hacktricks/cryptography/crypto-ctfs-tricks.md

309 lines
14 KiB
Markdown
Raw Normal View History

2024-02-11 02:13:58 +00:00
# Mbinu za Crypto CTFs
2022-04-28 16:01:33 +00:00
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi ya PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa kipekee wa [**NFTs**](https://opensea.io/collection/the-peass-family)
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PR kwa** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos za github.
2022-04-28 16:01:33 +00:00
</details>
2022-07-05 17:49:17 +00:00
## Online Hashes DBs
2024-02-11 02:13:58 +00:00
* _**Tafuta kwenye Google**_
* [http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240](http://hashtoolkit.com/reverse-hash?hash=4d186321c1a7f0f354b297e8914ab240)
* [https://www.onlinehashcrack.com/](https://www.onlinehashcrack.com)
* [https://crackstation.net/](https://crackstation.net)
* [https://md5decrypt.net/](https://md5decrypt.net)
* [https://www.onlinehashcrack.com](https://www.onlinehashcrack.com)
* [https://gpuhash.me/](https://gpuhash.me)
* [https://hashes.org/search.php](https://hashes.org/search.php)
* [https://www.cmd5.org/](https://www.cmd5.org)
* [https://hashkiller.co.uk/Cracker/MD5](https://hashkiller.co.uk/Cracker/MD5)
* [https://www.md5online.org/md5-decrypt.html](https://www.md5online.org/md5-decrypt.html)
2021-09-22 10:45:02 +00:00
2022-07-05 17:49:17 +00:00
## Magic Autosolvers
2021-09-22 10:45:02 +00:00
2022-04-05 22:24:52 +00:00
* [**https://github.com/Ciphey/Ciphey**](https://github.com/Ciphey/Ciphey)
2024-02-11 02:13:58 +00:00
* [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/) (Moduli ya Magic)
2022-04-05 22:24:52 +00:00
* [https://github.com/dhondta/python-codext](https://github.com/dhondta/python-codext)
2022-07-05 17:49:17 +00:00
* [https://www.boxentriq.com/code-breaking](https://www.boxentriq.com/code-breaking)
2022-07-05 17:49:17 +00:00
## Encoders
2024-02-11 02:13:58 +00:00
Kwa kawaida, data iliyofichwa inaweza kubadilishwa na rasilimali hizi 2:
* [https://www.dcode.fr/tools-list](https://www.dcode.fr/tools-list)
* [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/)
2022-07-05 17:49:17 +00:00
### Substitution Autosolvers
* [https://www.boxentriq.com/code-breaking/cryptogram](https://www.boxentriq.com/code-breaking/cryptogram)
2024-02-11 02:13:58 +00:00
* [https://quipqiup.com/](https://quipqiup.com) - Nzuri sana!
2022-07-05 17:49:17 +00:00
#### Caesar - ROTx Autosolvers
* [https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript](https://www.nayuki.io/page/automatic-caesar-cipher-breaker-javascript)
2022-07-05 17:49:17 +00:00
#### Atbash Cipher
* [http://rumkin.com/tools/cipher/atbash.php](http://rumkin.com/tools/cipher/atbash.php)
2022-07-05 17:49:17 +00:00
### Base Encodings Autosolver
2024-02-11 02:13:58 +00:00
Angalia misingi yote hii na: [https://github.com/dhondta/python-codext](https://github.com/dhondta/python-codext)
2022-02-05 13:50:50 +00:00
* **Ascii85**
2024-02-11 02:13:58 +00:00
* `BQ%]q@psCd@rH0l`
2022-02-05 13:50:50 +00:00
* **Base26** \[_A-Z_]
2024-02-11 02:13:58 +00:00
* `BQEKGAHRJKHQMVZGKUXNT`
* **Base32** \[_A-Z2-7=_]
2024-02-11 02:13:58 +00:00
* `NBXWYYLDMFZGCY3PNRQQ====`
2022-02-05 13:50:50 +00:00
* **Zbase32** \[_ybndrfg8ejkmcpqxot1uwisza345h769_]
2024-02-11 02:13:58 +00:00
* `pbzsaamdcf3gna5xptoo====`
2022-02-05 13:50:50 +00:00
* **Base32 Geohash** \[_0-9b-hjkmnp-z_]
2024-02-11 02:13:58 +00:00
* `e1rqssc3d5t62svgejhh====`
2022-02-05 13:50:50 +00:00
* **Base32 Crockford** \[_0-9A-HJKMNP-TV-Z_]
2024-02-11 02:13:58 +00:00
* `D1QPRRB3C5S62RVFDHGG====`
2022-02-05 13:50:50 +00:00
* **Base32 Extended Hexadecimal** \[_0-9A-V_]
2024-02-11 02:13:58 +00:00
* `D1NMOOB3C5P62ORFDHGG====`
2022-07-05 17:49:17 +00:00
* **Base45** \[_0-9A-Z $%\*+-./:_]
2024-02-11 02:13:58 +00:00
* `59DPVDGPCVKEUPCPVD`
2022-02-05 13:50:50 +00:00
* **Base58 (bitcoin)** \[_1-9A-HJ-NP-Za-km-z_]
2024-02-11 02:13:58 +00:00
* `2yJiRg5BF9gmsU6AC`
2022-02-05 13:50:50 +00:00
* **Base58 (flickr)** \[_1-9a-km-zA-HJ-NP-Z_]
2024-02-11 02:13:58 +00:00
* `2YiHqF5bf9FLSt6ac`
2022-02-05 13:50:50 +00:00
* **Base58 (ripple)** \[_rpshnaf39wBUDNEGHJKLM4PQ-T7V-Z2b-eCg65jkm8oFqi1tuvAxyz_]
2024-02-11 02:13:58 +00:00
* `pyJ5RgnBE9gm17awU`
* **Base62** \[_0-9A-Za-z_]
2024-02-11 02:13:58 +00:00
* `g2AextRZpBKRBzQ9`
* **Base64** \[_A-Za-z0-9+/=_]
2024-02-11 02:13:58 +00:00
* `aG9sYWNhcmFjb2xh`
2022-07-05 17:49:17 +00:00
* **Base67** \[_A-Za-z0-9-_.!\~\_]
2024-02-11 02:13:58 +00:00
* `NI9JKX0cSUdqhr!p`
2022-07-05 17:49:17 +00:00
* **Base85 (Ascii85)** \[_!"#$%&'()\*+,-./0-9:;<=>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `BQ%]q@psCd@rH0l`
2022-07-05 17:49:17 +00:00
* **Base85 (Adobe)** \[_!"#$%&'()\*+,-./0-9:;<=>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `<~BQ%]q@psCd@rH0l~>`
2022-07-05 17:49:17 +00:00
* **Base85 (IPv6 or RFC1924)** \[_0-9A-Za-z!#$%&()\*+-;<=>?@^_\`{|}\~\_]
2024-02-11 02:13:58 +00:00
* `Xm4y`V\_|Y(V{dF>\`
2022-07-05 17:49:17 +00:00
* **Base85 (xbtoa)** \[_!"#$%&'()\*+,-./0-9:;<=>?@A-Z\[\\]^\_\`a-u_]
2024-02-11 02:13:58 +00:00
* `xbtoa Begin\nBQ%]q@psCd@rH0l\nxbtoa End N 12 c E 1a S 4e6 R 6991d`
2022-07-05 17:49:17 +00:00
* **Base85 (XML)** \[_0-9A-Za-y!#$()\*+,-./:;=?@^\`{|}\~z\__]
2024-02-11 02:13:58 +00:00
* `Xm4y|V{~Y+V}dF?`
2022-07-05 17:49:17 +00:00
* **Base91** \[_A-Za-z0-9!#$%&()\*+,./:;<=>?@\[]^\_\`{|}\~"_]
2024-02-11 02:13:58 +00:00
* `frDg[*jNN!7&BQM`
2022-02-05 13:50:50 +00:00
* **Base100** \[]
2024-02-11 02:13:58 +00:00
* `👟👦👣👘👚👘👩
* `DmPsv8J7qrlKEoY7`
2022-02-05 13:50:50 +00:00
* **MEGAN35** \[_3G-Ub=c-pW-Z/12+406-9Vaq-zA-F5_]
2024-02-11 02:13:58 +00:00
* `kLD8iwKsigSalLJ5`
* **ZONG22** \[_ZKj9n+yf0wDVX1s/5YbdxSo=ILaUpPBCHg8uvNO4klm6iJGhQ7eFrWczAMEq3RTt2_]
2024-02-11 02:13:58 +00:00
* `ayRiIo1gpO+uUc7g`
* **ESAB46** \[]
2024-02-11 02:13:58 +00:00
* `3sHcL2NR8WrT7mhR`
* **MEGAN45** \[]
2024-02-11 02:13:58 +00:00
* `kLD8igSXm2KZlwrX`
* **TIGO3FX** \[]
2024-02-11 02:13:58 +00:00
* `7AP9mIzdmltYmIP9mWXX`
* **TRIPO5** \[]
2024-02-11 02:13:58 +00:00
* `UE9vSbnBW6psVzxB`
* **FERON74** \[]
2024-02-11 02:13:58 +00:00
* `PbGkNudxCzaKBm0x`
* **GILA7** \[]
2024-02-11 02:13:58 +00:00
* `D+nkv8C1qIKMErY1`
* **Citrix CTX1** \[]
2024-02-11 02:13:58 +00:00
* `MNGIKCAHMOGLKPAKMMGJKNAINPHKLOBLNNHILCBHNOHLLPBK`
2022-07-05 17:49:17 +00:00
