass: meddaoud@123---


Counter Cyberattack

GREETZ
😈
#team_aica #network_nine
#kingsman
#team404error #anonymous_india
#hacktivist_heaven
Please open Telegram to view this post
VIEW IN TELEGRAM
🫡6👍42🔥2
Forwarded from 57575704
अपने अदम्य साहस, वीरता और दृढ़ निश्चय से 1999 के कारगिल युद्ध में भारत की विजय पताका लहराने वाले हमारे वीर जवानों को 'कारगिल विजय दिवस' पर नमन।

अद्भुत शौर्य व बलिदान की सर्वोच्च परंपरा का निर्वाह कर, हमारे वीर सैनिकों ने मां भारती का मस्तक ऊंचा रखने के लिए अपना सर्वस्व समर्पित किया है।

राष्ट्र की सुरक्षा हेतु अपना सर्वोच्च बलिदान देने वाले उन हुतात्माओं के प्रति कृतज्ञ राष्ट्र सदैव ऋणी रहेगा।

जय हिंद!
7💔31🔥1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Wednesday Updates #6 is out now.

Highlights: 10 blogs, 8 external reading, 4 videos, 2 podcast episodes, 2 new events, 4 tool updates, 4 awesome tools, a resource collection and many more.

🔗 https://osintambition.substack.com/p/wednesday-updates-6

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
🔥2
Forwarded from 𝙇𝙤𝙨𝙩𝙨𝙚𝙘
today i just searched coffinxp on google and get so many good results i dont know i am mentioned in everywhere ❤️just type coffinxp or you can also type lostsec for same very good SEO on google..
check out some results i don't know this but after google i get some results thnq all who mentioned me ❤️😇

https://medium.com/@tom.sh/best-bug-hunting-methodology-for-ez-money-58b7fe928e6f

https://www.linkedin.com/posts/ethan-quinn-11621a238_bugbounty-pentesting-cybersecurity-activity-7201326813971693568-I_nE?utm_source=share&utm_medium=member_android

https://combot.org/stickers/coffin3

https://system32.in/topic/bug-hunting-methodology/

https://communityin.oppo.com/thread/1608156645420957702
😒 A Hacker Story About How He Hacked Anki,The 🛟 World's Most Popular 🩹Flashcard App


❗️Intro: It took him 10 days to go from “We think this might be vulnerable” to full-blown remote code execution, including the 7️⃣ days we were both on 🍿holiday.

🔠🔠🔠🔠 Full Blog : Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
🏳 CTF chall write-ups, files & scripts.

• CTF is one of the best methods to acquire the necessary skills in hacking various systems or gain unique knowledge in various aspects of information security.

• At the link below you can find a very useful repo, which contains current tools, scripts, platforms and video material on completing CTF. Save to favorites and use:

➡️ https://github.com/Crypto-Cat/CTF
This media is not supported in the widget
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Hey everyone, our founder has started a newsletter to share his learning about Cybersecurity, OSINT, startups, marketing, sales, money and other topics.

If anyone is interested in reading it, subscribe using the link below.

https://lifelong-learnings.beehiiv.com/

#osint #cybersecurity #marketing #sales #infosec #startups
🔠🔠🔠🔠🔠🔠🔠 🔣 https://system32.ink/cve-2024-41110-docker-authz-exploit/

#️⃣CVE-2024-41110 Docker AuthZ Exploit🚨


⚡️✏️Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 ↗️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
What coding 💻 language are you learning

This 💬information will help us to improve our content⤵️
Final Results
28%
🔠 And 🔠 DSA
28%
🔠🔠🔠🔠
46%
📱 (Nodejs,ReactJs etc.)
26%
🔠ava AND DSA
23%
💀CyberSecurity (All Field)
20%
💻Data Science
11%
😳Others
12👍84
This media is not supported in the widget
VIEW IN TELEGRAM
🗿8👍1