Awesome-Bugbounty-Writeups
A list of writeups in the field of Bug Bunty
GitHub
#Writeup
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A list of writeups in the field of Bug Bunty
GitHub
#Writeup
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍2⚡1
Penetration-Testing-Tools
A collection of my Penetration Testing Tools, Scripts, Cheatsheets
This is a collection of more than a 160+ tools, noscripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.
Notice: In order to clone this repository properly - use
#RedTeam #Pentesting #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A collection of my Penetration Testing Tools, Scripts, Cheatsheets
This is a collection of more than a 160+ tools, noscripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.
Notice: In order to clone this repository properly - use
--recurse-submodulesswitch:
git clone --recurse https://github.com/mgeeky/Penetration-Testing-Tools.git
GitHub#RedTeam #Pentesting #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡1
ffuf - Fuzz Faster U Fool
A fast web fuzzer written in Go.
Installation
Download a prebuilt binary from releases page, unpack and run!
or
If you are on macOS with homebrew, ffuf can be installed with:
If you have recent go compiler installed:
or
GitHub
#Web #InfoSec #Fuzzer
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
A fast web fuzzer written in Go.
Installation
Download a prebuilt binary from releases page, unpack and run!
or
If you are on macOS with homebrew, ffuf can be installed with:
brew install ffufor
If you have recent go compiler installed:
go install github.com/ffuf/ffuf/v2@latest(the same command works for updating)
or
git clone https://github.com/ffuf/ffuf ; cd ffuf ; go get ; go buildFfuf depends on Go 1.16 or greater.
GitHub
#Web #InfoSec #Fuzzer
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡2
Commix (short for [comm]and [i]njection e[x]ploiter) is an open source penetration testing tool, written by Anastasios Stasinopoulos (@ancst), that automates the detection and exploitation of command injection vulnerabilities.
Installation
You can download commix on any platform by cloning the official Git repository :
Note: Python (version 2.6, 2.7 or 3.x) is required for running commix.
Usage
To get a list of all options and switches use:
GitHub
#RedTeam #BugBounty #Command_Injection #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Installation
You can download commix on any platform by cloning the official Git repository :
$ git clone https://github.com/commixproject/commix.git commixAlternatively, you can download the latest tarball or zipball.
Note: Python (version 2.6, 2.7 or 3.x) is required for running commix.
Usage
To get a list of all options and switches use:
$ python commix.py -hTo get an overview of commix available options, switches and/or basic ideas on how to use commix, check usage, usage examples and filters bypasses wiki pages.
GitHub
#RedTeam #BugBounty #Command_Injection #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡1
Dork Scraper
Scrape website URLs using Google Dorks.
GitHub
#RedTeam #Dork #Scraper #Google
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Scrape website URLs using Google Dorks.
GitHub
#RedTeam #Dork #Scraper #Google
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👏3
Gobuster
Gobuster is a tool used to brute-force:
⚪️ URIs (directories and files) in web sites.
⚪️ DNS subdomains (with wildcard support).
⚪️ Virtual Host names on target web servers.
⚪️ Open Amazon S3 buckets
⚪️ Open Google Cloud buckets
⚪️ TFTP servers
GitHub
⬇️ Download
🔒
#Go #Dns #Web #Pentesting #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Gobuster is a tool used to brute-force:
⚪️ URIs (directories and files) in web sites.
⚪️ DNS subdomains (with wildcard support).
⚪️ Virtual Host names on target web servers.
⚪️ Open Amazon S3 buckets
⚪️ Open Google Cloud buckets
⚪️ TFTP servers
GitHub
⬇️ Download
🔒
BugCod3#Go #Dns #Web #Pentesting #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍3
Subfinder
We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.
⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows
GitHub
#Osint #BugBounty #SubDomains
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
subfinder is a subdomain discovery tool that returns valid subdomains for websites, using passive online sources. It has a simple, modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.
⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows
GitHub
#Osint #BugBounty #SubDomains
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
httpxis a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library. It is designed to maintain result reliability with an increased number of threads.
⚪️ Simple and modular code base making it easy to contribute.
⚪️ Fast And fully configurable flags to probe multiple elements.
⚪️ Supports multiple HTTP based probings.
⚪️ Smart auto fallback from https to http as default.
⚪️ Supports hosts, URLs and CIDR as input.
⚪️ Handles edge cases doing retries, backoffs etc for handling WAFs.
GitHUb
#osint #ssl_certificate #bugbounty #cybersecurity
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple.
FinalRecon provides detailed information such as :
⚪️ Header Information
⚪️ Whois
⚪️ SSL Certificate Information
⚪️ Crawler
...
⚪️ DNS Enumeration
...
⚪️ Subdomain Enumeration
...
⚪️ Directory Searching
...
⚪️ Wayback Machine
...
⚪️ Port Scan
...
⚪️ Export
...
Github
#pentesting #web #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
FinalRecon provides detailed information such as :
⚪️ Header Information
⚪️ Whois
⚪️ SSL Certificate Information
⚪️ Crawler
...
⚪️ DNS Enumeration
...
⚪️ Subdomain Enumeration
...
⚪️ Directory Searching
...
⚪️ Wayback Machine
...
⚪️ Port Scan
...
⚪️ Export
...
Github
#pentesting #web #Tools
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
⚡3
🌐 https://www.ntbcl.com
👤 name: Admin
📧 email: ntbcl_adminn@ntbcl.com
🔓 password: NewP30MAY@$#
🚫 login page: N/A
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👤 name: Admin
📧 email: ntbcl_adminn@ntbcl.com
🔓 password: NewP30MAY@$#
🚫 login page: N/A
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 aeronsindia.com
👤 Name: Admin
📧 Email: admin@aeronsindia.com
🔓 Password: admin12345
📧 Email: anilverm404@gmail.com
🔓 Password: 123
🆚 Version: 5.6.51
🗂 Database: aeronsin_web
🚫 login page: N/A
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👤 Name: Admin
📧 Email: admin@aeronsindia.com
🔓 Password: admin12345
📧 Email: anilverm404@gmail.com
🔓 Password: 123
🆚 Version: 5.6.51
🗂 Database: aeronsin_web
🚫 login page: N/A
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 http://www.simscollege.ac.in
👤 Username: admin
🔓 Password: simsxyz
🆚 Version: 10.5.22-MariaDB
🚫 Database: N/A
✅ login page: /members.php
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👤 Username: admin
🔓 Password: simsxyz
🆚 Version: 10.5.22-MariaDB
🚫 Database: N/A
✅ login page: /members.php
#web #sql
➖➖➖➖➖➖➖➖➖➖
👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective for legacy web servers that host static files or respond with 3xx’s upon a partial path, it is no longer effective for modern web applications, specifically APIs.
Over time, we have seen a lot of time invested in making content discovery tools faster so that larger wordlists can be used, however the art of content discovery has not been innovated upon.
Kiterunner is a tool that is capable of not only performing traditional content discovery at lightning fast speeds, but also bruteforcing routes/endpoints in modern applications.
Modern application frameworks such as Flask, Rails, Express, Django and others follow the paradigm of explicitly defining routes which expect certain HTTP methods, headers, parameters and values.
When using traditional content discovery tooling, such routes are often missed and cannot easily be discovered.
By collating a dataset of Swagger specifications and condensing it into our own schema, Kiterunner can use this dataset to bruteforce API endpoints by sending the correct HTTP method, headers, path, parameters and values for each request it sends.
Swagger files were collected from a number of datasources, including an internet wide scan for the 40+ most common swagger paths. Other datasources included GitHub via BigQuery, and APIs.guru.
#FUZZ
Please open Telegram to view this post
VIEW IN TELEGRAM
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.
We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security researchers and engineers.
Install Nuclei
Nuclei requires go1.20 to install successfully. Run the following command to install the latest version -
➜ ~ go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
#security #vulnerability_detection
Please open Telegram to view this post
VIEW IN TELEGRAM
Quasar is a fast and light-weight remote administration tool coded in C#. The usage ranges from user support through day-to-day administrative work to employee monitoring. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.
Please check out the Getting Started guide.
Latest stable release (recommended)
🌐 Github
#windows #administration #remote #desktop
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤1
Main Features
Pre-Compiled
Github
#c #windows #binder #open_source
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆3
Please open Telegram to view this post
VIEW IN TELEGRAM
#DDos #Proxy #L7 #L4
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5
The all-in-one Red Team browser extension for Web Pentesters
HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more.
With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12.
➜ ~
git clone https://github.com/LasCC/Hack-Tools.git
➜ ~ cd Hack-Tools
➜ ~ npm install && npm run build
#Bug_bounty #Payloads #Addons #ToolsPlease open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥3