CrackCodes 🇮🇳
10.1K subscribers
1.39K photos
267 videos
712 files
3.47K links
Official website: https://crackcodes.in | https://system32.ink | https://system32.in

Admins: @MynK0x00
https://clavin.org/
@MCracker2002


Be Secure~
जय श्री राम
Download Telegram
Class

Topic:
Sql injection

Time: 8 Pm IST

Details: https://system32.ink/classes

Host: @vanshsec

Invite Link (Web) : https://system32.ink/zoom-meetings/sqli/?pak=QnhXbW50UHpUcnlwUHJ0ekpRYlBlZz09&join=V2NzRklocno1Ylc1YUVyWUVrRFI1QT09&type=meeting&redirect

Jyada se jyada sankhya me aakar class ki shobha ka Aanand leve, dhnywaad
Gmailc2

A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.

C2 Feature:
▫️ Persistence (type persist)
▫️ Shell Access
▫️ System Info (type info)
▫️ More Features Will Be Added

Features:
▫️ FUD Ratio 0/40
▫️ Bypass Any EDR's Solutions
▫️ Bypass Any Network Restrictions
▫️ Commands Are Being Sent in Base64 And Decoded on server side
▫️ No More Tcp Shits

https://system32.ink/news-feed/p/151/
attacking_safari_2022.pdf
1.4 MB
#Threat_Research
"Attacking Safari in 2022".
Chronos.pdf
805.8 KB
#Research
"CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports", 2023.
]-> Repo: https://github.com/soarsmu/Chronos
#Offensive_security
1. All Common Ports: Enumerations and Exploitations
https://pentestbook.six2dez.com/enumeration/ports#general
2. Explorer Persistence technique: Hijacking cscapi.dll order loading path and writing malicious dll into C:\Windows\cscapi.dll
https://github.com/D1rkMtr/ExplorerPersist
automated_threat_handbook_v1-2.pdf
1.6 MB
#Whitepaper
#Threat_Research
#WebApp_Security
"OWASP Automated Threats Handbook: Web Applications, Version 1.2".
CEH_v12_Lab_Manual.7z
477 MB
#Tech_book
"CEH Version 12 Lab Manual: Ethical Hacking and Countermeasures" (.pdf, full course, 2112 pages), 2022.
Post from @hayper007
Post from @hayper007