[http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html](http://k4.cba.pl/dw/crypo/tools/eng\_atom128c.html) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html)
2022-07-05 17:49:17 +00:00
### HackerizeXS \[_╫Λ↻├☰┏_]
```
╫☐↑Λ↻Λ┏Λ↻☐↑Λ
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html) - 404 Dead: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html)
2022-07-05 17:49:17 +00:00
### Morse
2024-02-11 02:13:58 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html) - 404 Mfu: [https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html](https://web.archive.org/web/20190228181208/http://k4.cba.pl/dw/crypo/tools/eng\_hackerize.html)
```
.... --- .-.. -.-. .- .-. .- -.-. --- .-.. .-
```
2022-07-05 17:49:17 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html) - 404 Dead: [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/)
2022-07-05 17:49:17 +00:00
### UUencoder
2024-02-11 02:13:58 +00:00
* [http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html](http://k4.cba.pl/dw/crypo/tools/eng\_morse-encode.html) - 404 Mfu: [https://gchq.github.io/CyberChef/](https://gchq.github.io/CyberChef/)
### UUencoder
```
begin 644 webutils_pl
M2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(
M3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/
F3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$%(3TQ!2$],04A/3$$`
`
end
```
* [http://www.webutils.pl/index.php?idx=uu](http://www.webutils.pl/index.php?idx=uu)
2022-07-05 17:49:17 +00:00
### XXEncoder
2024-02-11 02:13:58 +00:00
XXEncoder ni kifaa kinachotumiwa kubadilisha data kuwa muundo mwingine ambao ni vigumu kusoma. Inaweza kutumika kuficha habari nyeti au kubadilisha data ili kuepuka uchunguzi. Kwa mfano, inaweza kutumika kubadilisha faili ya maandishi kuwa muundo wa Base64 ili kuficha maudhui yake halisi. Kwa kawaida, XXEncoder hutumiwa katika mazingira ya usalama na uchunguzi wa kina.
```
begin 644 webutils_pl
hG2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236Hol-G2xAEIVDH236
5Hol-G2xAEE++
end
```
* [www.webutils.pl/index.php?idx=xx](https://github.com/carlospolop/hacktricks/tree/bf578e4c5a955b4f6cdbe67eb4a543e16a3f848d/crypto/www.webutils.pl/index.php?idx=xx)
2022-07-05 17:49:17 +00:00
### YEncoder
2024-02-11 02:13:58 +00:00
YEncoder ni njia ya kubadilisha data kuwa muundo wa ASCII. Inatumika mara nyingi katika ujumbe wa barua pepe na kwenye mitandao ya zamani ya Usenet. YEncoder inachukua data ya binary na kuiweka katika muundo wa ASCII ili iweze kutumwa kwa urahisi kupitia njia za mawasiliano ambazo zinaweza kuharibu data ya binary.
YEncoder inafanya hivyo kwa kuchukua kila byte ya data ya binary na kuiweka katika muundo wa ASCII kwa kutumia kanuni maalum. Kanuni hii inahusisha kubadilisha kila byte kuwa kifungu cha ASCII kinachowakilisha thamani ya byte hiyo. Kwa mfano, byte ya 0x41 itabadilishwa kuwa kifungu cha ASCII kinachowakilisha herufi "A".
Kwa kubadilisha data ya binary kuwa muundo wa ASCII, YEncoder inaruhusu data hiyo kutumwa kupitia njia za mawasiliano ambazo zinaweza kuharibu data ya binary, kama vile barua pepe au mitandao ya zamani ya Usenet. Wakati data inapokelewa upande wa pili, YDecoder hutumiwa kubadilisha tena muundo wa ASCII kuwa data ya binary ya awali.
```
=ybegin line=128 size=28 name=webutils_pl
ryvkryvkryvkryvkryvkryvkryvk
=yend size=28 crc32=35834c86
```
* [http://www.webutils.pl/index.php?idx=yenc](http://www.webutils.pl/index.php?idx=yenc)
2022-07-05 17:49:17 +00:00
### BinHex
2024-02-11 02:13:58 +00:00
BinHex ni mfumo wa uandishi wa faili ambao hutumiwa kubadilisha data ya binary kuwa maandishi yanayoweza kusomwa. Inatumika sana katika uhamishaji wa faili kwenye mitandao ya zamani. Mfumo huu unatumia msimbo wa hexadecimal kuwakilisha data ya binary. Kwa kawaida, faili za BinHex zina ugani wa ".hqx".
```
(This file must be converted with BinHex 4.0)
:#hGPBR9dD@acAh"X!$mr2cmr2cmr!!!!!!!8!!!!!-ka5%p-38K26%&)6da"5%p
-38K26%'d9J!!:
```
* [http://www.webutils.pl/index.php?idx=binhex](http://www.webutils.pl/index.php?idx=binhex)
2022-07-05 17:49:17 +00:00
### ASCII85
2024-02-11 02:13:58 +00:00
ASCII85 ni mbinu ya kubadilisha data ya binary kuwa maandishi ya ASCII. Mbinu hii inatumika katika uwanja wa usalama wa mtandao na uhandisi wa nyuma. Inaweza kutumika kuficha data au kubadilisha data ya binary kuwa muundo unaoweza kusomwa na binadamu. Mbinu hii inatumika mara nyingi katika CTFs na shughuli za udukuzi.
```
<~85DoF85DoF85DoF85DoF85DoF85DoF~>
```
* [http://www.webutils.pl/index.php?idx=ascii85](http://www.webutils.pl/index.php?idx=ascii85)
2024-02-11 02:13:58 +00:00
### Kibodi ya Dvorak
```
drnajapajrna
```
2024-02-11 02:13:58 +00:00
* [https://www.geocachingtoolbox.com/index.php?lang=sw\&page=dvorakKeyboard](https://www.geocachingtoolbox.com/index.php?lang=sw\&page=dvorakKeyboard)
2022-07-05 17:49:17 +00:00
### A1Z26
2024-02-11 02:13:58 +00:00
Barua kwa thamani zao za nambari
```
8 15 12 1 3 1 18 1 3 15 12 1
```
2024-02-11 02:13:58 +00:00
### Ufungaji wa Chanzo cha Affine
2024-02-11 02:13:58 +00:00
Barua hadi nambari `(ax+b)%26` (_a_ na _b_ ni funguo na _x_ ni barua) na matokeo kurudi kwa barua
```
krodfdudfrod
```
2024-02-11 02:13:58 +00:00
### Msimbo wa SMS
2024-02-11 02:13:58 +00:00
**Multitap** [inabadilisha herufi](https://www.dcode.fr/word-letter-change) kwa nambari zinazorudiwa zilizofafanuliwa na nambari ya ufunguo inayolingana kwenye [kibodi ya simu](https://www.dcode.fr/phone-keypad-cipher) (Hali hii hutumiwa wakati wa kuandika SMS).\
Kwa mfano: 2=A, 22=B, 222=C, 3=D...\
Unaweza kutambua msimbo huu kwa sababu utaona\*\* nambari kadhaa zinazorudiwa\*\*.
2024-02-11 02:13:58 +00:00
Unaweza kufichua msimbo huu kwa kutumia: [https://www.dcode.fr/multitap-abc-cipher](https://www.dcode.fr/multitap-abc-cipher)
2024-02-11 02:13:58 +00:00
### Msimbo wa Bacon
2024-02-11 02:13:58 +00:00
Badilisha kila herufi kwa As au Bs nne (au 1s na 0s)
```
00111 01101 01010 00000 00010 00000 10000 00000 00010 01101 01010 00000
AABBB ABBAB ABABA AAAAA AAABA AAAAA BAAAA AAAAA AAABA ABBAB ABABA AAAAA
```
2024-02-11 02:13:58 +00:00
### Alama za Kukimbia
![](../.gitbook/assets/runes.jpg)
2024-02-11 02:13:58 +00:00
## Ufupishaji
2024-02-11 02:13:58 +00:00
**Raw Deflate** na **Raw Inflate** (unaweza kupata zote mbili katika Cyberchef) zinaweza kufupisha na kurejesha data bila vichwa.
