CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
https://github.com/Screetsec/TheFatRat

Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
🔥1
https://github.com/SecuProject/DLLHijackingScanner

This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.
These people are underestimating the Indian hackers, then show them some power. Their twitter handle: https://twitter.com/DragonForceIO
5👍2
From XSS to reverse shell with BeEF
https://youtu.be/cdVxC-Fwgyo
https://github.com/youhacker55/BeefAuto

python script Automate Beef And Configure it to use overwan by using ngrok to open ports
https://github.com/swagkarna/Nivistealer

steal victim images exact location device info and much more
From XSS to reverse shell with BeEF
https://youtu.be/cdVxC-Fwgyo
https://github.com/pussycat0x/malicious-pdf

Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
https://github.com/hahwul/dalfox

DalFox is an powerful open source XSS scanning tool and parameter analyzer and utility that fast the process of detecting and verify XSS flaws. It comes with a powerful testing engine, many niche features for the cool hacker!
https://github.com/0xh4di/GSMDecryption

This open source software allows the 'cracking' of A5/1 keys used to encrypt GSM 2G calls and SMS. The cracking utility Kraken, developed by Frank A. Stevenson, is written in C++/python and runs on AMD GPUs or CPUs. Kraken leverages rainbow tables that were computed as a community effort.
2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/OjWhPenOkyA
👍4
Forwarded from CYBER TRICKS ZONE 🇮🇳🚩 (𝐏𝐫𝐨𝐭𝐨𝐜𝐨𝐥 𝐍𝐢𝐜𝐤)
Interactive-Cyber-Security-Career-Roadmap.pdf
742.8 KB
[#CYBER_TRICKS_ZONE]

INTERACTIVE CYBER SECURITY CAREER ROADMAP

CREDITS :- CYBRARY.IT

SUPPORT TO CYBER TRICKS ZONE ❤️
@cybertrickszone1
https://github.com/aydinnyunus/Keylogger

Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems