BugCod3
6.37K subscribers
306 photos
5 videos
7 files
406 links
ɪɴ ᴛʜᴇ ɴᴀᴍᴇ ᴏꜰ ɢᴏᴅ

[ BugCod3 ] — From Shadows To Shells ⚡️

🕶 Hacking | 🐞 Bug Bounty | 🔐 Security Tools
⚔️ Learn • Hunt • Dominate

🌐 Group: T.me/BugCod3GP
📂 Topic: T.me/BugCod3Topic

🤖 Contact: T.me/BugCod3BOT
📧 Email: BugCod3@protonmail.com
Download Telegram
AndroRAT

🚫 Disclaimer : This software is meant for educational purposes only. I'm not responsible for any malicious use of the app.

AndroRAT is a tool designed to give the control of the android system remotely and retrieve informations from it. Androrat is a client/server application developed in Java Android for the client side and the Server is in Python.

😸 Github

#Python #Java #Android #Rat

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍1
888 Rat

Download

#Rat #Windows #Android

👤 T.me/MRvirusIRBOT
📢 T.me/BugCod3
😢1
😈 AhMyth Android Rat 😈

⚠️ Use it on virtual machine ⚠️

📝
It consists of two parts :
Server side : desktop application based on electron framework (control panel)
Client side : android application (backdoor)

⬇️ Download
😸 Github

🔒
BugCod3


#Android #Rat

👤 T.me/BugCod3BOT
📢 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
3❤‍🔥111
Mali GPU Kernel LPE

Android 14 kernel exploit for Pixel7/8 Pro

This article provides an in-depth analysis of two kernel vulnerabilities within the Mali GPU, reachable from the default application sandbox, which I independently identified and reported to Google. It includes a kernel exploit that achieves arbitrary kernel r/w capabilities. Consequently, it disables SELinux and elevates privileges to root on Google Pixel 7 and 8 Pro models running the following Android 14 versions:

Pixel 8 Pro: google/husky/husky:14/UD1A.231105.004/11010374:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231105.003/11010452:user/release-keys
Pixel 7 Pro: google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys
Pixel 7: google/panther/panther:14/UP1A.231105.003/11010452:user/release-keys

Vulnerabilities:
This exploit leverages two vulnerabilities: an integer overflow resulting from an incomplete patch in the gpu_pixel_handle_buffer_liveness_update_ioctl ioctl command, and an information leak within the timeline stream message buffers.

Github

⬇️ Download
🔓 BugCod3

#C #Exploit #Android #Kernel #Pixel

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
11👍1🔥1
🥬 BADUnboxing 🥬

💬
BADUnboxing is an automated Android unpacker. It works by locating and decompiling code inside the APK that is relevant to the unpacking process.
Once Bad Unboxing detects packing, it automatically generates a new Java application based on the decompiled code. This new application can be executed to drop dynamic unpacked artifacts to disk.

📊 Contribute:
⚪️ Make a pull request
⚪️ Add a new Unpacking Module
⚪️ Add an Example to our Wiki
⚪️ Report an error/issue
⚪️ Suggest an improvement
⚪️ Share with others or give a star!

😸 Github

⬇️ Download
🔒 BugCod3

#JAVA #Unpacker #Android

👤 T.me/BugCod3BOT
📣 T.me/BugCod3
Please open Telegram to view this post
VIEW IN TELEGRAM
42🔥2👍1