BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
👁 Link

🌐 Zone-H

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Exploits bank of NMAP program

🔗 Link

#Nmap #Vuln #Exploit

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
PyPhisher

📝
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others.

😸 Github

#Python #Linux #PyPhisher

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👁Link01
🌐Zone-h01

👁Link02
🌐Zone-h02

👁Link03
🌐Zone-h03

👁Link04
🌐Zone-h04

👁Link05
🌐Zone-h05

👁Link06
🌐Zone-h06

👁Link07
🌐Zone-h07

👁Link08
🌐Zone-h08

Country: 🇧🇬

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
DDOS Attack Tools:

SlowLoris:
😸 GitHub

Flood DDoS Weapon:
😸 GitHub

UFOnet:
😸 GitHub

GoldenEye:
😸 GitHub

#Dos #DDos

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Post exploitation tools:

Vegile — Ghost In The Shell:
😸 GitHub

Chrome Keylogger:
😸 GitHub

Forensic tools

Autopsy:
😸 GitHub

Wireshark:
🌐 Site

Bulk extractor:
😸 GitHub

Disk Clone and ISO Image Aquire:
🌐 Site

Toolsley:
🌐 SIte

#RootKit #Keylogger #Exploit #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Payload creation tools:

The FatRat:
😸 GitHub

Brutal:
😸 GitHub

Stitch:
😸 GitHub

MSFvenom Payload Creator:
😸 GitHub

Venom Shellcode Generator:
😸 GitHub

Spycam:
😸 GitHub

Mob-Droid:
😸 GitHub

Enigma:
😸 GItHub

#Payload #Rat #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
👁 Site
🌐 Zone-h

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇦🇺

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇧🇷

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇦🇺

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Practice shell

If you support the channels, there are many shell and tools to share with you

Enjoy... ⭐️

🔗 Link

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥2
CVE-2021-4034

One day for the polkit privilege escalation exploit

Just execute make, ./cve-2021-4034 and enjoy your root shell.

GitHub

#CVE #POC

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
viewdns.com API with Reverse IP Lookup

First, register at https://viewdns.info/api/#register and confirm your account from the link in your mailbox. After performing these operations, your API key will be sent to your mailbox. Moreover By logging into https://viewdns.info/api/# you can see both your API key and remaining requests.

Install libraries used with pip install -r requirements.txt

API key save paths

If any of these 3 items is absent, the vehicle will not start.

1. By typing it into the 'key.txt' found inside the project files

2. using the -k/--key argument (for first use)

3. If 'key.txt' is empty and there is no -k/--key, the first time the tool starts, it will ask you for your API key from the console and save it.

GitHub

#Python #Api #LookUp

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇸🇬

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1