cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

꧁༺༒༻꧂ᴾᴿᴼシCLOUDFLARE BUG HOSTᴳᵒᵈ乡꧁༺༒༻꧂

Ok please donate $1 dollars 💵 🙏 For deeper web development and bug Host hunting for your isp free internet access https://www.paypal.me/silokingwood Support us and we will support 💙you

Mostrar más
El país no está especificadoEl idioma no está especificadoLa categoría no está especificada
2 301
Suscriptores
Sin datos24 horas
Sin datos7 días
Sin datos30 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

💥Welcome to cloudflare enjoy and respect or rules everyone is welcome here 💥 🛃Welcome Members No spamming 😡 No copyright 😡 No scamming 😡 No channel link 😡 No re post.💥 😡 No Violence 💥 😡 No selling 😡😡 No file cracking 😡 Don't inbox admin if you not serious about doing business 💯👍 Please to respect the rules 💥🤝 Support app country worldwide 🏳‍⚧🇺🇳🇦🇫🇦🇽🇦🇱🇩🇿🇦🇸🇦🇩🇦🇴🇦🇮🇦🇶🇦🇬🇦🇷🇦🇲🇦🇼🇦🇺🇦🇹🇦🇿🇧🇸🇧🇭🇧🇩🇧🇧🇧🇾🇧🇪🇧🇿🇧🇯🇧🇲🇧🇹🇧🇴🇧🇦🇧🇼🇧🇷🇻🇬🇧🇳🇧🇬🇧🇫🇧🇮🇰🇭🇨🇲🇨🇦🇮🇨🇨🇻🇧🇶🇰🇾🇨🇫🇹🇩🇮🇴🇨🇱🇨🇳🇨🇽🇨🇨🇨🇴🇰🇲🇨🇬🇨🇩🇨🇰🇨🇷🇨🇮🇭🇷🇨🇺🇨🇼🇨🇾🇨🇿🇩🇰🇩🇯🇩🇲🇩🇴🇪🇨🇪🇬🇸🇻🇬🇶🇪🇷🇪🇪🇸🇿🇪🇹🇪🇺🇫🇰🇫🇴🇫🇯🇫🇮🇫🇷🇬🇫🇵🇫🇹🇫🇬🇦🇬🇲🇬🇪🇩🇪🇬🇭🇬🇮🇬🇷🇬🇱🇬🇩🇬🇵🇬🇺🇬🇹🇬🇬🇬🇳🇬🇼🇬🇾🇭🇹🇭🇳🇭🇰🇭🇺🇮🇸🇮🇳🇮🇩🇮🇷🇮🇶🇮🇲🇮🇱🇮🇹🇯🇲🇯🇵🎌🇯🇪🇯🇴🇰🇿🇰🇪🇰🇮🇽🇰🇰🇼🇰🇬🇱🇦🇱🇻🇱🇧🇱🇸🇱🇷🇱🇾🇱🇮🇱🇹🇱🇺🇲🇴🇲🇬🇲🇼🇲🇾🇲🇻🇲🇱🇲🇹🇲🇭🇲🇶🇲🇷🇲🇺🇾🇹🇲🇽🇫🇲🇲🇩🇲🇨🇲🇳🇲🇪🇲🇸🇲🇦🇲🇿🇲🇲🇳🇦🇳🇷🇳🇵🇳🇱🇳🇨🇳🇿🇳🇮🇳🇪🇳🇬🇳🇺🇳🇫🇰🇵🇲🇰🇲🇵🇳🇴🇴🇲🇵🇰🇵🇼🇵🇸🇵🇦🇵🇬🇵🇾🇵🇪🇵🇭🇵🇳🇵🇱🇵🇹🇵🇷🇶🇦🇷🇪🇷🇴🇷🇺🇷🇼🇼🇸🇸🇲🇸🇹🇸🇦🇸🇳🇷🇸🇸🇨🇸🇱🇸🇬🇸🇽🇸🇰🇸🇮🇬🇸🇸🇧🇸🇴🇿🇦🇰🇷🇸🇸🇪🇸🇱🇰🇧🇱🇸🇭🇰🇳🇱🇨🇵🇲🇻🇨🇸🇩🇸🇷🇸🇪🇨🇭🇸🇾🇹🇼🇹🇯🇹🇿🇹🇭🇹🇱🇹🇬🇹🇰🇹🇴🇹🇹🇹🇳🇹🇷🇹🇲🇹🇨🇹🇻🇺🇬🇺🇦🇦🇪🇬🇧🏴󠁧󠁢󠁥󠁮󠁧󠁿🏴󠁧󠁢󠁳󠁣󠁴󠁿🏴󠁧󠁢󠁷󠁬󠁳󠁿🇺🇸🇺🇾🇻🇮🇺🇿🇻🇺🇻🇦🇻🇪🇻🇳🇼🇫🇪🇭🇾🇪🇿🇲🇿🇼 @Digicelgroup_bot 🤝💥👆👆👆 Now all user can send there broke url to us 👆💯 Ahora todos los usuarios pueden enviarnos la URL rota 👆💯 https://t.me/cloudflaremsters https://youtu.be/JV6XVeh68v8
Mostrar todo...
Hey there İNTERNETCI, and welcome to ꧁༺༒༻꧂ᴾᴿᴼシCLOUDFLARE BUG HOSTᴳᵒᵈ乡꧁༺༒༻꧂! How are you?
Mostrar todo...
If you're interested and will to pay for what you need we are glad to help you but we do business with good ppl
Mostrar todo...
Example: CONNECT ipssh: portssh @query.com HTTP/1.0[crlf][crlf] GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] Blue = connection Pink = Query Method = GET Red = BUG Protocol version = HTTP/1.1 *Query is usually the same as the bug itself * REPLACE Replace is replacing a specific response in order to connect with the bias current and most often, namely replacing it to 200 OK Example: Response Found: 302 FOUND Replace to: 200 OK Example 2: Response Found 400 Bad Request Replace to: 200 OK Payload There are many types of payload, Inject start time may not appear using payload. But because security is tight then we also need a payload. Example: - Host: bug.com - X-Online-Host: bug.com - X-Forward-Host: bug.com - X-Forwarded-For: bug.com - Connection: Keep-Alive or Close - Proxy-Connection: Keep-Alive or Close - Content-Type: * / * - Content-Length: 0 or 1024 or another one - And many more Proxy and Port The use of proxy and proxy port could use the original operator. Proxies can also use public or Squid Proxy from VPS with port 80/8000/8080/3128 / etc mouthful can be invited to the free internet learn guys ☝️☝️👆👆
Mostrar todo...
HTTP/S Request Methods There are a lot of methods but the most often used is: - GET - HEAD - POST - DELETE - TRACE - CONNECT - etc DEFINITION OF TERMS: [host] = 188.100.100.123 Destination host [port] = 22 Destination port [host_port] = 188.100.100.123:22 Destination host and port, seperated by colon : [ssh] = 188.100.100.123:22 SSH server ip and port that you set at settings [protocol] = HTTP\1.0 or HTTP\1.1 HTTP protocol version [netData] = CONNECT [host_port] [protocol] Short form of three keywords [cr] = \r or Carriage Return (cr), U+000D [lf] = \n or Line Feed (lf), U+000A [crlf] = \r\n or Carriage Return (cr) (U+000D) followed by Line Feed (lf) (U+000A) [lfcr] = \n\r LF (U+000A) followed by CR (U+000D) [crlf][crlf] = \r\n\r\n To indicate the end of HTTP header BUG = the bug host (ex. bug.com) Line Feed means moving one line forward. The code is \n Carriage Return means moving the cursor to the beginning of the line. The code is \r. Protocol Version There are three: - HTTP/2.0 - HTTP/1.1 - HTTP/1.0 * HTTP/1.1 usually in BUG while HTTP/1.0 the protocol to SSH. Depending on the type * Connection Type There are two: [realData] = connection at the end to have a 2 LINE or [crlf][crlf] For example, if you're using SSH = CONNECT ipssh: portssh HTTP/1.0[crlf][crlf] Depending on the type of connection [NetData] = connection at the end that DO NOT HAVE LINE. And usually used to add other payloads such as "Host: bug.com, Connection: Keep-Alive", etc. For example, if you're using "SSH = CONNECT ipssh: portssh HTTP/1.0" and if it was followed by the BUG (Host: bug.com) then: CONNECT ipssh: portssh HTTP/1.0[crlf]Host: bug.com[crlf][crlf] Depending on the type of CONNECTION, and if in follow BUG then added 1 new LINE([crlf]) then the followed BUG ends in 2 LINE([crlf][crlf]) Injection Method Injection method is divided into 5 types: - Normal - Front Inject - Back Inject - Front Query - Back Query Injection Method Defined Normal Means that the connection is placed at the beginning and then followed by the BUG (Host: bug.com) payload with 1 LINE [crlf] Example 1: [netData] [crlf] Host: bug.com [crlf][crlf] Example 2: CONNECT ipssh: portssh HTTP/1.0 [crlf] Host: bug.com [crlf][crlf] GREEN = SSH connections consist of METHOD ip and port with protocol version HTTP / 1.0 ORANGE = Bug Front Inject FRONT means the BUG was placed in front of the next follow connection (ssh / vpn / direct it depends). Example 1: GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] [realData] Example 2: GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] CONNECT ipssh: portssh HTTP/1.0[crlf][crlf] Method = GET Red = BUG Protocol version = HTTP/1.1 Pink = connection Back Inject BACK means behind the first connection (ssh / vpn / direct dependent) then followed by the BUG. Example 1: [realData] GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] Example 2: CONNECT ipssh: portssh HTTP/1.0[crlf][crlf]GETYou do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf] Host: bug.com [crlf][crlf] Blue = connection Method = GET Red = Bug Protocol version = HTTP/1.1 Front Query This means that there are BUG/s that slipped in front of the connection later in the end. Example: CONNECT query.com@ ipssh: portssh HTTP/1.0[crlf][crlf] GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] or CONNECT bug.com@ ipssh: portssh HTTP/1.0[crlf][crlf] GET You do not have permission to view the full content of this post. Log in or register now. HTTP/1.1 [crlf]Host: bug.com [crlf][crlf] Blue = connection Green = Query Method = GET Red = Bug Protocol version = HTTP/1.1 * Query is usually the same as the BUG itself * Back Query This means that the BUG tucked itself behind a connection @.
Mostrar todo...
Bro come inbox I will pay you
Mostrar todo...
POST /infrastructure/workspaces/{workspace}/environments/{environment}
Mostrar todo...
Admin help me Nginx payload
Mostrar todo...