BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
408 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇧🇷

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇦🇺

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Practice shell

If you support the channels, there are many shell and tools to share with you

Enjoy... ⭐️

🔗 Link

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥2
CVE-2021-4034

One day for the polkit privilege escalation exploit

Just execute make, ./cve-2021-4034 and enjoy your root shell.

GitHub

#CVE #POC

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
viewdns.com API with Reverse IP Lookup

First, register at https://viewdns.info/api/#register and confirm your account from the link in your mailbox. After performing these operations, your API key will be sent to your mailbox. Moreover By logging into https://viewdns.info/api/# you can see both your API key and remaining requests.

Install libraries used with pip install -r requirements.txt

API key save paths

If any of these 3 items is absent, the vehicle will not start.

1. By typing it into the 'key.txt' found inside the project files

2. using the -k/--key argument (for first use)

3. If 'key.txt' is empty and there is no -k/--key, the first time the tool starts, it will ask you for your API key from the console and save it.

GitHub

#Python #Api #LookUp

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇸🇬

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
👁 Site
🌐 Mirror-h

👁 Site
🌐 Mirror-h

Country: 🇳🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit

Category:
remote exploits

Platform: php

Risk: [Security Risk Critical]

Denoscription:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.

CVE: 2023-22952

Download

#CVE #Exploit #Rc #Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Find people on the Internet

🤖 Download

#Osint #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Happy Nowruz to all the world 🤙📿
🫡2👍1
👁 Site
🌐 Mirror-h

Country: 🇮🇳

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇮🇩

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Practice shell

If you support the channels, there are many shell and tools to share with you

Enjoy... ⭐️

🔗 Link

Country: 🇺🇸

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👁 Site
🌐 Mirror-h

Country: 🇳🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
B4TM4N ~ PHP WEBSHELL

GitHub

#Web #Shell #Php

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3