CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Spy Selling confidential Information Of ISRO
๐Ÿคฃ68๐Ÿ—ฟ4๐Ÿ‘2โค1๐Ÿ”ฅ1๐Ÿ†1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #10 is out now.

Highlights: 4 blogs, 7 external reading, 4 videos, 1 podcast episodes, 1 tool updates, 3 awesome tools and many more.

https://osintambition.substack.com/p/wednesday-updates-10

Don't forget to subscribe to get all new posts directly in your inbox.

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ‘1
๐Ÿ–ฅ https://system32.ink/necroword-embed-payload-using-undetect-macros/ ๐Ÿ–ฅ

๐Ÿ’ปNecroWord - Embed Payload Using Undetect Macros๐Ÿ”ฉ


โ„น๏ธNecroWord โ€” an easy way to embed a payload using undetect macros! ๐Ÿ˜€

๐Ÿค” What is it?

โžก๏ธโ€” In simple words - you can create an undetect infected .doc document ๐Ÿ“„

โœ๏ธHow to use ?

โžก๏ธโ€ข Generate payload gird (image file with generated code)

๐ŸŸฃโ€ข Set download link to your payload-grid

โžก๏ธโ€ข Generate your infected document!

๐Ÿ†˜Attention! โ€” This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
This media is not supported in your browser
VIEW IN TELEGRAM
India is celebrating today its first-ever
National Space Day to commemorate the successful landing of Chandrayaan-3 on the south polar region of Moon.
๐ŸŽ‰8โค5โšก1
๐Ÿ–ฅ https://system32.ink/litespeed-cache-privilege-escalation-cve-2024-28000-exploit/ ๐Ÿ–ฅ

๐Ÿ“ก LiteSpeed Cache Privilege Escalation CVE-2024-28000 Exploit ๐Ÿ’ป


โ„น๏ธ The LiteSpeed Cache plugin's user simulation feature is protected by a weak security hash generated using predictable values. An attacker can exploit this vulnerability by brute-forcing the security hash and passing it in a cookie along with a targeted user ID. If successful, the attacker can escalate their privileges to that of an Administrator. ๐Ÿ–ฅ

๐Ÿ“ŒAffected Versions
LiteSpeed Cache plugin versions prior to 6.4 are vulnerable.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2
๐Ÿ–ฅ https://system32.ink/xsslite-stealer/ ๐Ÿ–ฅ

๐ŸŽฎ XSSLite Stealer ๐Ÿป


๐Ÿ’ป XSSLite is a well-obfuscated piece of malicious software that uses several anti-analysis and anti-detection mechanisms. For example, this stealer checks whether it is launched on a virtual machine by looking for infrastructures related to Hyper-V and VMware. It also boasts some anti-debugging features.

๐Ÿ“กXSSLite uses the DLL side-loading technique to infiltrate machines. In other words, it utilizes the Windows DLL search order mechanism to leverage a legitimate program that executes the malicious payload. Following successful installation, the malicious program begins collecting relevant device data.

๐Ÿ†˜XSSLite can extract and exfiltrate data from Chromium-based browsers. Typically, stealers target browsing and search engine histories, Internet cookies, log-in credentials (usernames/passwords), personally identifiable details, credit card numbers, and other sensitive information.

โ„น๏ธAccording to XSSLite's promotional material, it can obtain data from all types of browser extensions. This could include plug-ins related to cloud storage, password management, 2FA/MFA (Two/Multi-Factor Authentication), cryptocurrency platforms, etc.

๐Ÿ“ขFurthermore, this malware can exfiltrate (download) victims' desktop files. The program also aims to steal cryptocurrency wallets. Additionally, the stealer has keylogging abilities, i.e., it can record keystrokes (keyboard input).

โžก๏ธIt is pertinent to mention that malware developers commonly improve upon their creations and methodologies; therefore, potential future iterations of XSSLite could have additional/different capabilities.
Please open Telegram to view this post
VIEW IN TELEGRAM
โšก2๐Ÿ‘1
Bayraktar Akinci Combat Drones Purchased By Porkistan From Turkey ๐Ÿฆƒ

Hacked By PKG

https://www.instagram.com/reel/C_F5b9zScB7/?igsh=MTA4MXoxenQyN2IzYg==
โค8๐Ÿ”ฅ3โšก2๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ https://system32.ink/windows-tcp-ip-remote-code-execution-cve-2024-38063-exploit/ ๐Ÿ–ฅ

๐Ÿ–ฅ Windows TCP/IP Remote Code Execution CVE-2024-38063 Exploit ๐Ÿ’ป


๐Ÿ“ก RCE in tcpip.sys ๐Ÿ–ฅ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค1
โœ๏ธ เคˆเคถเฅเคตเคฐเคƒ เคชเคฐเคฎเคƒ เค•เฅƒเคทเฅเคฃเคƒ เคธเคšเฅเคšเคฟเคฆเคพเคจเคจเฅเคฆเคตเคฟเค—เฅเคฐเคนเคƒเฅค
เค…เคจเคพเคฆเคฟเคฐเคพเคฆเคฟเคฐเฅเค—เฅ‹เคตเคฟเคจเฅเคฆเคƒ เคธเคฐเฅเคตเฅ‡เค•เคพเคฐเคฃเค•เคพเคฐเคฃเคฎเฅ เฅฅ

โšก๏ธ Lord Krishna who is known as Govinda is the Supreme Godhead. He
has an eternal, blissful, spiritual body. He is the origin of
all. He has no other origin and He is the prime cause of all

โžก๏ธเคญเค—เคตเคพเคจเฅ เคคเฅ‹ เค•เฅƒเคทเฅเคฃ เคนเฅˆเค‚, เคœเฅ‹ เคธเคšเฅเคšเคฟเคฆเคพเคจเคจเฅเคฆ เคธเฅเคตเคฐเฅเคช เคนเฅˆเค‚เฅค เค‰เคจเค•เคพ เค•เฅ‹เคˆ เค†เคฆเคฟ เคจเคนเฅ€เค‚ เคนเฅˆ, เค•เฅเคฏเฅ‹เค‚เค•เคฟ เคตเฅ‡ เคชเฅเคฐเคคเฅเคฏเฅ‡เค• เคตเคธเฅเคคเฅ เค•เฅ‡ เค†เคฆเคฟ เคนเฅˆเค‚เฅค
เคญเค—เคตเคพเคจ เค—เฅ‹เคตเคฟเค‚เคฆ เคธเคฎเคธเฅเคค เค•เคพเคฐเคฃเฅ‹เค‚ เค•เฅ‡ เค•เคพเคฐเคฃ เคนเฅˆเค‚เฅค
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ™12โค7๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ Cacti 1.2.26 CVE-2024-25641 RCE Automated Exploit ๐Ÿชฉ


๐Ÿ” 0๏ธโƒฃ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”  ๐Ÿ”ฃ https://system32.ink/cacti-1-2-26-cve-2024-25641-rce-automated-exploit/ ๐Ÿ–ฅ

๐Ÿ’ป Fully automated exploit for CVE-2024-25641. When a user is authenticated, Cacti version 1.2.26 is vulnerable to an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server (RCE).๐Ÿป
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2๐Ÿ‘2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #11 is out now.

Highlights: 8 blogs, 3 external readings, 4 videos, 1 podcast episode, 1 Event update, 1 tool update, 2 awesome tools, and many more.

https://osintambition.substack.com/p/wednesday-updates-11

Don't forget to subscribe to get all new posts directly in your inbox.

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ‘3
๐Ÿ–ฅ https://system32.ink/oxyco-rat-pro-v3-9-6/ ๐Ÿ–ฅ

๐Ÿ’ป Oxyco RAT PRO v3.9.6 ๐Ÿคก


โ„น๏ธ Compatible with all devices
๐ŸŸข Bypass Play Store Signature
๐Ÿ˜ˆ The bypass does not depend on APK files outside the Play Store
๐Ÿ›ก 100% FUD APK file
โณ No screen permissions required
๐ŸŽ No permission requests when installing APKs on your device

โฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐ
Please open Telegram to view this post
VIEW IN TELEGRAM
โšก2โค1
gg's hacker's ( have a good day โ€”โค๏ธ
โ€ผ๏ธanyone remember ? miss you all

Link


Search by keyword, 
filter by vulnerability type,
service affected and OS. Detailed description for each exploit
(with PoC, Nuclei template or Metasploit module


