CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Thanks ๐Ÿ˜˜ to all the teams, you guys did a great job ๐Ÿ˜ต. Showed an advance from India ๐Ÿ‡ฎ๐Ÿ‡ณ.

India needs people like you a lot ๐Ÿ’ป
Please open Telegram to view this post
VIEW IN TELEGRAM
โค11๐Ÿ”ฅ2๐Ÿฅฐ2โคโ€๐Ÿ”ฅ1
๐Ÿ‘3
Forwarded from GlorySec
We have Seized a big Pakistani IT firm

Storage

Archive

Website

Our analysis has revealed that Pakistan, amid its efforts to strengthen ties with China, is purportedly funneling resources to terrorist militias, a situation that directly threatens regional stability and global peace. This concerning development has prompted us to act in the interest of safeguarding international security and upholding our principles of justice and transparency.

Effective immediately, GlorySec is initiating a comprehensive review of the assets and operations. This firm, which operates within critical sectors related to technology and data management, has been identified as having potential connections or exposure that may impact our strategic objectives and international security landscape.

Key Actions:

Asset Seizure: We are implementing a temporary seizure of all assets related to the aforementioned IT firm to conduct an in-depth review of its financial transactions, operational links, and affiliations.

Asset Review: Our team will perform a thorough analysis of the firmโ€™s assets to determine any connections to entities or individuals involved in the funding of terrorist activities or in support of geopolitical agendas that undermine global stability.

We remain committed to our mission of ensuring global security and countering threats that jeopardize international peace. GlorySec will continue to monitor the situation closely and take necessary actions to protect our collective interests.

Pakistan and India are our strategic allies, we haven't seized the main website which consumers have access to, we have seized .pk for the time being to analyze the data (we have left the .com domain safe).

We like the changes that Pakistani government is putting out and the fact that it is striving for westernization, thank you for hearing your people out.

(This attack is to ensure that China is not embezzling Pakistani assets)

#OpCommunism #OpTerrorism

Signal - @GlorySec.01
โค16๐Ÿ‘3๐Ÿ‘Œ2
Forwarded from ๐ˆ๐๐ƒ๐ˆ๐€๐ ๐‚๐˜๐๐„๐‘ ๐…๐Ž๐‘๐‚๐„
Gov. Of Bangladesh National E-mail System Compromised!


#IndianCyberForce
#OpBDPedophiles
โคโ€๐Ÿ”ฅ11โšก2๐Ÿ‘1๐Ÿฅฐ1
๐Ÿ–ฅ https://system32.ink/nginx-ingress-kubernetes-cve-2024-7646-poc/ ๐Ÿ–ฅ

๐Ÿ–ฅ NGINX-Ingress Kubernetes CVE-2024-7646 PoC ๐Ÿป


๐ŸšจA security issue was discovered in ingress-nginx where an actor with permission to create Ingress objects (in the networking.k8s.io or extensions API group) can bypass ๐Ÿ–ฅ annotation validation to inject arbitrary commands and obtain the credentials of the ingress-nginx controller. In the default configuration, that credential has access to all secrets in the cluster.๐Ÿ˜ต

๐Ÿ“กThe issue allows an attacker to access the Kubernetes Service Account (SA) token by exploiting improper input validation in the nginx.ingress.kubernetes.io/auth-tls-verify-client annotation.๐Ÿ’ป
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Prapatti ็ˆชใ„šๅ‡ าœ
๐Ÿ˜’TRYHACKME๐Ÿ˜’ PREMIUM AVAILABLE ( PAID ) โšก๏ธ

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”ฃ๐Ÿค“ ONE MONTH : 250 RUPEES (๐Ÿ’ฒCHECKOUT) ๐Ÿค‘

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ” ๐Ÿ”ค @ProtocolNick โœˆ๏ธ IF YOU NEED

1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ TRUSTED
1๏ธโƒฃ0๏ธโƒฃ0๏ธโƒฃ๐Ÿ”ฃ MONEY BACK GUARANTEE
Please open Telegram to view this post
VIEW IN TELEGRAM
โšกHappy RakshaBandhan
โคโ€๐Ÿ”ฅ22โค9๐Ÿ—ฟ5๐Ÿ‘2๐Ÿฅฐ2๐Ÿ’”2๐Ÿ‘Œ1
Forwarded from WRICK [ ๐‡๐ ]
HOSTINGER
VPS โœ”๏ธ
HOSTINGS โœ”๏ธ
CPANEL HOSTINGS โœ”๏ธ
RDPS โœ”๏ธ
DOMAINS โœ”๏ธ
WORDPRESS HOSTINGS โœ”๏ธ
RESELLER HOSTINGS โœ”๏ธ

๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค
๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค๐Ÿ”ค

CHEAP PRICED
85% OFF ๐Ÿ’ผ
PURCHASE HERE
PURCHASE HERE
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ’”2
๐Ÿ–ฅ https://system32.ink/best-restaurant-menu-by-pricelisto-wordpress-plugin-cve-2024-38793-exploit/ ๐Ÿ–ฅ

โ„น๏ธ Best Restaurant Menu by PriceListo Wordpress Plugin CVE-2024-38793 Exploit ๐Ÿดโ€โ˜ ๏ธ


๐Ÿ“Œ This is a proof of concept exploit for the vulnerability CVE-2024-38793, an SQL injection vulnerability for versions of the WordPress plugin Best Restaurant Menu a.k.a Great Restaurant Menu WP before 1.4.2.

๐Ÿ†˜The vulnerability occurs because of a lack on input sanitization on the groups argument when using the brm_restaurant_menu shortcode.

โœ๏ธNote: This does require the credentials of a user with at least Contributor level privileges.

๐ŸŸฅThe code will attempt to grab the username and password hashes from the WordPress users table.๐Ÿ’ป
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘4
๐Ÿ–ฅ https://system32.ink/fastadmin-retrieve-db-details-directory-traversal-cve-2024-7928-exploit/ ๐Ÿ–ฅ

๐Ÿ–ฅ FastAdmin Retrieve DB Details Directory Traversal CVE-2024-7928 Exploit ๐Ÿ’ป


โ„น๏ธ A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal ๐Ÿ–ฅ. The attack may be launched remotely. ๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in the widget
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ6โค3โšก1๐Ÿ‘Œ1
Spy Selling confidential Information Of ISRO
๐Ÿคฃ68๐Ÿ—ฟ4๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿ†1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #10 is out now.

Highlights: 4 blogs, 7 external reading, 4 videos, 1 podcast episodes, 1 tool updates, 3 awesome tools and many more.

https://osintambition.substack.com/p/wednesday-updates-10

Don't forget to subscribe to get all new posts directly in your inbox.

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ‘1
๐Ÿ–ฅ https://system32.ink/necroword-embed-payload-using-undetect-macros/ ๐Ÿ–ฅ

๐Ÿ’ปNecroWord - Embed Payload Using Undetect Macros๐Ÿ”ฉ


โ„น๏ธNecroWord โ€” an easy way to embed a payload using undetect macros! ๐Ÿ˜€

๐Ÿค” What is it?

โžก๏ธโ€” In simple words - you can create an undetect infected .doc document ๐Ÿ“„

โœ๏ธHow to use ?

โžก๏ธโ€ข Generate payload gird (image file with generated code)

๐ŸŸฃโ€ข Set download link to your payload-grid

โžก๏ธโ€ข Generate your infected document!

๐Ÿ†˜Attention! โ€” This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
India is celebrating today its first-ever
National Space Day to commemorate the successful landing of Chandrayaan-3 on the south polar region of Moon.
๐ŸŽ‰8โค5โšก1