BugCod3
6.18K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
vBulletin_5.5.2
vBulletin 5.5.2 PHP Object Injection Exploit

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
VMware-NSX-Manager-XStream
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit

CVE : CVE-2021-39144

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2022-31188_SSRF.txt
1.4 KB
CVAT 2.0 - SSRF (Server Side Request Forgery)

🗂 Description:
#CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability.
#Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade.

Type: webapps

💻 Platform: Python

🌐 Vendor Homepage: 🌐Github

🛡 Tested On: Version 1.7.0 - Ubuntu 20.04.4 LTS (GNU/Linux 5.4.0-122-generic x86_64)

👑 CVE: CVE-2022-31188

#CVE #SSRF #Exploit #Python

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Control-Web-Panel.txt
3.8 KB
Control Web Panel Unauthenticated Remote Command Execution Exploit

Category: remote exploits

🖥 Platform: linux

🪖 Risk: Security Risk Critical 🚨

🗂️ Size: 🅰🅰🅰📝📝

📝
Description: Control Web Panel versions prior to 0.9.8.1147 are vulnerable to unauthenticated OS command injection. Successful exploitation results in code execution as the root user. The results of the command are not contained within the HTTP response and the request will block while the command is running.

CVE: CVE-2022-44877

#CVE #Linux #Exploit

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Exploits bank of NMAP program

🔗 Link

#Nmap #Vuln #Exploit

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
Post exploitation tools:

Vegile — Ghost In The Shell:
😸 GitHub

Chrome Keylogger:
😸 GitHub

Forensic tools

Autopsy:
😸 GitHub

Wireshark:
🌐 Site

Bulk extractor:
😸 GitHub

Disk Clone and ISO Image Aquire:
🌐 Site

Toolsley:
🌐 SIte

#RootKit #Keylogger #Exploit #Tools

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
SugarCRM 12.x Remote Code Execution / Shell Upload Exploit

Category:
remote exploits

Platform: php

Risk: [Security Risk Critical]

Description:
This Metasploit module exploits CVE-2023-22952, a remote code execution vulnerability in SugarCRM 11.0 Enterprise, Professional, Sell, Serve, and Ultimate versions prior to 11.0.5 and SugarCRM 12.0 Enterprise, Sell, and Serve versions prior to 12.0.2.

CVE: 2023-22952

Download

#CVE #Exploit #Rc #Shell

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Microsoft Windows 11 - 'cmd.exe' Denial of Service

Platform:
Windows

Type: dos

Exploit-db

Dwonload

#Windows
#Exploit #Python

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Marijuana Exploit 🍀

⬇️ Download

🔒 @LearnExploit

#Exploit #Bot

🔥 0Day.Today
👤 t.iss.one/BugCod3
📢 t.iss.one/LearnExploit
Please open Telegram to view this post
VIEW IN TELEGRAM
62❤‍🔥21
🪳CVE-2023-38831 winrar exploit generator 🪳

👥 Quick poc test:
Generate the default poc for test
python cve-2023-38831-exp-gen.py poc

or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat  poc.rar


👤 Custom:
⚪️ Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (.png, jpg) or a document (.pdf)
⚪️ Run
python cve-2023-38831-exp-gen.py <bait name> <script name> <output name>

to generate your exploit

👆 Analysis Blog
👁‍🗨 Reference
😸 Github

⬇️ Download
🔒 BugCod3

#CVE #Winrar #Exploit

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
41👍11