BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
Snoop Project

Snoop Project One of the most promising OSINT tools to search for nicknames

This is the most powerful software taking into account the CIS location.

Is your life slideshow? Ask Snoop.
Snoop project is developed without taking into account the opinions of the NSA and their friends,
that is, it is available to the average user

GNU/Linux
Windows 7/10 (32/64)
Android (Termux)
macOS ❗️
IOS 🚫
WSL 🚫


GitHub
Download

#RedTeam #Scanner #Osint #Username_Search

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
1👍1🔥1😢1
⚡️ Flash X ⚡️

⚠️ Use it on virtual machine ⚠️

⬇️ Download

#Scanner

👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
52👍2
🦊 DalFox 🦊

💬
DalFox is a powerful open-source tool that focuses on automation, making it ideal for quickly scanning for XSS flaws and analyzing parameters. Its advanced testing engine and niche features are designed to streamline the process of detecting and verifying vulnerabilities.

🔼 Install:
go install github.com/hahwul/dalfox/v2@latest


💻 Usage:
dalfox [mode] [target] [flags]


👤 Single target mode:
dalfox url https://testphp.vulnweb.com/listproducts.php\?cat\=123\&artist\=123\&asdf\=ff \
-b https://your-callback-url


👥 Multiple target mode from file:
dalfox file urls_file --custom-payload ./mypayloads.txt


🪟 Pipeline mode:
cat urls_file | dalfox pipe -H "AuthToken: bbadsfkasdfadsf87"


😸 Github

⬇️ Donwload
🔒 BugCod3

#Go #XSS #Scanner #Vulnerability #BugBounty

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
311👍1
🦎 Subprober 🦎

🔔 Subprober v1.0.5 - Fast Probing Tool for Penetration Testing

👁‍🗨 Overview:
Subprober v1.0.5 is a powerful and efficient tool designed for penetration testers and security professionals. This release introduces several enhancements, bug fixes, and new features to elevate your subdomain probing experience. Subprober facilitates fast and reliable information extraction, making it an invaluable asset for penetration testing workflows.

📊 Features:
⚪️ Subprober Concurrency and Accuracy are Improved with libraries like aiohttp,asyncio
⚪️ Subprober Error handling and Synchronization are improved
⚪️ Resolved some Bugs for Subprober
⚪️ Subprober Commands are changed with usefull flags
⚪️ Resolved executive errors in v1.0.4
⚪️ Subprober requires python version 3.11.x

🔼 Installation:
Method 1:
pip install git+https://github.com/sanjai-AK47/Subprober.git

Method 2:
cd Subprober
pip install .


💻 Basic Usage:
subprober -f subdomains.txt -o output.txt -tl -wc -sv  -apt -wc -ex 500 -v -o output.txt -c 20


😸 Github

⬇️ Download
🔒 BugCod3

#Subdomains #Scanner

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
221👍1
NetProbe: Network Probe

💬
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.

📊 Features:
⚪️ Scan for devices on a specified IP address or subnet
⚪️ Display the IP address, MAC address, manufacturer, and device model of discovered devices
⚪️ Live tracking of devices (optional)
⚪️ Save scan results to a file (optional)
⚪️ Filter by manufacturer (e.g., 'Apple') (optional)
⚪️ Filter by IP range (e.g., '192.168.1.0/24') (optional)
⚪️ Scan rate in seconds (default: 5) (optional)

🔼 Installation:
cd NetProbe
pip install -r requirements.txt


💻 Usage:
python3 netprobe.py —help


📂 Example:
python3 netprobe.py -t 192.168.1.0/24 -i eth0 -o results.txt -l


😸 Github

⬇️ Download
🔒 BugCod3

#Python #Network #Scanner #Vulnerability #Tools

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥1
🦇 CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner 🦇

💬 Description:
Exploitation and scanning tool specifically designed for Jenkins versions <= 2.441 & <= LTS 2.426.2. It leverages CVE-2024-23897 to assess and exploit vulnerabilities in Jenkins instances.

💻 Usage:
Ensure you have the necessary permissions to scan and exploit the target systems. Use this tool responsibly and ethically.
python CVE-2024-23897.py -t <target> -p <port> -f <file>

or
python CVE-2024-23897.py -i <input_file> -f <file>


📊 Parameters:
⚪️ -t or --target: Specify the target IP(s). Supports single IP, IP range, comma-separated list, or CIDR block.

⚪️ -i or --input-file: Path to input file containing hosts in the format of https://1.2.3.4:8080/ (one per line).

⚪️ -o or --output-file: Export results to file (optional).

⚪️ -p or --port: Specify the port number. Default is 8080 (optional).

⚪️ -f or --file: Specify the file to read on the target system.

😸 Github

⬇️ Download
🔒 BugCod3

#CVE #PoC #Scanner

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥1
💜 knoxnl 💜

💬
This is a python wrapper around the amazing KNOXSS API by Brute Logic. To use this tool (and the underlying API), you must have a valid KNOXSS API key. Don't have one? Go visit https://knoxss.me and subscribe! This was inspired by the "knoxssme" tool by @edoardottt2, but developed to allow for greater options.

🔼 Installation:
NOTE: If you already have a `config.yml` file, it will not be overwritten. The file `config.yml.NEW` will be created in the same directory. If you need the new config, remove `config.yml` and rename `config.yml.NEW` back to `config.yml`.

pip install knoxnl


💻 Examples:
knoxnl -i "https://brutelogic.com.br/xss.php"

Or a file of URLs:
knoxnl -i ~/urls.txt


😸 Github

⬇️ Download
🔒 BugCod3

#Python #Scanner #XSS #Knoxnl

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥321
fuzzuli

💬
fuzzuli is a url fuzzing tool that aims to find critical backup files by creating a dynamic wordlist based on the domain.

🔼 Installation:
fuzzuli requires go1.17 to install successfully. Run the following command to install.
go install -v github.com/musana/fuzzuli@latest


💻 Example:
All:
echo https://fuzzuli.musana.net|fuzzuli -mt mixed

## OR

fuzzuli -h


😸 Github

⬇️ Download
🔒 BugCod3

#Scanner #Backup #Files

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
7👍3🔥32
XlsNinja: Multi-Vulnerability Scanner

💬
XlsNinja is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Local File Inclusion (LFI), Open Redirects (OR), SQL Injection (SQLi), and Cross-Site Scripting (XSS). This tool was created by AnonKryptiQuz, Coffinxp, Hexsh1dow, and Naho.

📊 Features:
⚪️ LFI Scanner: Detect Local File Inclusion vulnerabilities.
⚪️ OR Scanner: Identify Open Redirect vulnerabilities.
⚪️ SQL Scanner: Detect SQL Injection vulnerabilities.
⚪️ XSS Scanner: Identify Cross-Site Scripting vulnerabilities.
⚪️ Multi-threaded scanning: Improved performance through multi-threading.
⚪️ Customizable payloads: Adjust payloads to suit specific targets.
⚪️ Success criteria: Modify success detection criteria for specific use cases.
⚪️ User-friendly command-line interface: Simple and intuitive.
⚪️ Save vulnerable URLs: Option to save the results of vulnerable URLs to a file.

🔼 Installation:
cd lostools
pip install -r requirements.txt
python xlsniNja.py


😸 Github

⬇️ Download
🔒 BugCod3

#Multi #Vulnerability #Scanner

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥544👍4