CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
387 videos
723 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
https://tinyurl.com/yce7mxek

Mail as soon as possible
Today is last day

๐Ÿ‘†๐Ÿ‘†๐Ÿšฉ๐ŸšฉRam Ram๐Ÿšฉ๐Ÿšฉ๐Ÿ‘†๐Ÿ‘†
๐Ÿ”ฅ9๐Ÿ‘2โšก1
๐Ÿ–ฅโžก๏ธ https://system32.ink/onimai-rat-v1-7-1-leaked-by-onimai-fuckers/

๐Ÿซก Onimai Rat v1.7.1 Leaked By ONIMAI FUCKERS ๐ŸŽฎ


โœ๏ธFeatures

โžก๏ธReal-Time Desktop Monitoring
โžก๏ธSecure File Transfer
โžก๏ธHidden VNC (HVNC)
โžก๏ธEncrypted Communication
โžก๏ธUAC Bypass
โžก๏ธRemote Webcam Access
โžก๏ธMulti-IP Host Support
โžก๏ธCrypto Clipper
โžก๏ธPassword Recovery
โžก๏ธAnti-Debug & Anti-Sandbox
โžก๏ธAnti-Virtualization & Anti-Tamper
โžก๏ธAnti-Screenshare
โžก๏ธRing 3 Rootkit
โžก๏ธIn-Memory Execution
#๏ธโƒฃFully Undetected Scantime
#๏ธโƒฃUndetected Runtime
#๏ธโƒฃRemote Shell Access
#๏ธโƒฃEncrypted TCP Connections
#๏ธโƒฃReverse Proxy Support
#๏ธโƒฃFileless Execution
#๏ธโƒฃPersistent Access
#๏ธโƒฃ.Net & VB Code Execution
#๏ธโƒฃSystem Watcher
#๏ธโƒฃStartup Manager
#๏ธโƒฃRegistry Editor
#๏ธโƒฃRemote Desktop (with Mouse Graphics Support)
#๏ธโƒฃAny.Run Bypass
#๏ธโƒฃFUD on Tria.ge
#๏ธโƒฃNetLimiter & Wireshark Bypass
#๏ธโƒฃSystem Watcher
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ8๐Ÿ‘1
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/vicidial-unauthenticated-sqli-to-rce-cve-2024-8503-and-cve-2024-8504-exploit/

๐Ÿ“žVICIdial Unauthenticated SQLi to RCE (CVE-2024-8503 and CVE-2024-8504) Exploit ๐ŸŽฎ



โ„น๏ธThese vulnerabilities allow an attacker to retrieve administrative credentials through SQLi and ultimately execute arbitrary code on the target server via an RCE attack.โžก๏ธ

๐ŸšจAn attacker with Unauthenticated access to VICIdial as an "agent" can execute arbitrary shell commands as the "root" user. This attack can be chained with CVE-2024-8503 to execute arbitrary shell commands starting from an unauthenticated perspective.๐ŸŽš

โฐโฐโฐโฐโฐโฐโฐโฐโฐ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Free Threat Intelligence Tools by Hudson Rock
- Search for Compromised Corporate & Supply Chain Infrastructure
- Search for Compromised Employees, Customers, Users & Partners
- Discover the Password Hygiene Used by Any Company
- Use the Technology Profiler to Discover which Companies are Using a Technology
- Search for Compromised Android App Users

๐Ÿ”— https://www.hudsonrock.com/threat-intelligence-cybercrime-tools

Join @osintambition for more.
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
Introducing Our Osint Bot

@night_osint_bot

@night_osint_bot

@night_osint_bot


Use This For Educational Purpose Or Other Things
๐Ÿ‘ฎโ€โ™‚๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ–ฅ โžก๏ธ https://system32.ink/google-chromium-v8-engine-unauthorized-access-or-execution-of-malicious-code-exploit/

๐Ÿ–ฅ Google Chromium V8 Engine Unauthorized Access or Execution Of Malicious Code Exploit ๐Ÿ’ป


โ„น๏ธ CVE-2024-7965 affects Chromeโ€™s V8 JavaScript engine, allowing attackers to exploit heap corruption through specially crafted HTML pages. Its high CVSS score of 8.8 indicates a severe threat to system confidentiality and integrity.

๐Ÿ“ขGoogle has acknowledged that CVE-2024-7965 is actively being exploited. A critical patch has been released in Chrome versions 128.0.6613.84 for Linux and 128.0.6613.84/.85 for Windows and Mac.

๐Ÿ›ก Due to the active exploitation of this vulnerability, it is crucial for all users to update their browsers immediately to the latest version to protect against potential data breaches and security risks.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2
Forwarded from [ ๐‡๐ ] OFFLINE WRICK
JOIN NOW FOR FREE HOSTINGER

KVM 2 YEAELY VPS GIVEAWAY
AT @SWITCH_XD
๐Ÿคฃ31๐Ÿซก3๐Ÿ—ฟ1
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #14 is out now.
Highlights - Master Phone number OSINT, Learn about data breaches, #OSINTweek, geolocating public transport, upcoming OSINT events and tool updates...

https://osintupdates.com/p/wednesday-updates-14

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
To commemorate 75 years of the Territorial Army, Terrier Cyber Quest 2024 is being organized by the Territorial Army in collaboration with CyberPeace.
Looking forward to see you all at *Terrier Cyber Quest 2024* in New Delhi.
*Please donโ€™t forget to register as registration deadline is 20th September.*
Register now at https://www.cyberchallenge.in/
โค4๐Ÿพ4โšก2๐Ÿ‘Œ2๐Ÿ‘1
Media is too big
VIEW IN TELEGRAM
HOW TO CLONE A WEBSITE (COMPLETE TUTORIAL)

DOWNLOAD LINKS -

WINDOWS - https://download.httrack.com/cserv.php3?File=httrack.exe

64 BIT WINDOWS - https://download.httrack.com/cserv.php3?File=httrack_x64.exe

LINUX - https://download.httrack.com/cserv.php3?File=httrack.tar.gz

ANDROID - https://play.google.com/store/apps/details?id=com.httrack.android

AUTHOR & CREATOR - MR SUDO (@II_SUDO_II)

โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–
โžก๏ธ Join For More :- @GodGeeks
โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–
โคโ€๐Ÿ”ฅ7๐Ÿ‘3
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/nanocore-rat-malware/

๐Ÿคก NanoCore Rat Malware ๐ŸŽฎ


๐Ÿ’ป NanoCore is an example of a RAT, which is a type of malware designed to provide an attacker with access to and control over an infected machine. Like most RATs, NanoCore provides a wide range of capabilities, including:

#๏ธโƒฃScreen capture
#๏ธโƒฃRemote access
#๏ธโƒฃKeylogging
#๏ธโƒฃPassword stealing
โœ๏ธScreen locking
#๏ธโƒฃData exfiltration
#๏ธโƒฃRun backdoor commands
#๏ธโƒฃWebcam session theft
#๏ธโƒฃCryptocurrency mining

โ„น๏ธ NanoCore is one of the leading malware variants currently in operation. In fact, it was number ten in Check Point Researchโ€™s list of the top malware families. โžก๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โคโ€๐Ÿ”ฅ2๐Ÿ‘2
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
๐Ÿšจ Operation Karma: Last Phase ๐Ÿšจ 
Today, we achieved another victory. A malicious website disguised as an APK mod provider, spreading ransomware and RATs (Remote Access Trojans), has been shut down. This site was targeting innocent users in the name of Android APKs, putting their personal data and privacy at risk. Weโ€™re here to ensure that such cybercriminals have no place to hide.

๐Ÿ”’ Our Goal: Cybersecurity for All ๐Ÿ”’ 
The internet belongs to its users. We aim to protect every digital citizen from malicious actors. If youโ€™re spreading malware, consider yourself marked โ€“ we are always watching.

๐Ÿ“… This may be our last hacktivism act for now ๐Ÿ“… 
The Night Hunters are taking a step back... but we will return in March 2025. This isn't goodbye โ€“ itโ€™s just a pause. When the time comes, weโ€™ll be back, stronger than ever, to continue our mission of cyber justice.

Stay vigilant. Stay safe. 
โค7๐Ÿ”ฅ1
Forwarded from ๐“๐‡๐„ ๐๐ˆ๐†๐‡๐“ ๐‡๐”๐๐“๐„๐‘๐’ โšก๏ธ [offline]
Also As This Is Our Final Goodbye For This Year We Have Suspended Almost 50+ Websites Which Were Spreading Child Por*ography


Bravo Six Going Dark

Take Care Everyone
โค7๐Ÿ‘5๐Ÿ”ฅ1
Forwarded from INDIAN CYBER MAFIA
Indonesian Military Website Hacked

https://pussenkav.mil.id

I guess we are back
๐Ÿ‘9๐Ÿ”ฅ3
Forwarded from INDIAN CYBER MAFIA
Government of Bangladesh
National Tuberculosis Control Programme website has been H@cked

https://www.ntp.gov.bd
https://mail.ntp.gov.bd

Regards
INDIAN CYBER MAFIA

OFFICIAL HALALA FATHER OF ALL RADICAL ISLAMIC KIDS
โค9๐Ÿ”ฅ4๐Ÿ‘3
๐Ÿ–ฅ https://system32.ink/necroword-embed-payload-using-undetect-macros/ ๐Ÿ–ฅ

๐Ÿ’ปNecroWord - Embed Payload Using Undetect Macros๐Ÿ”ฉ


โ„น๏ธNecroWord โ€” an easy way to embed a payload using undetect macros! ๐Ÿ˜€

๐Ÿค” What is it?

โžก๏ธโ€” In simple words - you can create an undetect infected .doc document ๐Ÿ“„

โœ๏ธHow to use ?

โžก๏ธโ€ข Generate payload gird (image file with generated code)

๐ŸŸฃโ€ข Set download link to your payload-grid

โžก๏ธโ€ข Generate your infected document!

๐Ÿ†˜Attention! โ€” This is not a CVE | We condemn the use of software for illegal purposes. All responsibility for use lies with you
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2
Forwarded from OSINT AMBITION (Dheeraj | OSINTAmbition)
Wednesday Updates #15 is out now.

Highlights: New OSINT Resources collections, interesting case studies, learn geolocation, upcoming webinar, new osint tools and many more...

https://osintupdates.com/p/wednesday-updates-15

Join @osintambition for more.

#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate
๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/cve-2024-38200-microsoft-office-ntlmv2-exploit/

๐Ÿ–ฅ CVE-2024-38200 - Microsoft Office NTLMv2 Exploit ๐Ÿ–ฅ


โ„น๏ธ Capturing the NTLMv2 hash over HTTP is more advantageous than over SMB for relaying LDAP. When a file is requested via an Office URI, the NTLMv2 hash can be obtained over HTTP without redirecting to a UNC path using a 302 redirect. This exploitation method cannot be performed over the Internet because, unless there is a misconfiguration in Internet Properties, NTLM authentication will not occur over HTTP for a host outside the corporate network. โžก๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
CBI conducted coordinated searches at 32 different places across Pune, Hyderabad, Ahmedabad and Vishakhapatnam from the late evening of 26th September.

CBI was able to intercept 170 persons engaged in ongoing online criminal activities across four call centres.

CBI has so far placed under arrest 26 key accused persons (10 from Pune, 05 from Hyderabad and 11 from Visakhapatnam), while investigation and questioning on role of other workers at these illegal call centres is ongoing.
๐Ÿพ6๐Ÿ‘2๐Ÿ‘พ2
๐Ÿ–ฅ ๐Ÿ”ฃ https://system32.ink/zimbra-smtp-remote-command-execution-cve-2024-45519-exploit/

๐Ÿ“ฅ Zimbra SMTP - Remote Command Execution CVE-2024-45519 Exploit ๐Ÿ–ฅ


โ„น๏ธ Zimbra, a widely used email and collaboration platform, recently released a critical security update addressing a severe vulnerability in its postjournal service. This vulnerability, identified as CVE-2024-45519, allows unauthenticated attackers to execute arbitrary commands on affected Zimbra installations. In this blog post, we delve into the nature of this vulnerability, our journey in analyzing the patch, and the steps we took to exploit it manually. We also discuss the potential impact and emphasize the importance of timely patch application.โžก๏ธ

โฐโฐโฐโฐโฐโฐโฐ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2๐Ÿ”ฅ2