CrackCodes 🇮🇳
15.9K subscribers
1.89K photos
386 videos
722 files
3.67K links
Official Websites: https://crackcodes.in | https://system32.in |
For Bug Hunters: https://system32.ink

Admin: @MynK0x00
Admin Math: prapattimynk.crackcodes.in


Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
Etisalcom Bahrain Telecom Bahrain
SIZE: 840 MB
Files: 1,110
Documents: DNI, Contracts, identification messages, formats JPEG, PNG, XLS, DOC, PDF
Description:

Etisalcom Bahrain W.L.L Information technology and communications (ICT) company

Download:

https://anonfiles.com/D5O6e3y7yd/Etisalcom_Bahrain_zip
Updates On Hackbyte Forum:-

📌Leman2 Leak
📌26M ESKIMI.COM DATABASE
📌Etisalcom Bahrain Telecom Bahrain
📌Lock Screen Bypass Exploit of Android Devices (CVE-2022–20006)
📌SonarQube_Data_Center
📌Proton_Privacy_Decoded: Script to Explore ProtonMail and Vpn
📌Randy: A pre-authenticated RCE exploit for Inductive Automation Ignition
📌OnionWallet Leak
📌UAC bypass for x64 Windows 7 – 11
📌Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
📌Abuse Cloudflare Zerotrust for C2 channels
📌Cobaltstrike_all_kits
📌Bypass Windows Defender by utilizing malicious SMB requests inside MS Word Macro
📌HTB Business CTF 2022: Dirty Money
📌LEAK WORK.UA
📌Turniketov.net Leak
📌VK.com Leak 2022
📌Kuban 1k b2b Leak
📌9k_doc_fr_selfie Kyc Leak
📌IDA Plugin to reconstruct .proto files used in the analyzed binary
📌LDAP shell
📌HiddenCPG - a vulnerable clone detection system
📌Investigator - An online handy-recon tool.
📌BFAC - Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)
📌ReoSploit - A Tool that Finds, Enumerates, and #exploits Reolink Cameras.
📌ElectroMagnetic Mining Array (EMMA)
📌blindssl - Disable SSL certificate verification using eBPF
📌PCICrash - PCIDriverKit PoC for CVE-2022-26763 (exec arbitrary code w/ system privileges).
📌Antares - Cross-platform #SQL client.
📌FAME - Recursive acronym meaning “FAME Automates Malware Evaluation”.
📌Active Directory Attacks
📌CVE-2022-22047: Windows CSRSS Elevation of Privilege Zero-Day Vulnerability.
📌Account hijacking using “dirty dancing” in sign-in OAuth-flows

👉🏻👉🏻 Updates:- https://bit.ly/3yRyah3 👈🏻👈🏻
👍2
Adidas[.]com Reflected XSS | 403 Forbidden Bypass | Bug Bounty
https://youtu.be/K38KnQnWL60
👍4
Exploit Cisco.txt
1.8 KB
Old but gold
👍3
Forwarded from Biała Bł
Dumps And Encoding The Cover All Guide.pdf
235.9 KB
👍1
wsu-css-cheat-sheet-gdocs.pdf
152.2 KB
👍2
Javascript-Cheat-Sheet.pdf
248.4 KB
👍2
Updates On Hackbyte Forum:-

📌Smbpentest: Test Samba Servers which may have been configured improperly for anonymous access to vulnerable shares

📌LBOZO: A hybrid Windows Ransomware

📌Hoaxshell: An unconventional Windows reverse shell, currently undetected by Microsoft Defender and other AV solutions, solely based on http(s) traffic

📌Ping Castle Cloud

📌CoffeeLdr

📌Zimbra #Exploit CVE-2022-30333

📌CVE-2022-24086 RCE POC

📌data.gov.uk – UK Government Backups

📌telefonica Ecuador CRM Files Leaks

📌Svetlogorsk39.ru leak

📌rbcd-attack

📌RustyTokenManipulation

📌Oralyzer - Open Redirection Analyzer

📌Salus – SBOM Tool

📌Sliver GUI client.

📌CVE-2022-32119 - Arox-Unrestricted-File-Upload

📌NodeJS Ransomware

📌Dirble - Fast directory scanning and scraping tool

📌WebView2-Cookie-Stealer

📌ZombieThread - Another meterpreter injection technique using C# that attempts to bypass WD.

📌Evil Clippy

📌Evtx Log (xml) Browser

📌CVE-2022-30333

📌CVE-2022-23614: PoC for CVE-2022-23614 (Twig sort filter code execution/sandbox bypass)

📌CVE-2022-33891 - Apache Spark shell command injection

📌EJS, Server side template injection RCE (CVE-2022-29078)

📌Binary Ninja Commercial 3.1.3469 (2022-05-31)

📌citycollege.edu Health University Leak

📌Full HHIDE.ORG forum dump

📌danish.my Leak

📌stripchat.com Leak
———————————————————————————————————————-

👉🏻👉🏻 Updates:- https://bit.ly/3yRyah3 👈🏻👈🏻
👍3
Travelio.txt
4.9 MB
Forwarded from Biała Bł
Bank Logs method.pdf
8 MB
Forwarded from Biała Bł
Develop Your Own Rat(1).pdf
1.9 MB
👍4🔥2
Forwarded from Bhartiya Hunters🇮🇳 (Founder & CEO •)
👍2