BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
Commix (short for [comm]and [i]njection e[x]ploiter) is an open source penetration testing tool, written by Anastasios Stasinopoulos (@ancst), that automates the detection and exploitation of command injection vulnerabilities.

Installation
You can download commix on any platform by cloning the official Git repository :
$ git clone https://github.com/commixproject/commix.git commix

Alternatively, you can download the latest tarball or zipball.

Note: Python (version 2.6, 2.7 or 3.x) is required for running commix.

Usage
To get a list of all options and switches use:
$ python commix.py -h

To get an overview of commix available options, switches and/or basic ideas on how to use commix, check usage, usage examples and filters bypasses wiki pages.

GitHub

#RedTeam #BugBounty #Command_Injection #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
1
Dork Scraper
Scrape website URLs using Google Dorks.

GitHub

#RedTeam #Dork #Scraper #Google

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👏3
Gobuster

Gobuster is a tool used to brute-force:

⚪️ URIs (directories and files) in web sites.
⚪️ DNS subdomains (with wildcard support).
⚪️ Virtual Host names on target web servers.
⚪️ Open Amazon S3 buckets
⚪️ Open Google Cloud buckets
⚪️ TFTP servers

GitHub

⬇️ Download
🔒 BugCod3

#Go #Dns #Web #Pentesting #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
👍3
Subfinder

subfinder is a subdomain discovery tool that returns valid subdomains for websites, using passive online sources. It has a simple, modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.

We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.


⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows

GitHub

#Osint #BugBounty #SubDomains

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
httpx
is a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library. It is designed to maintain result reliability with an increased number of threads.


⚪️ Simple and modular code base making it easy to contribute.
⚪️ Fast And fully configurable flags to probe multiple elements.
⚪️ Supports multiple HTTP based probings.
⚪️ Smart auto fallback from https to http as default.
⚪️ Supports hosts, URLs and CIDR as input.
⚪️ Handles edge cases doing retries, backoffs etc for handling WAFs.

GitHUb

#osint #ssl_certificate #bugbounty #cybersecurity

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple.

FinalRecon provides detailed information such as :

⚪️ Header Information

⚪️ Whois

⚪️ SSL Certificate Information

⚪️ Crawler
...

⚪️ DNS Enumeration
...

⚪️ Subdomain Enumeration
...

⚪️ Directory Searching
...

⚪️ Wayback Machine
...

⚪️ Port Scan
...

⚪️ Export
...

Github

#pentesting #web #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
3
🌐 https://www.ntbcl.com

👤 name: Admin
📧 email: ntbcl_adminn@ntbcl.com
🔓 password: NewP30MAY@$#

🚫 login page: N/A

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 aeronsindia.com

👤 Name: Admin
📧 Email: admin@aeronsindia.com
🔓 Password: admin12345


📧 Email: anilverm404@gmail.com
🔓 Password: 123

🆚 Version: 5.6.51
🗂 Database: aeronsin_web

🚫 login page: N/A

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌐 http://www.simscollege.ac.in

👤 Username: admin
🔓 Password: simsxyz

🆚 Version: 10.5.22-MariaDB
🚫 Database: N/A

login page: /members.php

#web #sql

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
🌟kiterunner🌟

📝 Introduction

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective for legacy web servers that host static files or respond with 3xx’s upon a partial path, it is no longer effective for modern web applications, specifically APIs.

Over time, we have seen a lot of time invested in making content discovery tools faster so that larger wordlists can be used, however the art of content discovery has not been innovated upon.

Kiterunner is a tool that is capable of not only performing traditional content discovery at lightning fast speeds, but also bruteforcing routes/endpoints in modern applications.

Modern application frameworks such as Flask, Rails, Express, Django and others follow the paradigm of explicitly defining routes which expect certain HTTP methods, headers, parameters and values.

When using traditional content discovery tooling, such routes are often missed and cannot easily be discovered.

By collating a dataset of Swagger specifications and condensing it into our own schema, Kiterunner can use this dataset to bruteforce API endpoints by sending the correct HTTP method, headers, path, parameters and values for each request it sends.

Swagger files were collected from a number of datasources, including an internet wide scan for the 40+ most common swagger paths. Other datasources included GitHub via BigQuery, and APIs.guru.

🌐 Github
⬇️ Download

#FUZZ

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟 Fast and customisable vulnerability scanner based on simple YAML based DSL. 🌟

📝
Nuclei is used to send requests across targets based on a template, leading to zero false positives and providing fast scanning on a large number of hosts. Nuclei offers scanning for a variety of protocols, including TCP, DNS, HTTP, SSL, File, Whois, Websocket, Headless etc. With powerful and flexible templating, Nuclei can be used to model all kinds of security checks.

We have a dedicated repository that houses various type of vulnerability templates contributed by more than 300 security researchers and engineers.

Install Nuclei
Nuclei requires go1.20 to install successfully. Run the following command to install the latest version -

⬇️
➜ ~ go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest

🌐 Github

#security #vulnerability_detection

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟Quasar🌟

🔵Free, Open-Source Remote Administration Tool for Windows

📝
Quasar is a fast and light-weight remote administration tool coded in C#. The usage ranges from user support through day-to-day administrative work to employee monitoring. Providing high stability and an easy-to-use user interface, Quasar is the perfect remote administration solution for you.

Please check out the Getting Started guide.

Features
⚪️TCP network stream (IPv4 & IPv6 support)
⚪️Fast network serialization (Protocol Buffers)
⚪️Encrypted communication (TLS)
⚪️UPnP Support (automatic port forwarding)
⚪️Task Manager
⚪️File Manager
⚪️Startup Manager
⚪️Remote Desktop
⚪️Remote Shell
⚪️Remote Execution
⚪️System Information
⚪️Registry Editor
⚪️System Power Commands (Restart, Shutdown, Standby)
⚪️Keylogger (Unicode Support)
⚪️Reverse Proxy (SOCKS5)
⚪️Password Recovery (Common Browsers and FTP Clients)
⚪️... and many more!

⬇️ Download
Latest stable release (recommended)

🌐 Github

#windows #administration #remote #desktop

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
31
🌟 UnamBinder 1.3.0 - A free silent native file binder 🌟

🔵 A free silent (hidden) open-source native file binder.

📝
Main Features
⚪️ Native or Managed - Builds the final executable as a native (C) or a managed (.NET C#) 32-bit file depending on choice

⚪️ Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one

⚪️ Multiple files - Supports binding any amount of files

⚪️ Compatible - Supports all tested Windows version (Windows 7 to Windows 11) and all file types

⚪️ Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files

⚪️ Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file

⚪️ Fake Error - Supports displaying a fake error message when file is originally started

⬇️ Downloads
Pre-Compiled
Github

#c #windows #binder #open_source

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆3
🌟 REMCOS RAT🌟

⬇️ Download

#rat #windows #malware

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟 A Python tool for DDos via proxy 🌟

⬇️ Download

#DDos #Proxy #L7 #L4

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
5
🌟 Welcome to HackTools 🛠 🌟

📝
The all-in-one Red Team browser extension for Web Pentesters

HackTools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more.

With the extension you no longer need to search for payloads in different websites or in your local storage space, most of the tools are accessible in one click. HackTools is accessible either in pop up mode or in a whole tab in the Devtools part of the browser with F12.

Current functions
⚪️ Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
⚪️ Shell Spawning (TTY Shell Spawning)
⚪️ MSF Venom Builder
⚪️ XSS Payloads
⚪️ Basic SQLi payloads
⚪️ Local file inclusion payloads (LFI)
⚪️ Data Encoding
⚪️ Obfuscated Files or Information
⚪️ Hash Generator (MD5, SHA1, SHA256, SHA512, SM3)
⚪️ Useful Linux commands (Port Forwarding, SUID)
⚪️ RSS Feed (Exploit DB, Cisco Security Advisories, CXSECURITY)
⚪️ CVE Search Engine
⚪️ Various method of data exfiltration and download from a remote machine

⬇️ Download
🌐 Chromium based browser
🔍 Mozilla Firefox
🌐 Instructions to build for Safari

😸 Github

◀️ Build from source code
➜ ~ git clone https://github.com/LasCC/Hack-Tools.git
➜ ~ cd Hack-Tools
➜ ~ npm install && npm run build

#Bug_bounty #Payloads #Addons #Tools

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥3
🌟 Discord Nitro Generator and Checker 🌟

A discord nitro generator and checker for all your nitro needs

It generates and checks discord nitro codes at the same time for maximum efficiency

📍 Getting Started
To get a local copy up and running follow these simple steps.

Prerequisites
You need to install Python, that can be done here

⬇️ Download OR Clone the repo github

◀️ Install Python packages
➜ ~ python3.8 -m pip install -r requirements.txt

➡️ Usage
Run the main.py file using py -3 main.py The code will show you two prompts:

1. How many codes to generate
2. If you want to use a discord webhook, if you dont know how to get a discord webhook url it is located at
channel settings » intergrations » webhooks » create webhook
If you dont want to use a webhook simply leave this blank

The code will start generating and checking after that step

😸 Github

⚠️ This program has not been tested by our team ⚠️

#Python #Generator #Checker #Discord #Nitro

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
❤‍🔥4
🌟 zetanize 🌟

HTML Form Parser For Humans

📝 Introduction
It's very easy to make HTTP requests in python, thanks to urllib and requests. However, there was no way to submit HTML forms on the go, well now there is.

🔰 Documentation
from zetanize import zetanize
forms = zetanize(html)

Well that's it! Just feed zetanize a HTML document and it will give you a dict of actionable form data.
Let's parse https://google.com for getting familiar:
from requests import get
from zetanize import zetanize

html = get('https://google.com').text
forms = zetanize(html)

👁 Here's the output:
{
"0": {
"action": "/search",
"inputs": [
{
"type": "hidden",
"name": "ie",
"value": "ISO-8859-1"
},
{
"type": "hidden",
"name": "hl",
"value": "en-IN"
},
{
"type": "hidden",
"name": "source",
"value": "hp"
},
{
"type": "hidden",
"name": "biw",
"value": ""
},
{
"type": "hidden",
"name": "bih",
"value": ""
},
{
"type": "",
"name": "q",
"value": ""
},
{
"type": "submit",
"name": "btnG",
"value": "Google Search"
},
{
"type": "submit",
"name": "btnI",
"value": "I"
},
{
"type": "hidden",
"name": "gbv",
"value": "1"
}
],
"method": "get"
}
}


⬇️ Download
😸 Github

#Mechanize #Html #Parser

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
4
🌟 Photon 🌟

Incredibly fast crawler designed for OSINT

Photon can extract the following data while crawling:
⚪️URLs (in-scope & out-of-scope)
⚪️URLs with parameters (example.com/gallery.php?id=2)
⚪️Intel (emails, social media accounts, amazon buckets etc.)
⚪️Files (pdf, png, xml etc.)
⚪️Secret keys (auth/API keys & hashes)
⚪️JavaScript files & Endpoints present in them
⚪️Strings matching custom regex pattern
⚪️Subdomains & DNS related data


⬇️ Download
😸 Github

#Python #Crawler #Osint #Spider

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2😱2
Xss Payload

<input/onmouseover="javaSCRIPT&colon;confirm&lpar;1&rpar;”


#Xss #Payload

👤 T.me/BugCod3BOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🌟 Any to Icon 🌟
3.59 converts BMP, JPEG, GIF, PNG, PCX, PSD, TGA, TIFF, WMF, WBMP, XPM, XBM and CUR formats into Windows icons. You can add files and folders from Windows Explorer or other file shells using drag and drop. You also can paste bitmaps from the clipboard and change color resolution and size to create customized icons. It's possible to convert 256-color icons into True Color icons and vice versa.

⬇️ Download

#Anytoicon

👤 T.me/BugCod3BOT
📢 T.me/BugCod3
👍2