#hacker_bano_chutiya_nhe ๐ŸŒœโค๏ธ๐ŸŒ› { back to work }
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘5๐Ÿฅฐ2โค1
Thank You For 1๏ธโƒฃ0๏ธโƒฃ๐Ÿ”  Subscribers ๐Ÿ’Ÿ

Something ๐Ÿ†• Is Comming ๐ŸŒŸ๐ŸŒŸ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘16โคโ€๐Ÿ”ฅ8โค2
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
The Night Hunters Present: Sudarshana

Inspired by the might of Shree Krishna's Sudarshana Chakra, weโ€™ve forged a new weapon for the digital age. Sudarshana is our latest Layer 7 DDoS tool, crafted with precision to strike web applications where it hurts the most.

This tool is as simple as it is powerful, making it accessible for anyone looking to test or target with unmatched efficiency. We've built Sudarshana to reflect our philosophy: precision, power, and control.

Stay sharp.Sudarshana is coming soon to a battlefield near you.
โคโ€๐Ÿ”ฅ14โšก2
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
Target: Bangladesh Government's Skills Development Authority
Breach: System Compromise and Data Exfiltration

We have successfully compromised the Bangladesh Government's Skills Development Authority system, gaining full access to its administrative panel. The data exfiltrated includes sensitive information from multiple government agencies, covering sectors such as education, housing, public works, and more.

Demand:
To prevent the public release or sale of this data, we demand a payment of $699 in Bitcoin within one month. Failure to meet this deadline will result in the data being auctioned to the highest bidder or released publicly.

Bitcoin Address:
bc1pspw90939uqt2dgp0fnj2z7p3fzq458wqtvwmrf768jk2tetlp55qkxczg8

Proof of Access:
As evidence of our breach, we are releasing 10 citizen certificates issued by the Prime Minister's Office, accessed through the National Skills Development Authority (NSDA). This demonstrates our ability to extract and manipulate sensitive data within your system.

Humanitarian Note:
The money from this operation will be donated to the poor children of India to provide them with food and other essential needs.

Final Warning
The clock is ticking. Act wisely.
Deadline: October 04, 2024

Greetz
#Network_Nine #Kingsman
#DCW #AnonymousIndia
#cybergaurdsanatani
#hacktivist_heaven
#team404error
โคโ€๐Ÿ”ฅ5๐Ÿ‘4โค2
๐Ÿ–ฅ ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ” ๐Ÿ”ฃ๐ŸŸฐ https://system32.ink/avtech-devices-rce-cve-2024-7029-exploit/ ๐Ÿ–ฅ

๐Ÿ’ป AvTech Devices RCE CVE-2024-7029 Exploit๐Ÿ–ฅ


๐Ÿ“กโžก๏ธCVE-2024-7029 is a critical security flaw in AVTech devices that allows unauthorized access through authentication bypass, potentially leading to remote code execution. This vulnerability is particularly concerning because it can be exploited remotely, making networks with these devices highly vulnerable.โžก๏ธ

โฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ3๐Ÿคฉ1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #12 is out now.

Highlights -
Play Geolocation with AI, OSINT UK meetup, exclusive professionals' community, Win free OSINT Industries credit, Use AI for OSINT, and many other interesting stuffs.

https://osintupdates.com/p/wednesday-updates-12

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ–ฅ https://system32.ink/mediatek-wi-fi-chipsets-cve-2024-20017-exploit/

๐Ÿ–ฅ MediaTek Wi-Fi Chipsets CVE-2024-20017 Exploit ๐Ÿ’ป


โฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐ
๐ŸŽฎ Zero Click Exploit ๐Ÿ˜Ž
โฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐโฐ

โ„น๏ธ The vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking. Overall itโ€™s a pretty simple bug to understand as itโ€™s just a run-of-the-mill stack buffer overflow, so I thought Iโ€™d use this bug as a case study to explore multiple exploit strategies that can be taken using for this one bug, applying different exploit mitigations and conditions along the way. I think this is interesting as it provides an opportunity to focus on the more creative parts of exploit development: once you know thereโ€™s a bug, and you understand the constraints, coming up with all of the different ways you can influence the logic of the application and the effects of the bug to get code execution and pop a shell.โžก๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘6