BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
vBulletin_5.5.2
vBulletin 5.5.2 PHP Object Injection Exploit

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
VMware-NSX-Manager-XStream
VMware NSX Manager XStream Unauthenticated Remote Code Execution Exploit

CVE : CVE-2021-39144

🌐Github

#RemoteCode #Exploit #Php #Injection

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Bangresta.txt
1.1 KB
Bangresto 1.0 SQLi

💳 Vendor: https://axcora.com/, https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html

️ Demo

💳 Software

🔗 Reference

🗂 Description:
he itemID parameter appears to be vulnerable to SQL injection attacks.
The payload ' was submitted in the itemID parameter, and a database
error message was returned.
The attacker can be stooling all information from the database of this
application.

🍔 Category: web applications

💻 Platform: php

🪖 Risk: [Security Risk High]

#SQL #Injection #Php

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/SashClient
🪩 Https://discord.gg/UfFvDYBBMM
🌐 Https://sash.mybin.ir
Please open Telegram to view this post
VIEW IN TELEGRAM
Command Injection Payload List

⬇️ Download

#Payload #Command #Injection

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21🔥1
Advanced SQL Injection for AWAE

Goal is to master SQL Injection Discovery, Detection and Exploitation

📊 Table of Content:
- Learning a lil' bit of SQL
- SQL Injection Methodology Overview
- MYSQL Injection Methodology
- MySQL Error or UNION Based SQLi
- Routed Queries (Advanced WAF Bypass for Error or UNION based MySQLi)
- WorkAround when UNION queires doesn't work (MySQL Error Based SQLi)
- The Alternative ways of using AND/OR 0 in SQLi
- The Alternative ways of using NULL in SQLi
- The Alternative way of using WhiteSpace in SQLi
- MySQL Boolean Based Blind SQLi
- MySQL Time Based Blind SQLi

AND...

😸 Github

⬇️ Download
🔒 BugCod3

#Sql #Injection #AWAE

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
4🔥21👍1
SQL injection ID parameter

?id=1' order by 1 --+
?id=1' and "a"="a"--+
?id=1' and database()="securtiy"--+
?id=1' and substring(database(),1,1)="a"--+
?id=1' and sleep(2) and "a"="a"--+
?id=1' and sleep(2) and substring(database(),1,1)="a"--+

#SQL #Injection #Tips

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥531