CrackCodes 🇮🇳
8.13K subscribers
1.26K photos
250 videos
677 files
3.39K links
Official website: https://crackcodes.in

Tech_hack material : https://system32.ink
https://system32.in

Admins: @MynK0x00
https://clavin.org/
@MCracker2002

Disscussion Group : @Indianshunters

Be Secure~
जय श्री राम
Download Telegram
Forwarded from 卩ro 爪Cracker
GraphQL exploitation – All you need to know – Cybervelia
https://ift.tt/lILWoxS

Submitted January 13, 2023 at 02:28AM by Necessary-Reality-80
via reddit https://ift.tt/SLsfWgA
Forwarded from ㅤㅤㅤ
#windows #system call #bypass

Interception of system calls in Windows 11 22 H2 like Avast antivirus.

Research, analysis and bypass:
https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
Forwarded from 卩ro 爪Cracker
#exploit
1. PoC for arbitrary file delete/move in Razer Synapse 3 Macro module
https://github.com/Wh04m1001/RazerEoP

2. CVE-2023-21752:
PoC for arbitrary file delete vulnerability in Windows Backup service
https://github.com/Wh04m1001/CVE-2023-21752
Leviathan.pdf
5.2 MB
#Sec_code_review
"SELECT Bugs FROM Binary WHERE Pattern LIKE CVE-1337-DAYS".
Threema_analysis.pdf
413.9 KB
#Research
"Three Lessons From Threema: Analysis of a Secure Messenger", 2022.
EyeSpyVPN.pdf
8.6 MB
#Whitepaper
"EyeSpy - Iranian Spyware Delivered in VPN Installers", 2023.
Guys please support me

https://youtu.be/aArhzGndTkY
Forwarded from 卩ro 爪Cracker
​​SUDO_KILLER

A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.

https://github.com/TH3xACE/SUDO_KILLER

#linux #sudo
Forwarded from 卩ro 爪Cracker
​​code-inspector

Java code inspector for web vulnerability scan.

https://github.com/4ra1n/code-inspector
Forwarded from 卩ro 爪Cracker
Load testing private endpoints
https://ift.tt/QnT9HYL

Submitted January 14, 2023 at 02:51AM by krstCB
via reddit https://ift.tt/qAUkBEV
Happy Makar Sankranti to all of you❤️
Asta-decrypt

This is a simple script that implements the decryption routine for the encrypted final stage used by the Astaroth/Guildma malware family.

Astaroth uses an AutoIT script with an embedded DLL that writes the final payload to disk as db.temp and injects it into a hollow process. https://system32.ink/news-feed/p/134/