CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
Updates On Hackbyte Forum:-

๐Ÿ“ŒSlient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
๐Ÿ“ŒZheTian Powerful Anti Anti-Virus Trojan horse generator
๐Ÿ“Œgpu poisoning; hide the payload inside the gpu memory.
๐Ÿ“ŒJNPF_Chinese_Government_Contractor Leak
๐Ÿ“ŒShodan Search Script
๐Ÿ“ŒCloud7 Bot
๐Ÿ“ŒFacebook 700m Leak (2021)
๐Ÿ“ŒWordpress Mass Exploit : Augmented Reality
๐Ÿ“ŒRed Rabbit Framework
๐Ÿ“ŒZombie Bot from Darkweb
๐Ÿ“ŒPoC for CVE-2022-26809, analisys and considerations are shown in the github.io
๐Ÿ“ŒInvicti Professional Edition 6.6.0.36485
๐Ÿ“ŒxRay_Web_Vulnerability_Scanner_Advanced_v1_8_5_x64_Full_Activated
๐Ÿ“ŒReflex AV Bypass
๐Ÿ“ŒPoC exploit for WinRing0
๐Ÿ“ŒCVE-2022-1609 WordPress Weblizar Backdoor
๐Ÿ“ŒPwnbolt
๐Ÿ“ŒU-Boat
๐Ÿ“ŒKernel Exploits
๐Ÿ“ŒIos15_exploits_POC: my iOS applications for iOS 15.1
๐Ÿ“ŒSosedi.by Leak
๐Ÿ“ŒShein Leak
๐Ÿ“Œkyivstar.ua Leak
๐Ÿ“Œstink: Stealer in just 2 lines with sending to Telegram
๐Ÿ“ŒSnapChat Leak
๐Ÿ“Œhijagger: Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration
๐Ÿ“ŒSysmonQuiet Reflective DLL
๐Ÿ“Œcgaty - Hooking the GDT Installing a Call Gate
๐Ÿ“Œhttp redirector
๐Ÿ“ŒLink - Link is a general RL framework to find reflected XSS vulnerabilities in a black-box and fully automatic manner
๐Ÿ“ŒParagon
๐Ÿ“Œ3snake - Dump sshd and sudo credential related strings
๐Ÿ“ŒCrackerJack - Web GUI for #Hashcat developed in #Python.
๐Ÿ“Œhaxx - Untethered + Unsandboxed code execution haxx as root on iOS 14 โ€“ iOS 14.8.1.
๐Ÿ“ŒPE-infector - Crossplatform tool for inject shellcode into .exe binaries (x86 and 64).
๐Ÿ“ŒBOF-Nim
๐Ÿ“ŒPostDump
๐Ÿ“Œbear.tax Crypto Database full dump source +API codes
๐Ÿ“ŒMobiFriends 2.6M Leak
๐Ÿ“ŒElector.co.il Leak
๐Ÿ“ŒChisel Strike
๐Ÿ“Œxhunter: Remote Administrator Tool [ RAT For Android ] No Port Forwarding
๐Ÿ“ŒNotes and IoCs of fresh malware
๐Ÿ“Œ29Million Wordpress + TOP Macro password 2525 list 2022 HQ

๐Ÿ‘‰๐Ÿป๐Ÿ‘‰๐Ÿป https://bit.ly/3yRyah3 ๐Ÿ‘ˆ๐Ÿป๐Ÿ‘ˆ๐Ÿป
๐Ÿ‘1๐Ÿ”ฅ1
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (Nick)
Here are the Top 11 Ways to Start Earning Money with Python in 2022:


.

.
Click here


Shared by : @proto_nick
500 fullz new.txt
660 KB
๐Ÿ‘4
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ๐Ÿšฉ (Nick)
DOWNLOAD TERMUX LATEST APK FROM F-DROID

LINK :- https://f-droid.org/en/packages/com.termux/
Updates On Hackbyte Forum:-

๐Ÿ“ŒBianLian โ€“ Ransomware
๐Ÿ“ŒPoC for CVE-2022-34265 (Django)
๐Ÿ“ŒFUGIO - Automatic Exploit Generation for PHP Object Injection Vulnerabilities
๐Ÿ“ŒRCE and Domain Admin privilege escalation for Mailcow
๐Ÿ“ŒFTP-Inspector
๐Ÿ“ŒCVE-2022-24934
๐Ÿ“ŒOctopusWAF
๐Ÿ“ŒVernet - Network Analyzer and Monitoring Tool
๐Ÿ“ŒUAParser.js
๐Ÿ“ŒJSshell
๐Ÿ“ŒSXSS is A CLI toolkit to detect and keep track of Blind XSS
๐Ÿ“ŒPantheon-HVNC-V2-Source-leaked
๐Ÿ“ŒNeurotoxin - Durable #Backdoors in Federated Learning.
๐Ÿ“ŒBitRAT
๐Ÿ“ŒS-500 G2-Pro-HVNC-Rat-Source-leaked
๐Ÿ“ŒCVE-2021-23017-PoC
๐Ÿ“ŒHiveV5 keystream decryptor PoC
๐Ÿ“ŒPakistan Taxpayers List
๐Ÿ“Œfoodco.us Leak
๐Ÿ“Œ774k USA SCHOOL DETAILS
๐Ÿ“ŒPrivFu/PrivilegedOperations.
๐Ÿ“ŒTOP 21 Remote Code Execution Exploitโ€™s #RCE
๐Ÿ“ŒFrom cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
๐Ÿ“ŒRetbleed: Arbitrary Speculative Code Execution with Return Instructions


๐Ÿ‘‰๐Ÿป๐Ÿ‘‰๐Ÿป Updates:- https://bit.ly/3yRyah3 ๐Ÿ‘ˆ๐Ÿป๐Ÿ‘ˆ๐Ÿป
๐Ÿ‘4
Updates On Hackbyte Forum:-

๐Ÿ“ŒRetbleed: Arbitrary Speculative Code Execution with Return Instructions
๐Ÿ“ŒExecuting Arbitrary Code Over a Phone Line Thanks to the XBAND Video Game Modem
๐Ÿ“ŒRolling PWN Attack Affecting Honda Vehicles
๐Ÿ“ŒCVE-2022-32223 Discovery: DLL Hijacking via npm CLI
๐Ÿ“ŒFrom Prototype Pollution to Remote Code Execution in Blitz.js
๐Ÿ“ŒAttacking Active Directory: 0 to 0.9
๐Ÿ“ŒCVE-2022-29885 โ€“ Apache Tomcat Cluster Service DoS
๐Ÿ“ŒCVE-2022-29593
๐Ÿ“ŒNorth South University / Bangladesh / email login
๐Ÿ“Œdeeppaste Leak
๐Ÿ“ŒLivejournalfull Leak
๐Ÿ“ŒGemotest Crm Leak
๐Ÿ“ŒSplunk Attack
๐Ÿ“ŒNzyme - WiFi Defense System
๐Ÿ“ŒProject-Whis - Advanced HTTP Botnet
๐Ÿ“ŒCode Signing Certificate Cloning Attack
๐Ÿ“ŒRetbleed - Arbitrary Speculative Code Execution with Return Instruction.
๐Ÿ“ŒConfluence Pre-Auth RCE.
๐Ÿ“Œmicrosoft-rpc-fuzzing-tools
๐Ÿ“ŒCVE-2022-26135
๐Ÿ“ŒXSS Payload List
๐Ÿ“Œheaders for hackers | PHP #ssrf | #cve-2020-7066 Video

๐Ÿ‘‰๐Ÿป๐Ÿ‘‰๐Ÿป Updates:- https://bit.ly/3yRyah3 ๐Ÿ‘ˆ๐Ÿป๐Ÿ‘ˆ๐Ÿป
๐Ÿ‘2
POC Cross-Site Scripting (XSS) Reflect Translator Microsoft
https://youtu.be/QJm6ilQDqcM
๐Ÿ‘3
Forwarded from ๅฉro ็ˆชCracker
Etisalcom Bahrain Telecom Bahrain
SIZE: 840 MB
Files: 1,110
Documents: DNI, Contracts, identification messages, formats JPEG, PNG, XLS, DOC, PDF
Description:

Etisalcom Bahrain W.L.L Information technology and communications (ICT) company

Download:

https://anonfiles.com/D5O6e3y7yd/Etisalcom_Bahrain_zip
Updates On Hackbyte Forum:-

๐Ÿ“ŒLeman2 Leak
๐Ÿ“Œ26M ESKIMI.COM DATABASE
๐Ÿ“ŒEtisalcom Bahrain Telecom Bahrain
๐Ÿ“ŒLock Screen Bypass Exploit of Android Devices (CVE-2022โ€“20006)
๐Ÿ“ŒSonarQube_Data_Center
๐Ÿ“ŒProton_Privacy_Decoded: Script to Explore ProtonMail and Vpn
๐Ÿ“ŒRandy: A pre-authenticated RCE exploit for Inductive Automation Ignition
๐Ÿ“ŒOnionWallet Leak
๐Ÿ“ŒUAC bypass for x64 Windows 7 โ€“ 11
๐Ÿ“ŒDecompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
๐Ÿ“ŒAbuse Cloudflare Zerotrust for C2 channels
๐Ÿ“ŒCobaltstrike_all_kits
๐Ÿ“ŒBypass Windows Defender by utilizing malicious SMB requests inside MS Word Macro
๐Ÿ“ŒHTB Business CTF 2022: Dirty Money
๐Ÿ“ŒLEAK WORK.UA
๐Ÿ“ŒTurniketov.net Leak
๐Ÿ“ŒVK.com Leak 2022
๐Ÿ“ŒKuban 1k b2b Leak
๐Ÿ“Œ9k_doc_fr_selfie Kyc Leak
๐Ÿ“ŒIDA Plugin to reconstruct .proto files used in the analyzed binary
๐Ÿ“ŒLDAP shell
๐Ÿ“ŒHiddenCPG - a vulnerable clone detection system
๐Ÿ“ŒInvestigator - An online handy-recon tool.
๐Ÿ“ŒBFAC - Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)
๐Ÿ“ŒReoSploit - A Tool that Finds, Enumerates, and #exploits Reolink Cameras.
๐Ÿ“ŒElectroMagnetic Mining Array (EMMA)
๐Ÿ“Œblindssl - Disable SSL certificate verification using eBPF
๐Ÿ“ŒPCICrash - PCIDriverKit PoC for CVE-2022-26763 (exec arbitrary code w/ system privileges).
๐Ÿ“ŒAntares - Cross-platform #SQL client.
๐Ÿ“ŒFAME - Recursive acronym meaning โ€œFAME Automates Malware Evaluationโ€.
๐Ÿ“ŒActive Directory Attacks
๐Ÿ“ŒCVE-2022-22047: Windows CSRSS Elevation of Privilege Zero-Day Vulnerability.
๐Ÿ“ŒAccount hijacking using โ€œdirty dancingโ€ in sign-in OAuth-flows

๐Ÿ‘‰๐Ÿป๐Ÿ‘‰๐Ÿป Updates:- https://bit.ly/3yRyah3 ๐Ÿ‘ˆ๐Ÿป๐Ÿ‘ˆ๐Ÿป
๐Ÿ‘2
Adidas[.]com Reflected XSS | 403 Forbidden Bypass | Bug Bounty
https://youtu.be/K38KnQnWL60
๐Ÿ‘4