CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
🔠 🔣 https://system32.ink/litespeed-unauthorized-account-takeover-cve-2024-44000-exploit/ 🖥

🖥 LiteSpeed Unauthorized Account Takeover CVE-2024-44000 Exploit 🎮



ℹ️ CVE-2024-44000 is a vulnerability in the LiteSpeed Cache plugin, a popular WordPress plugin.📡 This vulnerability affects session management in LiteSpeed Cache, allowing attackers to gain unauthorized access to sensitive data. ➡️
Please open Telegram to view this post
VIEW IN TELEGRAM
3
Forwarded from 𝐇𝐀𝐂𝐊𝐓𝐈𝐕𝐈𝐒𝐓 𝐕𝐀𝐍𝐆𝐔𝐀𝐑𝐃 🇮🇳
🇵🇰 Pakistan's Computerized National Identity Card (CNIC) ~ NADRA Database Leak!! ~ 𝐇𝐀𝐂𝐊𝐓𝐈𝐕𝐈𝐒𝐓 𝐕𝐀𝐍𝐆𝐔𝐀𝐑𝐃 🇮🇳
The National Database & Registration Authority (NADRA) , and The Computerised National Identity Card (CNIC) (Urdu: قومی شناختی کارڈ, romanized: qaumī śanāxtī kārḍ) is an identity card with a 13-digit number available to all adult citizens of Pakistan and their diaspora counterparts, obtained voluntarily. It includes biometric data such as 10 fingerprints, 2 iris prints, and a facial photo


Download : CLICK HERE 🚫 10GB+ 🔥

Threat Actor : INDIX

Wikipedia : Click Here / Click Here 📌

❗️ #PKKMKC #JAI HIND !!🇮🇳
👍7🗿4🔥3🏆2❤‍🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
https://tinyurl.com/yce7mxek

Mail as soon as possible
Today is last day

👆👆🚩🚩Ram Ram🚩🚩👆👆
🔥9👍21
🖥➡️ https://system32.ink/onimai-rat-v1-7-1-leaked-by-onimai-fuckers/

🫡 Onimai Rat v1.7.1 Leaked By ONIMAI FUCKERS 🎮


✏️Features

➡️Real-Time Desktop Monitoring
➡️Secure File Transfer
➡️Hidden VNC (HVNC)
➡️Encrypted Communication
➡️UAC Bypass
➡️Remote Webcam Access
➡️Multi-IP Host Support
➡️Crypto Clipper
➡️Password Recovery
➡️Anti-Debug & Anti-Sandbox
➡️Anti-Virtualization & Anti-Tamper
➡️Anti-Screenshare
➡️Ring 3 Rootkit
➡️In-Memory Execution
#️⃣Fully Undetected Scantime
#️⃣Undetected Runtime
#️⃣Remote Shell Access
#️⃣Encrypted TCP Connections
#️⃣Reverse Proxy Support
#️⃣Fileless Execution
#️⃣Persistent Access
#️⃣.Net & VB Code Execution
#️⃣System Watcher
#️⃣Startup Manager
#️⃣Registry Editor
#️⃣Remote Desktop (with Mouse Graphics Support)
#️⃣Any.Run Bypass
#️⃣FUD on Tria.ge
#️⃣NetLimiter & Wireshark Bypass
#️⃣System Watcher
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥8👍1
🖥 🔣 https://system32.ink/vicidial-unauthenticated-sqli-to-rce-cve-2024-8503-and-cve-2024-8504-exploit/

📞VICIdial Unauthenticated SQLi to RCE (CVE-2024-8503 and CVE-2024-8504) Exploit 🎮



ℹ️These vulnerabilities allow an attacker to retrieve administrative credentials through SQLi and ultimately execute arbitrary code on the target server via an RCE attack.➡️

🚨An attacker with Unauthenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.🎚

Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Free Threat Intelligence Tools by Hudson Rock
- Search for Compromised Corporate & Supply Chain Infrastructure
- Search for Compromised Employees, Customers, Users & Partners
- Discover the Password Hygiene Used by Any Company
- Use the Technology Profiler to Discover which Companies are Using a Technology
- Search for Compromised Android App Users

🔗 https://www.hudsonrock.com/threat-intelligence-cybercrime-tools

Join @osintambition for more.
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Introducing Our Osint Bot

@night_osint_bot

@night_osint_bot

@night_osint_bot


Use This For Educational Purpose Or Other Things
👮‍♂️
Please open Telegram to view this post
VIEW IN TELEGRAM
🖥 ➡️ https://system32.ink/google-chromium-v8-engine-unauthorized-access-or-execution-of-malicious-code-exploit/

🖥 Google Chromium V8 Engine Unauthorized Access or Execution Of Malicious Code Exploit 💻


ℹ️ CVE-2024-7965 affects Chrome’s V8 JavaScript engine, allowing attackers to exploit heap corruption through specially crafted HTML pages. Its high CVSS score of 8.8 indicates a severe threat to system confidentiality and integrity.

