Snoop Project
Snoop Project One of the most promising OSINT tools to search for nicknames
This is the most powerful software taking into account the CIS location.
Is your life slideshow? Ask Snoop.
Snoop project is developed without taking into account the opinions of the NSA and their friends,
that is, it is available to the average user
GNU/Linux ✅
Windows 7/10 (32/64) ✅
Android (Termux) ✅
macOS ❗️
IOS 🚫
WSL 🚫
GitHub
Download
#RedTeam #Scanner #Osint #Username_Search
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Snoop Project One of the most promising OSINT tools to search for nicknames
This is the most powerful software taking into account the CIS location.
Is your life slideshow? Ask Snoop.
Snoop project is developed without taking into account the opinions of the NSA and their friends,
that is, it is available to the average user
GNU/Linux ✅
Windows 7/10 (32/64) ✅
Android (Termux) ✅
macOS ❗️
IOS 🚫
WSL 🚫
GitHub
Download
#RedTeam #Scanner #Osint #Username_Search
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
❤1👍1🔥1😢1
#Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5⚡2👍2
DalFox is a powerful open-source tool that focuses on automation, making it ideal for quickly scanning for XSS flaws and analyzing parameters. Its advanced testing engine and niche features are designed to streamline the process of detecting and verifying vulnerabilities.
go install github.com/hahwul/dalfox/v2@latest
dalfox [mode] [target] [flags]
dalfox url https://testphp.vulnweb.com/listproducts.php\?cat\=123\&artist\=123\&asdf\=ff \
-b https://your-callback-url
dalfox file urls_file --custom-payload ./mypayloads.txt
cat urls_file | dalfox pipe -H "AuthToken: bbadsfkasdfadsf87"
BugCod3#Go #XSS #Scanner #Vulnerability #BugBounty
Please open Telegram to view this post
VIEW IN TELEGRAM
Subprober v1.0.5 is a powerful and efficient tool designed for penetration testers and security professionals. This release introduces several enhancements, bug fixes, and new features to elevate your subdomain probing experience. Subprober facilitates fast and reliable information extraction, making it an invaluable asset for penetration testing workflows.
Method 1:
pip install git+https://github.com/sanjai-AK47/Subprober.git
Method 2:
cd Subprober
pip install .
subprober -f subdomains.txt -o output.txt -tl -wc -sv -apt -wc -ex 500 -v -o output.txt -c 20
BugCod3#Subdomains #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2 2⚡1👍1
NetProbe: Network Probe
💬
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.
📊 Features:
⚪️ Scan for devices on a specified IP address or subnet
⚪️ Display the IP address, MAC address, manufacturer, and device model of discovered devices
⚪️ Live tracking of devices (optional)
⚪️ Save scan results to a file (optional)
⚪️ Filter by manufacturer (e.g., 'Apple') (optional)
⚪️ Filter by IP range (e.g., '192.168.1.0/24') (optional)
⚪️ Scan rate in seconds (default: 5) (optional)
🔼 Installation:
💻 Usage:
📂 Example:
😸 Github
⬇️ Download
🔒
#Python #Network #Scanner #Vulnerability #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.
cd NetProbe
pip install -r requirements.txt
python3 netprobe.py —help
python3 netprobe.py -t 192.168.1.0/24 -i eth0 -o results.txt -l
BugCod3#Python #Network #Scanner #Vulnerability #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤3🔥1
Exploitation and scanning tool specifically designed for Jenkins versions
<= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>
or
python CVE-2024-23897.py -i <input_file> -f <file>
-t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.-i or --input-file: Path to input file containing hosts in the format of https://1.2.3.4:8080/ (one per line).-o or --output-file: Export results to file (optional).-p or --port: Specify the port number. Default is 8080 (optional).-f or --file: Specify the file to read on the target system.BugCod3#CVE #PoC #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤3🔥1
This is a python wrapper around the amazing KNOXSS API by Brute Logic. To use this tool (and the underlying API), you must have a valid KNOXSS API key. Don't have one? Go visit
https://knoxss.me and subscribe! This was inspired by the "knoxssme" tool by @edoardottt2, but developed to allow for greater options.NOTE: If you already have a `config.yml` file, it will not be overwritten. The file `config.yml.NEW` will be created in the same directory. If you need the new config, remove `config.yml` and rename `config.yml.NEW` back to `config.yml`.
pip install knoxnl
knoxnl -i "https://brutelogic.com.br/xss.php"
Or a file of URLs:
knoxnl -i ~/urls.txt
BugCod3#Python #Scanner #XSS #Knoxnl
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1
fuzzuli
💬
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
🔼 Installation:
fuzzuli requires go1.17 to install successfully. Run the following command to install.
💻 Example:
All:
😸 Github
⬇️ Download
🔒
#Scanner #Backup #Files
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.
fuzzuli requires go1.17 to install successfully. Run the following command to install.
go install -v github.com/musana/fuzzuli@latest
All:
echo https://fuzzuli.musana.net|fuzzuli -mt mixed
## OR
fuzzuli -h
BugCod3#Scanner #Backup #Files
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7👍3🔥3⚡2
XlsNinja: Multi-Vulnerability Scanner
💬
XlsNinja is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Local File Inclusion (LFI), Open Redirects (OR), SQL Injection (SQLi), and Cross-Site Scripting (XSS). This tool was created by AnonKryptiQuz, Coffinxp, Hexsh1dow, and Naho.
📊 Features:
⚪️ LFI Scanner: Detect Local File Inclusion vulnerabilities.
⚪️ OR Scanner: Identify Open Redirect vulnerabilities.
⚪️ SQL Scanner: Detect SQL Injection vulnerabilities.
⚪️ XSS Scanner: Identify Cross-Site Scripting vulnerabilities.
⚪️ Multi-threaded scanning: Improved performance through multi-threading.
⚪️ Customizable payloads: Adjust payloads to suit specific targets.
⚪️ Success criteria: Modify success detection criteria for specific use cases.
⚪️ User-friendly command-line interface: Simple and intuitive.
⚪️ Save vulnerable URLs: Option to save the results of vulnerable URLs to a file.
🔼 Installation:
😸 Github
⬇️ Download
🔒
#Multi #Vulnerability #Scanner
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
XlsNinja is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Local File Inclusion (LFI), Open Redirects (OR), SQL Injection (SQLi), and Cross-Site Scripting (XSS). This tool was created by AnonKryptiQuz, Coffinxp, Hexsh1dow, and Naho.
cd lostools
pip install -r requirements.txt
python xlsniNja.py
BugCod3#Multi #Vulnerability #Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5❤4⚡4👍4