CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” 0๏ธโƒฃ๐Ÿ” ๐Ÿ” ๐Ÿ”ฃโž–

https://system32.ink/exim-mail-servers-cve-2024-39929-exploit/

๐Ÿ–ฅExim through 4.97.1 misparses a multiline RFC 2231 header filename, and thus remote attackers can bypass a $mime_filename extension-blocking protection mechanism, and potentially deliver executable attachments to the mailboxes of end users. ๐Ÿ–ฅ

๐Ÿฐ EXIM Mail Servers CVE-2024-39929 Exploit ๐Ÿดโ€โ˜ ๏ธ


The ๐Ÿ–ฅscript performs the following actions:

โญ๏ธReads the list of SMTP servers from the specified file.
โญ๏ธPrompts the user for sender and recipient email addresses.
๐ŸšจConnects to each SMTP server on port 25.
๐ŸšจSends an email with a crafted attachment designed to exploit CVE-2024-39929.
#๏ธโƒฃSets the email subject to indicate the server used for sending the email.
#๏ธโƒฃPrints debug information and handles exceptions.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐ŸŽ‰1
This media is not supported in the widget
VIEW IN TELEGRAM
โšก4๐Ÿ‘พ3๐Ÿ‘2
๐Ÿ”ฃ https://system32.ink/fujitsu-network-edgiot-gw1500-m2m-gw-for-fenics-cve-2024-40617-exploit/ ๐Ÿ”ฃ

๐Ÿ–ฅ FUJITSU Network ๐Ÿ–ฅ Edgiot GW1500 ๐Ÿ–ฅ (M2M-GW for FENICS) CVE-2024-40617 Exploit


๐Ÿ–ฅ Path traversal vulnerability exists in FUJITSU Network Edgiot GW1500 (M2M-GW for FENICS). If a remote authenticated ๐Ÿ–ฅ attacker with User Class privilege sends a specially crafted request to the affected product, access restricted files containing sensitive information may be accessed. As a result, Administrator Class privileges of the product may be hijacked.๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #7 is out now.

Highlights: 8 blogs, 5 external readings, 2 videos, 1 podcast episode, 1 new challenge, 2 tool updates, 4 awesome tools, a resource collection, and many more.

https://osintambition.substack.com/p/wednesday-updates-7

Don't forget to subscribe to get all new posts directly in your inbox. #osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ–ฅ https://system32.ink/azorult-stealr-3-4-cracked/ ๐Ÿ–ฅ

๐Ÿ–ฅ Azorult Stealr 3.4 Cracked ๐Ÿ–ฅ


๐Ÿ–ฅ Azorult Stealer is a type of malware, specifically an information stealer, designed to gather sensitive information from infected computers. It targets a variety of data, including:

#๏ธโƒฃLogin credentials (usernames and passwords)
#๏ธโƒฃBanking information
โšก๏ธCryptocurrency wallets
โšก๏ธBrowser history
๐Ÿ˜ŽCookies
๐Ÿ˜ŽStored form autofill data
๐ŸชชFiles from the infected machine
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/whatsapp-extension-manipulation-poc/ ๐Ÿ–ฅ

๐Ÿ“ฑ WhatsApp Extension Manipulation PoC ๐ŸŽฎ


๐Ÿ–ฅ Android malware (.apk) can be spread through a fake PDF ๐Ÿ–ฅ document by manipulating the file extension in the WhatsApp application ๐Ÿ˜ˆ.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3
๐Ÿคฃ22โค2๐Ÿซก2๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ https://system32.ink/windows-applocker-driver-lpe-cve-2024-21338-exploit/ ๐Ÿ–ฅ

๐Ÿ–ฅ Windows AppLocker Driver LPE CVE-2024-21338 Exploit ๐Ÿดโ€โ˜ ๏ธ


โœ๏ธThe bug resides in the AppHashComputeImageHashInternal() function, which could be invoked by sending an IOCTL with value 0x22A018 to the device object named \\Device\Appid.

โœ๏ธThe driver expects two pointers referenced from the IOCTLโ€™s input buffer.

โœ๏ธThis bug results in a powerful primitive, given that we have complete control of the instruction pointer and the data in the first argument via a callback.

โœ๏ธBased on the ACL present on the device object name, only the LOCAL SERVICE and AppIDSvc users have enough permission to send the target IoControlCode.

โœ๏ธThe target driver, appid.sys, is not automatically loaded and requires sending an event to a specific AppLocker-related ETW provider.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘1
This media is not supported in the widget
VIEW IN TELEGRAM
โค4๐Ÿ‘1๐Ÿ”ฅ1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Shall we start our YouTube channel again?

I am working on improving my communication and speaking skills, so if the community want's, we can start create some beginner friendly videos and some on unexplored topics in OSINT.
If we hit 700subs, will start.
youtube.com/@osintambition

#OSINT #socmint #humint #geoint #intelligence #infosec #cybersec
๐Ÿ‘7โค4
2๏ธโƒฃ5๏ธโƒฃ FREE USEFUL WEBSITE ๐Ÿ–ฅ

#๏ธโƒฃ1. sizeasy.com โ€“Visualize and compare the size of any product.

#๏ธโƒฃ2. whatfontis.com โ€“quickly determine the font name from an image.

#๏ธโƒฃ3. fontsquirrel.com โ€“A good collection of fonts โ€“ free for personal and commercial use.

#๏ธโƒฃ4. regex.info โ€“ Find data hidden in your photographs .

#๏ธโƒฃ5. tineye.com โ€“ This is like an online version of Google Googles.

#๏ธโƒฃ6. iwantmyname.com โ€“ Helps you search domains across allTLDs.

#๏ธโƒฃ7. tabbloid.com โ€“Your favorite blogs delivered as PDFs.

#๏ธโƒฃ8. join.me โ€“ Share your screen with anyone over the web.

#๏ธโƒฃ9. onlineocr.net โ€“Recognize text from scanned PDFs and images โ€“ see other OCR tools.

#๏ธโƒฃ10. flightstats.com โ€“Track flight status at airports worldwide.

๐Ÿ’ก11. wetransfer.com โ€“For sharing really big files online.

๐Ÿ’ก12. pastebin.com โ€“ A temporary onlineclipboard for your text and code snippets.

๐Ÿ’ก13. polishmywriting.com โ€“Check your writing for spelling or grammatical errors.

๐Ÿ’ก14 . awesomehighlighter.com โ€“ Easily highlight the important parts of a web page.

๐Ÿ’ก15. typewith.me โ€“Work on the same document with multiple people.

#๏ธโƒฃ16 . whichdateworks.com โ€“Planning an event? Find a date that works for all.

#๏ธโƒฃ17. everytimezone.com โ€“ A less confusing view of the world time zones.

#๏ธโƒฃ18. warrick.cs.odu.edu โ€“ Youโ€™ll need this when your bookmarked web pages are deleted.

#๏ธโƒฃ19. gtmetrix.com โ€“ The perfect tool for measuring your site performance online.

#๏ธโƒฃ20. imo.im โ€“ Chat with your buddies on Skype,Facebook, GoogleTalk, etc from one place.

#๏ธโƒฃ21. translate.google.com โ€“ Translate web pages,PDFs and Office documents.

#๏ธโƒฃ22. youtube.com/leanback โ€“ Sit back and enjoy YouTube videos in full-screen mode.

#๏ธโƒฃ23. similarsites.com โ€“Discover new sites that are similar to what you like already.

#๏ธโƒฃ24. wordle.net โ€“ Quicksummarize long pieces of text with tag clouds.

#๏ธโƒฃ25. bubbl.us โ€“ Create mind-maps, brainstorm ideas in the browser.

For More Click Here
Please open Telegram to view this post
VIEW IN TELEGRAM
โค6๐Ÿ‘5โคโ€๐Ÿ”ฅ2๐Ÿพ1
This media is not supported in your browser
VIEW IN TELEGRAM
โšก2๐Ÿ’”2โค1๐Ÿ‘1๐Ÿ”ฅ1๐Ÿคฃ1
In the name of Protests... Hindus are being targeted in #Bangladesh.
๐Ÿ’”14
1971
2024
๐Ÿคฃ7โšก1๐Ÿ—ฟ1
This media is not supported in your browser
VIEW IN TELEGRAM
The man who freed Bangladesh from Islamists gets a taste of the people he freed .
๐Ÿ’”1
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
Team-Network-Nine Never forgive and Forget
#united Indian hackers
#operation all red
#save Bangladeshi Hindu
โค8
Forwarded from Team-Network-Nine ๐Ÿ‡ฎ๐Ÿ‡ณ
DEBIDWAR ISLAMIA FAZIL MADRASAH was hacked by Team-Network-Nine

โ˜ ๏ธ site https://difm.edu.bd/
โ™ป๏ธ Poc https://ownzyou.com/zone/245653
โ˜ข๏ธ #OPERATION ALL RED
โ˜ข๏ธ Threat Actor : Solveig

Greetz to
#Anonymous Nepal
#TEAM 4-Bit
#Team NWH SECURITY
#Demonsec
#Team D4RK PREDAT0RZ
#ส€แด€sสœแด›ส€ษชสแด€ แด„สส™แด‡ส€ า“แดส€แด„แด‡
#Team ucc
#Team BlackDragonsec
#indiancybermafia
#anonsec
#cryptojackers india
#Hacktivist of vanguard
#the_nh_india
#kingsman
#Team Nwh security
#save Bangladeshi Hindu
โค6โšก2๐Ÿ”ฅ2
This media is not supported in your browser
VIEW IN TELEGRAM
Peaceful Jamati protesters inside a zoo in Dhaka, #Bangladesh..

They are not even sparing innocent animals..
๐Ÿ’”28
Forwarded from bug bounty hunters
Media is too big
VIEW IN TELEGRAM
Bug bounty Hunting Basic 001 in Hindi
By @learn_bug_bounty
BB001



Give reaction for motivating me
This is my first video ...
Forward and support โœ…
If there are any mistakes in video quality ignore
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘7โšก2๐Ÿ”ฅ1
๐Ÿ–ฅ https://system32.ink/cve-2024-7339-exploit-information-leak-vulnerability-in-dvr-devices/ ๐ŸŒ

๐Ÿช† CVE-2024-7339 ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” 0๏ธโƒฃ๐Ÿ” ๐Ÿ” : Information Leak Vulnerability In DVR Devices


๐Ÿ’ป A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. This vulnerability affects unknown code of the file /queryDevInfo. The manipulation leads to information disclosure. The attack can be initiated remotely. ๐Ÿคก

๐Ÿ“ก Over 400,000+ Devices which leaks information. ๐Ÿค–
Please open Telegram to view this post
VIEW IN TELEGRAM
โค3
๐ŸŸข TRYHACKME PREMIUM AVAILABLE ( PAID )

๐ŸŸข YOUTUBE AND AMAZON PRIME PREMIUM AVAILABLE ( PAID )

DM @CYBERDIN IF YOU NEED

โœ…๏ธ TRUSTED
๐ŸŒ 100% MONEY BACK GUARANTEE

CHECK @PROOFSCDI FOR PROOFS

๐Ÿ” ๐Ÿ”    ๐Ÿ” ๐Ÿ”ค๐Ÿ” ๐Ÿ” 
Please open Telegram to view this post
VIEW IN TELEGRAM