BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
👣 haktrails 👣

💬
haktrails is a Golang client for querying SecurityTrails API data, sponsored by SecurityTrails.

📊 Tool Features:
⚪️ stdin input for easy tool chaining
⚪️ subdomain discovery
⚪️ associated root domain discovery
⚪️ associated IP discovery
⚪️ historical DNS data
⚪️ historical whois data
⚪️ DSL queries (currently a prototype)
⚪️ company discovery (discover the owner of a domain)
⚪️ whois (returns json whois data for a given domain)
⚪️ ping (check that your current SecurityTrails configuration/key is working)
⚪️ usage (check your current SecurityTrails usage)
⚪️ "json" or "list" output options for easy tool chaining
⚪️ "ZSH & Bash autocompletion"

🔼 Installation:
go install -v github.com/hakluke/haktrails@latest


💻 Usage:

Gather subdomains
cat domains.txt | haktrails subdomains
echo "yahoo.com" | haktrails subdomains

and...

😸 Github

⬇️ Download
🔒 BugCod3

#Go #Subdomain #IP #Discovery

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
211🔥1
AlterX

Fast and customizable subdomain wordlist generator using DSL.

📊 Features:

⚪️ Fast and Customizable
⚪️ Automatic word enrichment
⚪️ Pre-defined variables
⚪️ Configurable Patterns
⚪️ STDIN / List input

🔼 Installation:
To install alterx, you need to have Golang 1.19 installed on your system.
go install github.com/projectdiscovery/alterx/cmd/alterx@latest


💻 Examples:
An example of running alterx on existing list of passive subdomains of tesla.com yield us 10 additional NEW and valid subdomains resolved using dnsx.
chaos -d tesla.com | alterx | dnsx


Similarly -enrich option can be used to populate known subdomains as world input to generate target aware permutations.
chaos -d tesla.com | alterx -enrich


You can alter the default patterns at run time using -pattern CLI option.
chaos -d tesla.com | alterx -enrich -p '{{word}}-{{suffix}}'


It is also possible to overwrite existing variables value using -payload CLI options.
alterx -list tesla.txt -enrich -p '{{word}}-{{year}}.{{suffix}}' -pp word=keywords.txt -pp year=2023


😸 Github

⬇️ Download
🔒 BugCod3

#BugBounty #Subdomain #Generator #DSL

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
33👍3🔥2❤‍🔥1
Subzy

💬
Subdomain takeover tool which works based on matching response fingerprints from can-i-take-over-xyz

Installation:
👩‍💻
go install -v github.com/LukaSikic/subzy@latest


📊 Options:
Only required flag for run subcommand(r short version) is either --target or --targets

⚪️ --target (string) - Set single or multiple (comma separated) target subdomain/s

⚪️ --targets (string) - File name/path to list of subdomains

⚪️ --concurrency (integer) - Number of concurrent checks (default 10)

⚪️ --hide_fails (boolean) - Hide failed checks and invulnerable subdomains (default false)

⚪️ --https (boolean) - Use HTTPS by default if protocol not defined on targeted subdomain (default false)

⚪️ --timeout (integer) - HTTP request timeout in seconds (default 10)

⚪️ --verify_ssl (boolean) - If set to true, it won't check site with invalid SSL

💻 Usage:
Target subdomain can have protocol defined, if not https:// will be used by default if --https not specifically set to true.

⚪️ List of subdomains:
./subzy run --targets list.txt

⚪️ Single or multiple targets:
./subzy run --target test.google.com
./subzy run --target test.google.com,https://test.yahoo.com


😸 Github

⬇️ Download
🔒 BugCod3

#BugBounty #Cybersecurity #Subdomain #Takeover

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍322🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
SubCerts

💬
SubCerts is an automated tool designed to extract subdomains from certificate transparency logs using the crt.sh API. This tool allows security researchers, penetration testers, and developers to identify subdomains of a target domain by leveraging publicly available certificates.

📊 Features:
⚪️ Subdomain Extraction: Utilizes crt.sh, a certificate transparency log search engine, to gather subdomains associated with a target domain.

⚪️ HTTP Probing: Automatically sends HTTP/HTTPS requests to each extracted subdomain using httpx and
returns:
⚫️ HTTP status codes
⚫️ Page titles
⚫️ Silent output for clean and organized results

⚪️ Automation: Run the tool with a simple command and get results efficiently without manual effort.

⚪️ Flexible Output: Optionally save the extracted subdomains and httpx results to a file for later review.

🔼 Installation:
cd SubCerts
chmod +x *.sh
./setup.sh
./subcerts.sh -h


💻 Usage:
To run SubCerts for a domain and save the results to a file:
./subcerts.sh -u example.com --output results.txt


😸 Github

⬇️ Download
🔒 BugCod3

#BugBounty #SubDomain #certificate

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
43🔥3