CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
About Admin: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
https://github.com/pussycat0x/malicious-pdf

Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator
https://github.com/hahwul/dalfox

DalFox is an powerful open source XSS scanning tool and parameter analyzer and utility that fast the process of detecting and verify XSS flaws. It comes with a powerful testing engine, many niche features for the cool hacker!
https://github.com/0xh4di/GSMDecryption

This open source software allows the 'cracking' of A5/1 keys used to encrypt GSM 2G calls and SMS. The cracking utility Kraken, developed by Frank A. Stevenson, is written in C++/python and runs on AMD GPUs or CPUs. Kraken leverages rainbow tables that were computed as a community effort.
2FA Verification Code Bypass Attack via Burpsuite | OTP Verification Bypass | Bug Bounty
https://youtu.be/OjWhPenOkyA
๐Ÿ‘4
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ ๐๐ข๐œ๐ค)
Interactive-Cyber-Security-Career-Roadmap.pdf
742.8 KB
[#CYBER_TRICKS_ZONE]

INTERACTIVE CYBER SECURITY CAREER ROADMAP

CREDITS :- CYBRARY.IT

SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
https://github.com/aydinnyunus/Keylogger

Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems
CSRF attack POC | Password Reset via CSRF | BUG BOUNTY POC

https://youtu.be/vksVV2xlE34
๐Ÿ‘1
I need smm panel. Can people who can help get in touch? @f3exe
LFI Log Poisoning Attack (Reverse Shell, Privsec) | Bug Bounty
https://youtu.be/MDJZ7yeBARU
Forwarded from Bhartiya Hunters๐Ÿ‡ฎ๐Ÿ‡ณ (Founder & CEO โ€ข)
Researchers uncover a set of 56 vulnerabilities affecting devices from 10 operational technology vendors (OT) โ€” widely used in industries such as oil and gas, chemical, nuclear, power generation and distribution and building automation.

Read: https://thehackernews.com/2022/06/researchers-disclose-56-vulnerabilities.html Shared by Indian hunters
๐Ÿ‘6
Forwarded from Bhartiya Hunters๐Ÿ‡ฎ๐Ÿ‡ณ (Founder & CEO โ€ข)
๐Ÿ‘3
Forwarded from Bhartiya Hunters๐Ÿ‡ฎ๐Ÿ‡ณ (Founder & CEO โ€ข)
RIG Exploit Kit replaces the Raccoon stealer trojan with Dridex financial malware after one of its developers was killed in the Russian-Ukrainian war.

Read details: https://thehackernews.com/2022/06/rig-exploit-kit-now-infects-victims-pcs.html

Shared by @Indianshunters
๐Ÿ‘2
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (๐๐ซ๐จ๐ญ๐จ๐œ๐จ๐ฅ ๐๐ข๐œ๐ค)
[#CYBER_TRICKS_ZONE]

Best Top 18 Website to test Your Ethical Hacking Skills!

Link :- https://www.hackersblog.tech/2022/06/best-top-18-website-to-test-your.html

Credits:- @protocolnick

SUPPORT TO CYBER TRICKS ZONE โค๏ธ
@cybertrickszone1
Admin Authentication Bypass Lead to Admin Account Takeover | UPS[.]com
https://youtu.be/H0TkDabDxWc
๐Ÿ‘2