CrackCodes ๐Ÿ‡ฎ๐Ÿ‡ณ
6.61K subscribers
1.24K photos
247 videos
676 files
3.35K links
Official website: https://crackcodes.in

Tech_hack material : https://system32.ink
https://system32.in

About Admin : https://clavin.org/
@MCracker2002

Disscussion Group : @Indianshunters

Be Secure~
เคœเคฏ เคถเฅเคฐเฅ€ เคฐเคพเคฎ
Download Telegram
๐Ÿ’ฅCobalt Strike BOF that bypasses AMSI in a remote process with code injection.

Download:- https://system32.ink/news-feed/p/214/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
๐Ÿช‚ Standout as Web design Expert Course ๐Ÿช‚

Download link-

https://mega.nz/folder/y3AkFAjT#j8-rd4vmddGn4utAgDITPQ

๐Ÿ” Zip Password- @udemyking1
โœฆโ€ขโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ€ขโœฆ
๐Ÿ‘‰ ๐‘€๐‘ข๐‘ ๐‘ก ๐ฟ๐‘–๐‘˜๐‘’ & ๐น๐‘œ๐‘™๐‘™๐‘œ๐‘ค ๐‘‚๐‘ข๐‘Ÿ ๐‘ƒ๐‘Ž๐‘”๐‘’๐‘ ๐Ÿ‘‡
๐Ÿ”ท ๐’€๐’๐’–๐‘ป๐’–๐’ƒ๐’† โž› bit.ly/UFC-YouTube
๐Ÿ”ถ ๐‘ญ๐’‚๐’„๐’†๐’ƒ๐’๐’๐’Œ โž› fb.me/UdemyKing
๐Ÿ”ท ๐‘ณ๐’Š๐’๐’Œ๐’†๐’…๐‘ฐ๐’ โž› bit.ly/UFC-linkedin
๐Ÿ”ถ ๐‘ฐ๐’๐’”๐’•๐’‚๐’ˆ๐’“๐’‚๐’Ž โž› bit.ly/UFC-Insta
๐Ÿ”ท ๐‘ฑ๐’๐’Š๐’ ๐‘ญ๐’‚๐’”๐’• โž› t.me/UdemyKing1
โœฆโ€ขโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ€ขโœฆ
CVE-2022-22583 CVE-2022-22616 CVE-2022-22639 CVE-2022-26690 CVE-2022-26712 CVE-2022-26728 CVE-2022-32786 CVE-2022-32800

https://github.com/jhftss/POC
Want to learn about OSINT (Open Source Threat Intelligence and Threat Intelligence Tools?

Check our new blog on:

What is OSINT? | OSINT Framework | Tools for OSINT | Best OSINT Techniques

Here is the link to his blog.
  https://techofide.com/blogs/what-is-osint-osint-framework-tools-for-osint-best-osint-techniques/
CVE-2021-21974 | Ransomware targeting VMware ESXi

These attacks are detected globally and especially in Europe. According to experts from the ecosystem as well as autorities, they might be related to Nevada ransomware and are using CVE-2021-21974 (OpenSLP as used in ESXi has a heap-overflow vulnerability) as compromission vector. Investigation are still ongoing to confirm those assumptions.

Exploit:- https://system32.ink/news-feed/p/219/
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Microsoft Exchange: OWASSRF + TabShell
(CVE-*2022-41076
)*

The TabShell vulnerability its a form of Privilege Escalation which allows breaking out of the restricted Powershell Sandbox after you have successfully gained access through OWASSRF.

For a detailed write see research:
https://blog.viettelcybersecurity.com/tabshell-owassrf/

*PoC:
*
https://gist.github.com/testanull/518871a2e2057caa2bc9c6ae6634103e

#owa #ssrf #tabshell #poc

@virus303

@NetEditors
Forwarded from CYBER TRICKS ZONE ๐Ÿ‡ฎ๐Ÿ‡ณ (๐™‹๐™ง๐™ค๐™ฉ๐™ค๐™˜๐™ค๐™ก ๐™‰๐™ž๐™˜๐™ )
Learning DevOps.pdf
18.3 MB
SCRIPT HTTP-SQL-INJECTION (NMAP)
download
Hi, all a new blog on Smurf attack is now here

Learn the technique to perform this Ddos attack.

Here is the link to the blog

https://techofide.com/blogs/what-is-smurf-attack-what-is-the-denial-of-service-attack-practical-ddos-attack-step-by-step-guide/