BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
CobaltStrike support

Support CobaltStrike's security assessment of other platforms (Linux/MacOS/...), and include the development support of Unix post-penetration module

GitHub

#RedTeam #Cobalt_Strike #Cross_Platform

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
21
This media is not supported in your browser
VIEW IN TELEGRAM
pwndrop

pwndrop is a self-deployable file hosting service for sending out red teaming payloads or securely sharing your private files over HTTP and WebDAV.

If you've ever needed to quickly set up an nginx/apache web server to host your files and you were never happy with the limitations of python -m SimpleHTTPServer, pwndrop is definitely for you!

GitHub

#RedTeam #Self_Hosted #file_sharing

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1👍1
888 Rat

Download

#Rat #Windows #Android

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
😢1
Awesome-Bugbounty-Writeups

A list of writeups in the field of Bug Bunty

GitHub

#Writeup

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍21
Penetration-Testing-Tools

A collection of my Penetration Testing Tools, Scripts, Cheatsheets

This is a collection of more than a 160+ tools, noscripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.

Notice: In order to clone this repository properly - use
--recurse-submodules
switch:
git clone --recurse https://github.com/mgeeky/Penetration-Testing-Tools.git

GitHub

#RedTeam #Pentesting #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1
ffuf - Fuzz Faster U Fool
A fast web fuzzer written in Go.

Installation
Download a prebuilt binary from releases page, unpack and run!

or

If you are on macOS with homebrew, ffuf can be installed with:
brew install ffuf

or

If you have recent go compiler installed:
go install github.com/ffuf/ffuf/v2@latest
(the same command works for updating)

or

git clone https://github.com/ffuf/ffuf ; cd ffuf ; go get ; go build

Ffuf depends on Go 1.16 or greater.

GitHub

#Web #InfoSec #Fuzzer

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
2
Commix (short for [comm]and [i]njection e[x]ploiter) is an open source penetration testing tool, written by Anastasios Stasinopoulos (@ancst), that automates the detection and exploitation of command injection vulnerabilities.

Installation
You can download commix on any platform by cloning the official Git repository :
$ git clone https://github.com/commixproject/commix.git commix

Alternatively, you can download the latest tarball or zipball.

Note: Python (version 2.6, 2.7 or 3.x) is required for running commix.

Usage
To get a list of all options and switches use:
$ python commix.py -h

To get an overview of commix available options, switches and/or basic ideas on how to use commix, check usage, usage examples and filters bypasses wiki pages.

GitHub

#RedTeam #BugBounty #Command_Injection #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1
Dork Scraper
Scrape website URLs using Google Dorks.

GitHub

#RedTeam #Dork #Scraper #Google

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👏3
Gobuster

Gobuster is a tool used to brute-force:

⚪️ URIs (directories and files) in web sites.
⚪️ DNS subdomains (with wildcard support).
⚪️ Virtual Host names on target web servers.
⚪️ Open Amazon S3 buckets
⚪️ Open Google Cloud buckets
⚪️ TFTP servers

GitHub

⬇️ Download
🔒 BugCod3

#Go #Dns #Web #Pentesting #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍3
Subfinder

subfinder is a subdomain discovery tool that returns valid subdomains for websites, using passive online sources. It has a simple, modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.

We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.


⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows

GitHub

#Osint #BugBounty #SubDomains

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
httpx
is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library. It is designed to maintain result reliability with an increased number of threads.


⚪️ Simple and modular code base making it easy to contribute.
⚪️ Fast And fully configurable flags to probe multiple elements.
⚪️ Supports multiple HTTP based probings.
⚪️ Smart auto fallback from https to http as default.
⚪️ Supports hosts, URLs and CIDR as input.
⚪️ Handles edge cases doing retries, backoffs etc for handling WAFs.

GitHUb

#osint #ssl_certificate #bugbounty #cybersecurity

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple.

FinalRecon provides detailed information such as :

⚪️ Header Information

⚪️ Whois

⚪️ SSL Certificate Information

⚪️ Crawler
...

⚪️ DNS Enumeration
...

⚪️ Subdomain Enumeration
...

⚪️ Directory Searching
...

⚪️ Wayback Machine
...

⚪️ Port Scan
...

⚪️ Export
...

Github

#pentesting #web #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
3
🌐 https://www.ntbcl.com

👤 name: Admin
📧 email: ntbcl_adminn@ntbcl.com
🔓 password: NewP30MAY@$#

🚫 login page: N/A

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 aeronsindia.com

👤 Name: Admin
📧 Email: admin@aeronsindia.com
🔓 Password: admin12345


📧 Email: anilverm404@gmail.com
🔓 Password: 123

🆚 Version: 5.6.51
🗂 Database: aeronsin_web

🚫 login page: N/A

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 http://www.simscollege.ac.in

👤 Username: admin
🔓 Password: simsxyz

🆚 Version: 10.5.22-MariaDB
🚫 Database: N/A

login page: /members.php

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌟kiterunner🌟

📝 Introduction

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective for legacy web servers that host static files or respond with 3xx’s upon a partial path, it is no longer effective for modern web applications, specifically APIs.

Over time, we have seen a lot of time invested in making content discovery tools faster so that larger wordlists can be used, however the art of content discovery has not been innovated upon.

Kiterunner is a tool that is capable of not only performing traditional content discovery at lightning fast speeds, but also bruteforcing routes/endpoints in modern applications.

Modern application frameworks such as Flask, Rails, Express, Django and others follow the paradigm of explicitly defining routes which expect certain HTTP methods, headers, parameters and values.

When using traditional content discovery tooling, such routes are often missed and cannot easily be discovered.

By collating a dataset of Swagger specifications and condensing it into our own schema, Kiterunner can use this dataset to bruteforce API endpoints by sending the correct HTTP method, headers, path, parameters and values for each request it sends.

Swagger files were collected from a number of datasources, including an internet wide scan for the 40+ most common swagger paths. Other datasources included GitHub via BigQuery, and APIs.guru.

🌐 Github
⬇️ Download

#FUZZ

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟 Fast and customisable vulnerability scanner based on simple YAML based DSL. 🌟

📝
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.

We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security researchers and engineers.

Install Nuclei
Nuclei requires go1.20 to install successfully. Run the following command to install the latest version -

⬇️
➜ ~ go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest

🌐 Github

#security #vulnerability_detection

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟Quasar🌟

🔵Free, Open-Source Remote Administration Tool for Windows

📝
Quasar is a fast and light-weight remote administration tool coded in C#. The usage ranges from user support through day-to-day administrative work to employee monitoring. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.

Please check out the Getting Started guide.

Features
⚪️TCP network stream (IPv4 & IPv6 support)
⚪️Fast network serialization (Protocol Buffers)
⚪️Encrypted communication (TLS)
⚪️UPnP Support (automatic port forwarding)
⚪️Task Manager
⚪️File Manager
⚪️Startup Manager
⚪️Remote Desktop
⚪️Remote Shell
⚪️Remote Execution
⚪️System Information
⚪️Registry Editor
⚪️System Power Commands (Restart, Shutdown, Standby)
⚪️Keylogger (Unicode Support)
⚪️Reverse Proxy (SOCKS5)
⚪️Password Recovery (Common Browsers and FTP Clients)
⚪️... and many more!

⬇️ Download
Latest stable release (recommended)

🌐 Github

#windows #administration #remote #desktop

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
31
🌟 UnamBinder 1.3.0 - A free silent native file binder 🌟

🔵 A free silent (hidden) open-source native file binder.

📝
Main Features
⚪️ Native or Managed - Builds the final executable as a native (C) or a managed (.NET C#) 32-bit file depending on choice

⚪️ Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one

⚪️ Multiple files - Supports binding any amount of files

⚪️ Compatible - Supports all tested Windows version (Windows 7 to Windows 11) and all file types

⚪️ Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files

⚪️ Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file

⚪️ Fake Error - Supports displaying a fake error message when file is originally started

⬇️ Downloads
Pre-Compiled
Github

#c #windows #binder #open_source

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆3
🌟 REMCOS RAT🌟

⬇️ Download

#rat #windows #malware

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM