NetProbe: Network Probe
💬
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.
📊 Features:
⚪️ Scan for devices on a specified IP address or subnet
⚪️ Display the IP address, MAC address, manufacturer, and device model of discovered devices
⚪️ Live tracking of devices (optional)
⚪️ Save scan results to a file (optional)
⚪️ Filter by manufacturer (e.g., 'Apple') (optional)
⚪️ Filter by IP range (e.g., '192.168.1.0/24') (optional)
⚪️ Scan rate in seconds (default: 5) (optional)
🔼 Installation:
💻 Usage:
📂 Example:
😸 Github
⬇️ Download
🔒
#Python #Network #Scanner #Vulnerability #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
NetProbe is a tool you can use to scan for devices on your network. The program sends ARP requests to any IP address on your network and lists the IP addresses, MAC addresses, manufacturers, and device models of the responding devices.
cd NetProbe
pip install -r requirements.txt
python3 netprobe.py —help
python3 netprobe.py -t 192.168.1.0/24 -i eth0 -o results.txt -l
BugCod3#Python #Network #Scanner #Vulnerability #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4❤3🔥1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1🤣1
This h1finder.sh is script which collect all program names and then collect all assets and save it into wild and non-wild domains
You can get your API key from
cd h1-asset-fetcher
chmod +x h1finder
mv h1finder /usr/bin/
h1finder -t <token> -u <username> -b <true/false>
BugCod3#BugBounty #Tips #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤1👍1🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID.
📋 Output Customization: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
pip install chiasmodon
chiasmodon_cli.py -h
BugCod3#OSINT #BugBounty #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥3👍2❤1
#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥5⚡2❤1🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
🕵️♂️ Human-like Behavior Mimicking: To mimic human-like behavior and avoid detection by anti-bot mechanisms, the tool randomizes user agents for each request. This helps in making the requests appear more natural and reduces the likelihood of being flagged as automated activity.
cd Ominis-Osint
pip install -r requirements.txt
python3 Ominis.py
BugCod3#Python #Osint #Search #Engin #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤2👍1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2🔥2❤1👍1
MultCheck is a malware-analysis tool that can be used to test the detection of a file by multiple AV engines.
It is designed to be easy to use, and to be able to test multiple AV engines. It is also designed to be easy to extend, and to be able to add custom AV engines.
Run
go build under the root directory of the project.OR
cd src
# Build for Windows
## 64-bit
GOOS=windows GOARCH=amd64 go build -o ../bin/multcheck_x64.exe main.go
## 32-bit
GOOS=windows GOARCH=386 go build -o ../bin/multcheck_x32.exe main.go
MultCheck accepts a target file as an argument:
./multcheck <target_file>Different built-in scanners can be used by specifying the
-scanner flag: ./multcheck -scanner <scanner_name> <target_file>Custom scanners can be added by creating a configuration file and providing the path to the file through the
-scanner flag: ./multcheck -scanner <path_to_config_file> <target_file>BugCod3#GO #Malware #Analysis #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤3⚡2🔥2
DOMAINIM
💬
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
📊 Features:
⚪️ Subdomain enumeration (2 engines + bruteforcing)
⚪️ User-friendly output
⚪️ Resolving A records (IPv4)
⚪️ Virtual hostname enumeration
⚪️ Reverse DNS lookup
⚪️ Detects wildcard subdomains (for bruteforcing)
⚪️ Basic TCP port scanning
⚪️ Subdomains are accepted as input
⚪️ Export results to JSON file
🔼 Installation:
💻 Usage:
📂 Examples:
⚪️
⚪️
⚪️
⚪️
⚪️
😸 Github
⬇️ Download
🔒
#Pentest #RedTeam #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Domainim is a fast domain reconnaissance tool for organizational network scanning. The tool aims to provide a brief overview of an organization's structure using techniques like OSINT, bruteforcing, DNS resolving etc.
cd domainim
nimble build
./domainim <domain> [--ports=<ports>]
./domainim <domain> [--ports=<ports> | -p:<ports>] [--wordlist=<filename> | l:<filename> [--rps=<int> | -r:<int>]] [--dns=<dns> | -d:<dns>] [--out=<filename> | -o:<filename>]
./domainim nmap.org --ports=all./domainim google.com --ports=none --dns=8.8.8.8#53./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --rps=1500./domainim pptx704.com --ports=t100 --wordlist=wordlist.txt --outfile=results.json./domainim mysite.com --ports=t50,5432,7000-9000 --dns=1.1.1.1BugCod3#Pentest #RedTeam #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3⚡2❤1👍1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡2👍2🔥2❤1
DARKARMY is a Collection Of Penetration Testing Tools, you will have every script that a hacker needs
👤 Information Gathering:
⚪️ Nmap
⚪️ Setoolkit
⚪️ Port Scanning
⚪️ Host to IP
⚪️ Wordpress User
⚪️ CMS Scanner
⚪️ XSStrike
⚪️ Dork - Google Dorks Passive Vulnerability Auditor
⚪️ Scan A server's Users
⚪️ Crips
🔓 Password Attacks:
⚪️ CUpp
⚪️ Ncrack
🛜 Wireless Testing:
⚪️ reaver
⚪️ pixiewps
⚪️ Fluxion
🌍 Exploitaition Tools:
⚪️ ATSCAN
⚪️ sqlmap
⚪️ Shellnoob
⚪️ commix
⚪️ FTP auto Bypass
⚪️ jboss-autopwn
📂 Social Engineering:
⚪️ Setoolkit
⚪️ SSLtrip
⚪️ pyPHISHER
⚪️ ZPHISHER
🧑💻 Web Hacking:
⚪️ Drupal Hacking
⚪️ Inurlbr
⚪️ Wordpress & Joomla Scanner
⚪️ Gravity From Scanner
⚪️ File Upload Checker
⚪️ Wordpress Exploit & Plugins Scanner
⚪️ Shell and Directory Finder
⚪️ Joomla! 1.5 - 3.4.5 remote code execution
⚪️ Vbulletin 5.X remote code execution
⚪️ BruteX - Automatically brute force all services running on a target
⚪️ Arachni - Web Application Security Scanner Framework
And ...
🔼 Installation:
This Tool Must Run As ROOT !!!
That's it. You can execute tool by typing DARKARMY
You can also use this tool inside the Termux of the phone
😸 Github
🎞 Youtube (Demo)
⬇️ Download
🔒
#Hacking #Tools #Pack #Penetration
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
And ...
This Tool Must Run As ROOT !!!
cd DARKARMY
chmod +x install.sh
./install.sh
That's it. You can execute tool by typing DARKARMY
You can also use this tool inside the Termux of the phone
BugCod3#Hacking #Tools #Pack #Penetration
Please open Telegram to view this post
VIEW IN TELEGRAM
👍10❤5🔥4⚡2
Firefox Decrypt
💬
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
💻 Usage:
Github
⬇️ Download
🔒
#Python #Firefox #Extract #Password #Tools
➖➖➖➖➖➖➖➖➖➖
📣 t.iss.one/Root_Exploit
📣 t.iss.one/BugCod3
💬
Firefox Decrypt is a tool to extract passwords from Mozilla (Firefox™, Waterfox™, Thunderbird®, SeaMonkey®) profiles
💻 Usage:
cd firefox_decrypt
python firefox_decrypt.py
Github
⬇️ Download
🔒
BugCod3#Python #Firefox #Extract #Password #Tools
➖➖➖➖➖➖➖➖➖➖
📣 t.iss.one/Root_Exploit
📣 t.iss.one/BugCod3
⚡4❤3🔥3
Blackbird is a robust OSINT tool that facilitates rapid searches for user accounts by username or email across a wide array of platforms, enhancing digital investigations. It features WhatsMyName integration, export options in PDF, CSV, and HTTP response formats, and customizable search filters.
cd blackbird
pip install -r requirements.txt
Search by username
python blackbird.py --username username1 username2 username3Search by email
python blackbird.py --email [email protected] [email protected] [email protected]Export results to PDF
python blackbird.py --email [email protected] --pdfBlackbird uses AI-powered NER models to improve metadata extraction, identifying key entities for faster and more accurate insights.
python blackbird.py --username username1 --aiBugCod3#Python #Osint #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤8👍4🔥3⚡2
IDOR-Forge
IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
💬 Description:
IDOR Forge is a powerful and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. IDOR vulnerabilities occur when an application exposes direct references to internal objects (e.g., database keys, file paths) without proper authorization checks, allowing attackers to access unauthorized data. This tool automates the process of identifying such vulnerabilities by dynamically generating and testing payloads, analyzing responses, and reporting potential issues.
📊 Features:
⚪️ Dynamic Payload Generation
⚪️ Multi-Parameter Scanning
⚪️ Support for Multiple HTTP Methods
⚪️ Concurrent Scanning
⚪️ Rate Limiting Detection
⚪️ Customizable Test Values
⚪️ Sensitive Data Detection
⚪️ Proxy Support
⚪️ Interactive GUI Mode
⚪️ Verbose Mode
⚪️ Output Options
⚪️ Custom Headers
⚪️ Session Handling
🔼 Installation:
💻 Usage:
🖼 Interactive GUI Mode:
😸 Github
⬇️ Download
🔒
#Python #Idor #Vulnerability #Tools
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications.
IDOR Forge is a powerful and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applications. IDOR vulnerabilities occur when an application exposes direct references to internal objects (e.g., database keys, file paths) without proper authorization checks, allowing attackers to access unauthorized data. This tool automates the process of identifying such vulnerabilities by dynamically generating and testing payloads, analyzing responses, and reporting potential issues.
pip install -r requirements.txt
python IDOR-Forge.py
# CLI Basic Usage
python IDOR-Forge.py -u "https://example.com/api/resource?id=1"
# Advanced Usage
python IDOR-Forge.py -u "https://example.com/api/resource?id=1" -p -m GET --proxy "https://127.0.0.1:8080" -v -o results.csv --output-format csv
python IDOR-Forge.py -u https://example.com/resource?id=1 -p -m GET --output results.csv --output-format csv --test-values [100,200,300] --sensitive-keywords ["password", "email"]
python idor_hunter.py --interactive
BugCod3#Python #Idor #Vulnerability #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤7👍4🔥3⚡2
Extracts URLs from OSINT Archives for Security Insights.
💬
Urx is a command-line tool designed for collecting URLs from OSINT archives, such as the Wayback Machine and Common Crawl.
📊 Features:
⚪️ Fetch URLs from multiple sources (Wayback Machine, Common Crawl, OTX)
⚪️ Process multiple domains concurrently
⚪️ Filter results by file extensions or patterns
⚪️ Use presets (predefined filter sets) for convenience (like "no-image" to exclude all image-related extensions)
⚪️ Multiple output formats (plain, JSON, CSV)
⚪️ Output to console or file
⚪️ Support for reading domains from stdin (pipeline integration)
⚪️ URL testing capabilities (status checking, link extraction)
🔼 Installation:
💻 Usage:
Github
⬇️ Download
🔒
#Osint #URL #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
💬
Urx is a command-line tool designed for collecting URLs from OSINT archives, such as the Wayback Machine and Common Crawl.
📊 Features:
⚪️ Fetch URLs from multiple sources (Wayback Machine, Common Crawl, OTX)
⚪️ Process multiple domains concurrently
⚪️ Filter results by file extensions or patterns
⚪️ Use presets (predefined filter sets) for convenience (like "no-image" to exclude all image-related extensions)
⚪️ Multiple output formats (plain, JSON, CSV)
⚪️ Output to console or file
⚪️ Support for reading domains from stdin (pipeline integration)
⚪️ URL testing capabilities (status checking, link extraction)
🔼 Installation:
cd urx
cargo build --release
💻 Usage:
# Scan a single domain
urx example.com
# Scan multiple domains
urx example.com example.org
# Scan domains from a file
cat domains.txt | urx
Github
⬇️ Download
🔒
BugCod3#Osint #URL #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
❤10👍5🔥2⚡1
CF-Hero
💬
CF-Hero is a comprehensive reconnaissance tool developed to discover the real IP addresses of web applications protected by Cloudflare. It performs multi-source intelligence gathering through various methods.
📊 Feautures:
⚪️ DNS Reconnaissance
⚪️ Third-party Intelligence
⚪️ Advanced Features
🔼 Installation:
💻 Usage:
Github
⬇️ Download
🔒
#GO #Origin #IP #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
💬
CF-Hero is a comprehensive reconnaissance tool developed to discover the real IP addresses of web applications protected by Cloudflare. It performs multi-source intelligence gathering through various methods.
📊 Feautures:
⚪️ DNS Reconnaissance
⚪️ Third-party Intelligence
⚪️ Advanced Features
🔼 Installation:
go install -v github.com/musana/cf-hero/cmd/cf-hero@latest
💻 Usage:
# The most basic running command. It checks A and TXT records by default.
cat domains.txt | cf-hero
# or you can pass "f" parameter to it.
cf-hero -f domains.txt
# Use the censys parameter to include Shodan in the scan
cat domain.txt | cf-hero -censys
# Use the shodan parameter to include Shodan in the scan
cat domain.txt | cf-hero -shodan
# Use the securitytrails parameter to include Shodan in the scan
cat domain.txt | cf-hero -securitytrails
Github
⬇️ Download
🔒
BugCod3#GO #Origin #IP #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
❤7⚡3👍2🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
How to use Gobuster to brute-force directories!
$
dir: Directory scanning
-u: Target URL
-w: Path to wordlist file
⬇️ Download
#GoBuster #Tips #Tools
➖➖➖➖➖➖➖➖➖➖
📣 t.iss.one/BugCod3
📣 t.iss.one/Exploit_Forge
$
gobuster dir -u <target-URL> -w <wordlist>dir: Directory scanning
-u: Target URL
-w: Path to wordlist file
⬇️ Download
#GoBuster #Tips #Tools
➖➖➖➖➖➖➖➖➖➖
📣 t.iss.one/BugCod3
📣 t.iss.one/Exploit_Forge
🔥4❤3⚡1
HacxGPT
The cutting-edge AI developed by BlackTechX, inspired by WormGPT, designed to push the boundaries of natural language processing.
🎯 Features:
⚪️ Powerful AI Conversations: all questions will be answered in goodflow.
⚪️ Broken AI: Can do anything you want !!
⚙️ Installation:
Github
⬇️ Download
🔒
#Ai #Hackers #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
The cutting-edge AI developed by BlackTechX, inspired by WormGPT, designed to push the boundaries of natural language processing.
🎯 Features:
⚪️ Powerful AI Conversations: all questions will be answered in goodflow.
⚪️ Broken AI: Can do anything you want !!
⚙️ Installation:
sudo apt-get update; apt-get upgrade -y
sudo apt-get install git wget python3 -y
cd Hacx-GPT
pip install -r requirements.txt
python3 main.py
Github
⬇️ Download
🔒
BugCod3#Ai #Hackers #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
❤4🔥3⚡2
Trape (stable) v2.0
💬
Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowledge, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.
📊 Some benefits:
⚪️ LOCATOR OPTIMIZATION
⚪️ APPROACH
⚪️ REST API
⚪️ PROCESS HOOKS
⚪️ PUBLIC NETWORK TUNNEL
⚪️ CLICK ATTACK TO GET CREDENTIALS
⚪️ NETWORK
⚪️ PROFILE
💻 Usage:
Github
⬇️ Download
🔒
#Python #Osint #Security #Tracking #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
💬
Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowledge, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.
📊 Some benefits:
⚪️ LOCATOR OPTIMIZATION
⚪️ APPROACH
⚪️ REST API
⚪️ PROCESS HOOKS
⚪️ PUBLIC NETWORK TUNNEL
⚪️ CLICK ATTACK TO GET CREDENTIALS
⚪️ NETWORK
⚪️ PROFILE
💻 Usage:
cd trape
pip3 install -r requirements.txt
python3 trape.py -h
#Example: python3 trape.py --url https://example.com --port 8080
Github
⬇️ Download
🔒
BugCo3#Python #Osint #Security #Tracking #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥3❤2⚡1
311138#Burpsuite #Pro #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6⚡2🔥2