CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
NjRat 0.7D Danger Edition.zip
15.9 MB
Forwarded from 卩ro 爪Cracker
Forwarded from 卩ro 爪Cracker
Cloning_Telegram_ES.pdf
600.1 KB
😁1
Forwarded from 卩ro 爪Cracker
​​SMBMap

SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern matching, and even execute remote commands. This tool was designed with pen testing in mind, and is intended to simplify searching for potentially sensitive data across large networks.

Some of the features have not been thoroughly tested, so changes will be forth coming as bugs are found. I only really find and fix the bugs while I'm on engagements, so progress is a bit slow. Any feedback or bug reports would be appreciated. It's definitely rough around the edges, but I'm just trying to pack in features at the moment. Version 2.0 should clean up the code a lot….whenever that actually happens ;). Thanks for checking it out!!

There's a known oddity in the SMBServer component used for the file content search feature. For some reason it throws an exception in the threading library. It still works, but the error is annoying none the less.

Features:
▫️ Pass-the-Hash Support
▫️ File upload/download/delete
▫️ Permission enumeration (writable share, meet Metasploit)
▫️ Remote Command Execution
▫️ Distrubted file content searching (beta!)
▫️ File name matching (with an auto downoad capability)

https://github.com/tothi/smbmap

#ad #samba
Forwarded from 卩ro 爪Cracker
​​COM-Hunter

COM Hijacking VOODOO

COM-hunter is a COM Hijacking persistnce tool written in C#.

Features:
▫️ Finds out entry valid CLSIDs in the victim's machine.
▫️ Finds out valid CLSIDs via Task Scheduler in the victim's machine.
▫️ Finds out if someone already used any of those valid CLSIDs in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Finds out if someone already used any of valid CLSID via Task Scheduler in order to do COM persistence (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence with general valid CLSIDs (LocalServer32/InprocServer32).
▫️ Tries to do automatically COM Hijacking Persistence via Task Scheduler.
▫️ Tries to use "TreatAs" key in order to refere to a different component.

https://github.com/nickvourd/COM-Hunter
Forwarded from 卩ro 爪Cracker
tplink.py
11.6 KB
CVE-2022-30075
Authenticated Remote Code Execution in Tp-Link Routers
2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/DUm23Pfgz6k
Storm-Breaker a social engineering tool that can be used to access the location, webcam, and microphone.

https://github.com/ultrasecurity/Storm-Breaker
https://github.com/impact-i/reFlutter

This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app repacking. This library has snapshot deserialization process modified to allow you perform dynamic analysis in a convenient way.
https://github.com/zidansec/CloudPeler

CrimeFlare is a useful tool for bypassing websites protected by CloudFlare WAF, with this tool you can easily see the real IP of websites that have been protected by CloudFlare. The resulting information is certainly very useful for conducting further penetration testing, and analyzing websites with the same server.
👍2
https://github.com/necreas1ng/VLANPWN

​​VLANPWN

VLAN attacks toolkit

DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of injection of a frame with two 802.1Q tags, a test ICMP request will also be sent.

DTPHijacking.py - A script for conducting a DTP Switch Spoofing/Hijacking attack. Sends a malicious DTP-Desirable frame, as a result of which the attacker's machine becomes a trunk channel. The impact of this attack is that you can bypass the segmentation of VLAN networks and see all the traffic of VLAN networks.
👍2🔥1
Forwarded from 卩ro 爪Cracker
LinkedIn-Full.torrent
498.6 KB
Forwarded from 卩ro 爪Cracker
Forwarded from 卩ro 爪Cracker
Sberbank Translations.zip
1.5 GB
More than 13,500 files hacked from the Sberbank of Russia translation agency provide a unique insight into the interests of the bank and its clients. Translations include political analysis, military sales and open source reporting.
Forwarded from 卩ro 爪Cracker
How to open a safe

A vulnerability allows opening electronic safes from the Sentry Safe and Master Lock company without any pin code.

https://github.com/H4ckd4ddy/bypass-sentry-safe
👍1
Forwarded from 卩ro 爪Cracker
Dropbox_9.8m_mail_pass.txt
296.4 MB
Forwarded from 卩ro 爪Cracker
raptor_waf

Raptor is a Web application firewall made in C that uses DFA to block SQL injection, Cross-site scripting, and path traversal.

https://github.com/CoolerVoid/raptor_waf

Research:
http://funguscodes.blogspot.com.br/
👍2
Forwarded from 卩ro 爪Cracker
HopLa

All the power of PayloadsAllTheThings, without the overhead. This extension adds autocompletion support and useful payloads in #Burp Suite to make your intrusion easier.

Feel free to improve with your payloads ! ❤️

https://github.com/synacktiv/HopLa
👍2
Forwarded from 卩ro 爪Cracker
preen.me.sql
1.7 GB
👍1
Forwarded from 卩ro 爪Cracker
kooldox.com.sql
107.9 MB