2024-02-11 02:13:58 +00:00
## Crypto Rahisi
2022-07-05 17:49:17 +00:00
### XOR - Autosolver
* [https://wiremask.eu/tools/xor-cracker/](https://wiremask.eu/tools/xor-cracker/)
2022-07-05 17:49:17 +00:00
### Bifid
2024-02-11 02:13:58 +00:00
Inahitajika neno muhimu
```
fgaargaamnlunesuneoa
```
2022-07-05 17:49:17 +00:00
### Vigenere
2024-02-11 02:13:58 +00:00
Inahitajika neno muhimu
```
wodsyoidrods
```
* [https://www.guballa.de/vigenere-solver](https://www.guballa.de/vigenere-solver)
* [https://www.dcode.fr/vigenere-cipher](https://www.dcode.fr/vigenere-cipher)
* [https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx](https://www.mygeocachingprofile.com/codebreaker.vigenerecipher.aspx)
2024-02-11 02:13:58 +00:00
## Crypto Imara
2022-07-05 17:49:17 +00:00
### Fernet
2024-02-11 02:13:58 +00:00
2 herufi za msingi 64 (ishara na ufunguo)
```
Token:
gAAAAABWC9P7-9RsxTz_dwxh9-O2VUB7Ih8UCQL1_Zk4suxnkCvb26Ie4i8HSUJ4caHZuiNtjLl3qfmCv_fS3_VpjL7HxCz7_Q==
Key:
-s6eI5hyNh8liH7Gq0urPC-vzPgNnxauKvRO4g03oYI=
```
* [https://asecuritysite.com/encryption/ferdecode](https://asecuritysite.com/encryption/ferdecode)
2024-02-11 02:13:58 +00:00
### Kugawanya Siri ya Samir
2024-02-11 02:13:58 +00:00
Siri inagawanywa katika sehemu X na ili kuirejesha unahitaji sehemu Y (_Y <=X_).
```
8019f8fa5879aa3e07858d08308dc1a8b45
80223035713295bddf0b0bd1b10a5340b89
803bc8cf294b3f83d88e86d9818792e80cd
```
[http://christian.gen.co/secrets/](http://christian.gen.co/secrets/)
2024-02-11 02:13:58 +00:00
### Kuvunja nguvu ya OpenSSL
* [https://github.com/glv2/bruteforce-salted-openssl](https://github.com/glv2/bruteforce-salted-openssl)
2022-07-05 17:49:17 +00:00
* [https://github.com/carlospolop/easy\_BFopensslCTF](https://github.com/carlospolop/easy\_BFopensslCTF)
2024-02-11 02:13:58 +00:00
## Zana
* [https://github.com/Ganapati/RsaCtfTool](https://github.com/Ganapati/RsaCtfTool)
* [https://github.com/lockedbyte/cryptovenom](https://github.com/lockedbyte/cryptovenom)
* [https://github.com/nccgroup/featherduster](https://github.com/nccgroup/featherduster)
2022-04-28 16:01:33 +00:00
<details>
2024-02-11 02:13:58 +00:00
<summary><strong>Jifunze kuhusu kudukua AWS kutoka sifuri hadi shujaa na</strong> <a href="https://training.hacktricks.xyz/courses/arte"><strong>htARTE (HackTricks AWS Red Team Expert)</strong></a><strong>!</strong></summary>
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
Njia nyingine za kusaidia HackTricks:
2022-04-28 16:01:33 +00:00
2024-02-11 02:13:58 +00:00
* Ikiwa unataka kuona **kampuni yako inatangazwa kwenye HackTricks** au **kupakua HackTricks kwa muundo wa PDF** Angalia [**MPANGO WA KUJIUNGA**](https://github.com/sponsors/carlospolop)!
* Pata [**swag rasmi wa PEASS & HackTricks**](https://peass.creator-spring.com)
* Gundua [**The PEASS Family**](https://opensea.io/collection/the-peass-family), mkusanyiko wetu wa [**NFTs**](https://opensea.io/collection/the-peass-family) za kipekee
* **Jiunge na** 💬 [**Kikundi cha Discord**](https://discord.gg/hRep4RUj7f) au [**kikundi cha telegram**](https://t.me/peass) au **tufuate** kwenye **Twitter** 🐦 [**@hacktricks_live**](https://twitter.com/hacktricks_live)**.**
* **Shiriki mbinu zako za kudukua kwa kuwasilisha PRs kwenye** [**HackTricks**](https://github.com/carlospolop/hacktricks) na [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
2022-04-28 16:01:33 +00:00
</details>