📢Google has acknowledged that CVE-2024-7965 is actively being exploited. A critical patch has been released in Chrome versions 128.0.6613.84 for Linux and 128.0.6613.84/.85 for Windows and Mac.

🛡 Due to the active exploitation of this vulnerability, it is crucial for all users to update their browsers immediately to the latest version to protect against potential data breaches and security risks.
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Forwarded from [ 𝐇𝐐 ] OFFLINE WRICK
JOIN NOW FOR FREE HOSTINGER

KVM 2 YEAELY VPS GIVEAWAY
AT @SWITCH_XD
🤣31🫡3🗿1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #14 is out now.
Highlights - Master Phone number OSINT, Learn about data breaches, #OSINTweek, geolocating public transport, upcoming OSINT events and tool updates...

https://osintupdates.com/p/wednesday-updates-14

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
To commemorate 75 years of the Territorial Army, Terrier Cyber Quest 2024 is being organized by the Territorial Army in collaboration with CyberPeace.
Looking forward to see you all at *Terrier Cyber Quest 2024* in New Delhi.
*Please don’t forget to register as registration deadline is 20th September.*
Register now at https://www.cyberchallenge.in/
4🍾42👌2👍1
Media is too big
VIEW IN TELEGRAM
HOW TO CLONE A WEBSITE (COMPLETE TUTORIAL)

DOWNLOAD LINKS -

WINDOWS - https://download.httrack.com/cserv.php3?File=httrack.exe

64 BIT WINDOWS - https://download.httrack.com/cserv.php3?File=httrack_x64.exe

LINUX - https://download.httrack.com/cserv.php3?File=httrack.tar.gz

ANDROID - https://play.google.com/store/apps/details?id=com.httrack.android

AUTHOR & CREATOR - MR SUDO (@II_SUDO_II)


➡️ Join For More :- @GodGeeks
❤‍🔥7👍3
🖥 🔣 https://system32.ink/nanocore-rat-malware/

🤡 NanoCore Rat Malware 🎮


💻 NanoCore is an example of a RAT, which is a type of malware designed to provide an attacker with access to and control over an infected machine. Like most RATs, NanoCore provides a wide range of capabilities, including:

#️⃣Screen capture
#️⃣Remote access
#️⃣Keylogging
#️⃣Password stealing
✏️Screen locking
#️⃣Data exfiltration
#️⃣Run backdoor commands
#️⃣Webcam session theft
#️⃣Cryptocurrency mining

ℹ️ NanoCore is one of the leading malware variants currently in operation. In fact, it was number ten in Check Point Research’s list of the top malware families. ➡️
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥2👍2
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
🚨 Operation Karma: Last Phase 🚨 
Today, we achieved another victory. A malicious website disguised as an APK mod provider, spreading ransomware and RATs (Remote Access Trojans), has been shut down. This site was targeting innocent users in the name of Android APKs, putting their personal data and privacy at risk. We’re here to ensure that such cybercriminals have no place to hide.

🔒 Our Goal: Cybersecurity for All 🔒 
The internet belongs to its users. We aim to protect every digital citizen from malicious actors. If you’re spreading malware, consider yourself marked – we are always watching.

📅 This may be our last hacktivism act for now 📅 
The Night Hunters are taking a step back... but we will return in March 2025. This isn't goodbye – it’s just a pause. When the time comes, we’ll be back, stronger than ever, to continue our mission of cyber justice.

Stay vigilant. Stay safe. 
7🔥1
Forwarded from 𝐓𝐇𝐄 𝐍𝐈𝐆𝐇𝐓 𝐇𝐔𝐍𝐓𝐄𝐑𝐒 ⚡️ [offline]
Also As This Is Our Final Goodbye For This Year We Have Suspended Almost 50+ Websites Which Were Spreading Child Por*ography


Bravo Six Going Dark

Take Care Everyone
7👍5🔥1
Forwarded from INDIAN CYBER MAFIA
Indonesian Military Website Hacked

https://pussenkav.mil.id

I guess we are back
👍9🔥3
Forwarded from INDIAN CYBER MAFIA
Government of Bangladesh
National Tuberculosis Control Programme website has been H@cked

https://www.ntp.gov.bd
https://mail.ntp.gov.bd

Regards
INDIAN CYBER MAFIA

OFFICIAL HALALA FATHER OF ALL RADICAL ISLAMIC KIDS
9🔥4👍3
🖥 https://system32.ink/necroword-embed-payload-using-undetect-macros/ 🖥

💻NecroWord - Embed Payload Using Undetect Macros🔩


ℹ️NecroWord — an easy way to embed a payload using undetect macros! 😀

🤔 What is it?

➡️— In simple words - you can create an undetect infected .doc document 📄

✏️How to use ?

➡️• Generate payload gird (image file with generated code)

🟣• Set download link to your payload-grid

➡️• Generate your infected document!

🆘Attention! — This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #15 is out now.

Highlights: New OSINT Resources collections, interesting case studies, learn geolocation, upcoming webinar, new osint tools and many more...

https://osintupdates.com/p/wednesday-updates-15

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
👍2