CrackCodes 🇮🇳
6.98K subscribers
1.24K photos
247 videos
676 files
3.36K links
Official website: https://crackcodes.in

Tech_hack material : https://system32.ink
https://system32.in

About Admin : https://clavin.org/
@MCracker2002

Disscussion Group : @Indianshunters

Be Secure~
जय श्री राम
Download Telegram
Forwarded from Deadly malware xp
​​PHPGGC

A library of unserialize() payloads along with a tool to generate them, from command line or programmatically.

https://github.com/ambionics/phpggc
Forwarded from Deadly malware xp
​​RHM: Robot Hacking Manual

The Robot Hacking Manual (RHM) is an introductory series about cybersecurity for robots, with an attempt to provide comprehensive case studies and step-by-step tutorials with the intent to raise awareness in the field and highlight the importance of taking a security-first1 approach. The material available here is also a personal learning attempt and it's disconnected from any particular organization. Content is provided as is and by no means I encourage or promote the unauthorized tampering of robotic systems or related technologies.

https://github.com/vmayoral/robot_hacking_manual
Forwarded from Deadly malware xp
​​chatgpt_chinese_prompt_hack

Use prompt hack to bypass OpenAI's content policy restrictions by golfzert

https://github.com/golfzert/chatgpt-chinese-prompt-hack
Forwarded from Deadly malware xp
​​Hacking & Cybersecurity class materials

We are delighted to announce a first on Lawfare: A live online class on hacking and cybersecurity.

https://github.com/lawfareblog/hacking-cybersecurity
Forwarded from Deadly malware xp
​​hackGPT

OpenAI and #ChatGPT to do hackerish things by NoDataFound

https://github.com/NoDataFound/hackGPT
Forwarded from Deadly malware xp
​​Blinside

Blindside is a technique for evading the monitoring of endpoint detection and response (EDR) and extended detection and response (XDR) platforms using hardware breakpoints to inject commands and perform unexpected, unwanted, or malicious operations. It involves creating a breakpoint handler, and setting a hardware breakpoint that will force the debugged process to load only ntdll to memory. This will result in a clean and unhooked ntdll which then could be copied to our process and unhook the original ntdll.

https://github.com/CymulateResearch/Blindside
Forwarded from Deadly malware xp
​​Shellcode Mutator

New tool to help red teamers avoid detection. Shellcode is a small piece of code that is typically used as the payload in an exploit, and can often be detected by its “signature”, or unique pattern. Shellcode Mutator mutates exploit source code without affecting its functionality, changing its signature and making it harder to reliably detect as malicious.

https://github.com/nettitude/ShellcodeMutator

Details:
https://labs.nettitude.com/blog/shellcode-source-mutations/

#shellcode #redteam
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
🔥🔥🔥The GOAD’s writeups series end with this part.

💥GOAD - part 12 - Trusts
This post will be on escalation with domain trust (from child to parent domain) and on Forest to Forest trust lateral move.
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Forwarded from Deadly malware xp
Hello, my rabbits who like to go to tea parties 🐰☕️

While I am writing about bitcoin nodes search and analysis, I decided to make a collection of rootkit malware on linux🐧


Reverse💊

Not really about linux, but still a very cool guide to reverse ;

Article about reverse-engineering the Ebpfkit rootkit ;

Article about dovecat and hy4 malware analysis for Linux ;

A collection of resources for reverse-engineering Linux ;

Article about virus analysis aromatization on linux ;

Article about malware analysis for Linux ;

Article about rootkit and its detection ;


Resources🗝

A site with material on viruses and rootkits on linux, including their writing ;

A site with resources on reversal ;

A resource site for people who want to write viruses for linux ;

A site with excellent material and documents about linux malware ;


Examples of malware 🦠

A github thread with cool virus repositories ;

Linux X86_64 ELF virus ;

A simple linux virus. It can get root rights and destroy your system ;

Linux ransomware ;

Repository of the source code of various Linux malware ;

Combination of shell and rootkit ;

Collection of Linux rootkits ;

A simple Linux kernel rootkit ;


MateriaLs / Collections📖

A collection of linux virus materials ;

A collection of materiałs on rootkits and attacks on linux ;

Article about evading malware analysis by reverse engineering ;

Malware analysis methodology in Linux environment ;

An article for understanding Linux malware ;

Not a bad article about writing rootkits on linux ;


Malware Scanners 🧲

LMD malware scanner for Linux ;

Linux rootkit scanner ;

A github thread with collections of Linux rootkit scanners ;

Also a good rootkit scanner ;


As you can see, although it is widely accepted that "writing viruses on linux is difficult, or even impossible practice", it is far from it, and that you have linux is not yet a silver bullet against viruses

On linux, viruses (especially rootkits) are written and very successfully
So take care and protect your system

Thank you for reading ❤️

And Alice, don't forget to read the sign on the back of the bottle you want to drink, in case it says "poison"🧪🎀
#malware #virus #revers #ransomware #attacks #linux #exploit #rootkit
»»»» https://webmail.cyber.net.pk:8443/login_up.php ««««

UserName: tac-user
Password: ~D4p5o8s