BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
A Massive Exploiting Tool

TheFatRat is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. TheFatRat Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus

Features !

⚪️ Fully Automating MSFvenom & Metasploit.
⚪️ Local or remote listener Generation.
⚪️ Easily Make Backdoor by category Operating System.
⚪️ Generate payloads in Various formats.
⚪️ Bypass anti-virus backdoors.
⚪️ File pumper that you can use for increasing the size of your files.
⚪️ The ability to detect external IP & Interface address .
⚪️ Automatically creates AutoRun files for USB / CDROM exploitation

GitHub

#C #Rat #Tools

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
🌟 UnamBinder 1.3.0 - A free silent native file binder 🌟

🔵 A free silent (hidden) open-source native file binder.

📝
Main Features
⚪️ Native or Managed - Builds the final executable as a native (C) or a managed (.NET C#) 32-bit file depending on choice

⚪️ Silent - Drops and executes (if enabled) files without any visible output unless the bound program has one

⚪️ Multiple files - Supports binding any amount of files

⚪️ Compatible - Supports all tested Windows version (Windows 7 to Windows 11) and all file types

⚪️ Windows Defender exclusions - Can add exclusions into Windows Defender to ignore any detections from the bound files

⚪️ Icon/Assembly - Supports adding an Icon and/or Assembly Data to the built file

⚪️ Fake Error - Supports displaying a fake error message when file is originally started

⬇️ Downloads
Pre-Compiled
Github

#c #windows #binder #open_source

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🏆3
🔥 PDF-BUILDER (POC) - (Non Silent) 🔥

💬
POC Pdf-exploit builder on C#
Exploitable versions: Foxit Reader, Adobe Acrobat V9(maybe).

💻 Usage:
Put your exe-link and build the PDF-FILE

😸 Github

⬇️ Download
🔒 BugCod3

#C #PDF #Exploit

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3🔥32👎2
Mali GPU Kernel LPE

Android 14 kernel exploit for Pixel7/8 Pro

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following Android 14 versions:

Pixel 8 Pro: google/husky/husky:14/UD1A.231105.004/11010374:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231105.003/11010452:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys
Pixel 7: google/panther/panther:14/UP1A.231105.003/11010452:user/release-keys

Vulnerabilities:
This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the gpu_pixel_handle_buffer_liveness_update_ioctl ioctl command, and an information leak within the timeline stream message buffers.

Github

⬇️ Download
🔓 BugCod3

#C #Exploit #Android #Kernel #Pixel

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
11👍1🔥1
Smaug - The OSINT for database's

Search inside every file, folder and subfolder for OSINT
(based on the book The Hobbit, Smaug the dragon)

💬
It is not an online tool. This program scans your local database to search a variable you specified inside each file with bruteforce.
This tool has been created for utility to search inside every file which contains your input,
and also not all files/folders are supported (outside UTF-8 unicode) atm.
Could be useful for osint individuals.

🔼 Compile:
🖥 Unix:
⚪️ run make inside smaug-main

🖥 Windows:
⚪️ linux enviroment, example WSL or Chocolatey, run make inside smaug-main.

⚪️ otherwise, if you are running inside an IDE, just compile the program specifying the Makefile under smaug-main.

💻 Usage:
⚪️ Place it (smaug.exe) under the root directory containing all files and subfolders.
⚪️ Run cmd.exe inside that folder
⚪️ Run: smaug.exe text_variable
⚪️ Now you wait till it finishes searching.

😸 Github

⬇️ Download
🔒 BugCod3

#C #Smaug #OSINT

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥2