Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โšก๏ธA Simple Tip to Use Unlimited License in Sublime Textโšก๏ธ

1. Run HxD as Admin.
2. Open (Ctrl + O) and find "sublime_text.exe".
3. Search > Replace (Ctrl + R) > Hex values
4. Enter the following: Search for: 80 79 05 00 0F 94 C2 -> Replace with C6 41 05 01 B2 00 90 Search direction: All -> Replace All (only 1 instance found for me).
5. Save (Ctrl + S) then exit HxD.
6. Run Sublime Text.
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘7โค5๐Ÿ”ฅ2
โค5๐Ÿ‘1
๐Ÿ”–Google #Dorks for #XSS

site:*.host.com ext:asp
site:*.host.com ext:jsp
site:*.host.com ext:aspx
site:*.host.com ext:jspx
site:*.host.com ext:do
site:*.host.com ext:action
site:*.host.com ext:php


๐Ÿ’กTip: These extensions are crucial; you can identify them from the results of crawled URLs and use them to search for vulnerabilities.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค9๐Ÿ‘4๐Ÿ”ฅ1
CVE-2024-52301: Improper Input Validation in Laravel Framework, 8.7 ratingโ—๏ธ

The vulnerability allows an attacker to change environment using a special crafted query string.

More then 830k instances at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/CDJgv
๐Ÿ‘‰ Dork: http.headers.set_cookie:"laravel_session="

Vendor's advisory: https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h
โค3๐Ÿ‘3๐Ÿ”ฅ1
Book_of_tips_by_aditya_shende.pdf
1.6 MB
๐Ÿ‘5โค2๐Ÿ”ฅ1๐Ÿ—ฟ1
Hey everyone! ๐ŸŽ‰

A big, warm welcome to all our new members! ๐Ÿ’• And to our amazing long-time supporters, thank you for sticking around and making this community what it is today! ๐Ÿ™Œ

If youโ€™ve been finding value in the bug bounty updates, cybersecurity tips, and job opportunities I share, Iโ€™d truly appreciate your support. โญ You can boost or give a star to
Brut Securityโ€”it keeps me motivated to keep delivering the best content for you all! ๐Ÿ’ป๐Ÿ”’

Thanks for being such an incredible community. Your encouragement means everything!
โค๏ธ ๐Ÿ’Ÿ
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค9๐Ÿ”ฅ2
๐Ÿ”– Hereโ€™s a list of 10 Github dorks to find secret and access tokens:

"https://target.com" send_keys
"https://target.com" password
"https://target.com" api_key
"https://target.com" apikey
"https://target.com" jira_password
"https://target.com" root_password
"https://target.com" access_token
"https://target.com" config
"https://target.com" client_secret
"https://target.com" user auth
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘13๐Ÿ”ฅ6โค2
Itโ€™s been a while! Howโ€™s everyone doing? Let me know what resources you need in cybersecurity. Please note, no requests for pirated material.
๐Ÿ”ฅ7๐Ÿ‘1
โ˜„๏ธGoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.

โš ๏ธgithub.com/revoltsecurities/googledorker
Please open Telegram to view this post
VIEW IN TELEGRAM
1๐Ÿ‘12โค6๐Ÿ”ฅ1
Add the file wp-config.php.txt to your wordlist, and you might discover some juicy data.
๐Ÿ”ฅ13โค3๐Ÿ‘1
โ–ถ๏ธAll the deals for InfoSec related software/tools this Black Friday!
https://github.com/0x90n/InfoSec-Black-Friday
https://saasfridaydeals.com/
https://indiegoodies.com/blackfriday
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ4
๐Ÿ”–AWS penetration testing: A step-by-step Guide for Beginners

โ˜„๏ธhttps://www.hackthebox.com/blog/aws-pentesting-guide
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8๐Ÿ‘1
BGPView for Reconnaissance

- Get ASN Information

curl -s "https://api.bgpview.io/asn/AS12345" | jq


- Enumerate IP Prefixes for an ASN


curl -s "https://api.bgpview.io/asn/AS12345/prefixes" | jq '.data.ipv4_prefixes[] | .prefix'


- Retrieve IP Address Details


curl -s "https://api.bgpview.io/ip/8.8.8.8" | jq


- Search ASN, IP, or Domain Together


curl -s "https://api.bgpview.io/search?query=example.com" | jq '.data'


- Upstreams


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq


- Upstreams [ IPv4 ]


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq '.data.ipv4_upstreams[] | {asn, name, description, country: .country_code}'


- Upstreams [ IPv6 ]


curl -s "https://api.bgpview.io/asn/AS12345/upstreams" | jq '.data.ipv6_upstreams[] | {asn, name, description, country: .country_code}'


- All Peers


curl -s "https://api.bgpview.io/asn/AS12345/peers" | jq '[.data.ipv4_peers[], .data.ipv6_peers[]] | map({asn, name, description, country: .country_code})'


- Extract ASN Prefixes with Peer Details


curl -s "https://api.bgpview.io/asn/AS12345/peers" | jq '[.data.ipv4_peers[], .data.ipv6_peers[]] | map({asn, name, description, country: .country_code, prefix: .prefix})'


- Downstreams


curl -s "https://api.bgpview.io/asn/AS12345/downstreams" | jq


- Subdomain Enumeration from ASN


curl -s "https://api.bgpview.io/asn/AS12345/prefixes"
dig -x $prefix
done


- Query ASN by Organization Name


curl -s "https://api.bgpview.io/search?query=google" | jq '.data.asns[] | {asn, name, description}'



ยฉYasin
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘12๐Ÿณ4โค2
BUG BOUNTY
๐Ÿ‘13โค1
CVE-2024-52052, -053, -054, -055, -056: Multiple vulnerabilitites in Wowza Streaming Engine, 5.1 - 9.4 rating ๐Ÿ”ฅ

Five recent vulnerabilities we almost missed. RCE, stored XSS, file read, file write, and folder deletion - vulnerabilities for every taste!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/8BudC
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:3641ed4d68a0362f1ef45069584a71b0940acfcdb6abf8c13b8fc29837160a81 OR http.headers.server:"WowzaStreamingEngine"

Read more: https://www.rapid7.com/blog/post/2024/11/20/multiple-vulnerabilities-in-wowza-streaming-engine-fixed/
๐Ÿ‘1
A bug bounty hunting journey.pdf
1.3 MB
A bug bounty hunting journey
๐Ÿ‘2โค1
Advanced Web Hacking.pdf
10.2 MB
NotSoSecure Advanced Web Hacking
๐Ÿ”ฅ11โค2๐Ÿ‘2