Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Exploit AWS metadata & user data access in Bug Bounty & CTF challenges!

πŸ”— https://github.com/Lu3ky13/Unauthorized-Access-to-Metadata-and-User-Data-like-CTF

#BugBounty #bugbountytip
πŸ‘9
πŸ”–Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities

βœ…
https://github.com/rootDR/ex-param
❀7πŸ‘3πŸ—Ώ1
JavaScript for Hackers.pdf
987.7 KB
JavaScript for Hackers by JOAS ANTONIO
πŸ‘6❀2
This media is not supported in your browser
VIEW IN TELEGRAM
β˜„οΈParamScan is a simple Chrome extension for web security enthusiasts and pen testers. It helps you find URL parameters in a webpage's source code and check if any of them are reflected on the page. This is super useful for spotting potential XSS vulnerabilities and other security issues.

πŸ”–https://github.com/ch1y0w0/ParamScan
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯14πŸ‘6❀5🀨1
β˜„οΈURLFinder is a high-speed, passive URL discovery tool designed to simplify and accelerate web asset discovery, ideal for penetration testers, security researchers, and developers looking to gather URLs without active scanning.

⚑️https://github.com/projectdiscovery/urlfinder
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘12πŸ”₯4🐳2
β˜„οΈ TLDFinder - A focused tool designed for discovering private TLDs, making it an essential resource for security researchers. Simplify your exploration with precision and efficiency!

⚠️https://github.com/projectdiscovery/tldfinder
Please open Telegram to view this post
VIEW IN TELEGRAM
❀6πŸ”₯4πŸ‘1
πŸ”Morpheus IOC Scanner - A powerful tool for detecting and analyzing suspicious files, including ransomware and Indicators of Compromise (IOCs). With custom-built rules and advanced integrations, it offers detailed insights to identify sophisticated threats and bolster your defense against cyber risks.

πŸ”—https://github.com/phantom0004/morpheus_IOC_scanner
πŸ‘20πŸ”₯5
Do give reaction on the post guys, it helped me to stay motivated and to post content like this.πŸ₯Έ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘41❀5πŸ”₯2
CVE-2024-8672: Code Injection in Widget Options WordPress Plugin, 9.9 rating πŸ”₯

The vulnerability allows an attacker to enter data that is transmitted without proper filtering. This could potentially lead to remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/xOEZp
πŸ‘‰ Dork: http.body:"plugins/widget-options"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/widget-options/widget-options-the-1-wordpress-widget-block-control-plugin-407-authenticated-contributor-remote-code-execution
❀5πŸ‘5
πŸ’–πŸ¦„ FAVICORN - A versatile tool to search websites using favicons!

πŸ”How it works:
Simply input a favicon, and Favicorn fetches search result links across 10+ platforms, making it a handy tool for researchers and testers alike.

πŸ”—
https://github.com/sharsil/favicorn
πŸ‘14❀1
https://x.com/wtf_brut/status/1863893133379150234
Do Follow Me On
🐣
Have Shared Almost 2000+ Bug Bounty Tips.
πŸ˜±πŸ‡·πŸ‡ΊπŸ‡ΊπŸ‡Έ
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘7❀2
πŸŽ‰ Unlock That 20% Pro Labs Discount! πŸŽ‰

Alright, hackers, here’s the deal: Hack The Box Pro Labs just got REAL! πŸ’₯ If you’re ready to leave the beginner stuff in the dust and dive into legit red team missions, I’ve got an exclusive 20% off waiting for you. But here’s the catch – only 100 of you can snag this deal. πŸ‘€

πŸ’₯ Use code:
brutsecurityprolabs20

at checkout for 20% off the annual Pro Labs subscription! It’s high-level hacking in real enterprise environments. Ready to go pro? πŸ•ΆοΈ

πŸ”—Checkout Here - https://hackthebox.com/hacker/pro-labs

Jump on this quick – or you might miss the boat. πŸš€πŸ’¨ #HackTheBox #LevelUp #ProLabs
πŸ‘5❀1
Get HoF & Thanks by reporting issues: https://cyfare.net/apps/vdp/
❀1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ” gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.

πŸ”—https://github.com/gwen001/gitlab-subdomains
❀7πŸ‘2
⚑️Zzl - A powerful reconnaissance tool for subdomain discovery through SSL certificates.

✨Key Feature:
Zzl scans IP ranges and extracts subdomains from SSL certificates, making it an essential tool for thorough reconnaissance and security research.

β˜„οΈhttps://github.com/DEMON1A/zzl
Please open Telegram to view this post
VIEW IN TELEGRAM
1❀13
⭐Find open redirect vulnerabilities with gf
By @ofjaaah

🚫Here’s a cool one-liner to help find open redirect vulnerabilities. All you need is to provide the target domain name:

echo "tesla.com" | waybackurls | httpx -silent -timeout 2 -threads 100 | gf redirect | anew


πŸ”΅This is what the command does in detail:
1. Collect all URLs of the target domain from the Wayback Machine
2. Attempt to download all the URLs quickly in 100 parallel threads in order to identify working URLs
3. For all working URLs, match any potentially vulnerable parameters to open redirect
4. Print out only unique, potentially vulnerable URLs
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ‘4πŸ”₯2
It's a request to everyone, do give reaction on the post, it helped me to stay motivated and to post content like this.πŸ₯Έ

For queries do reach me out from channel bio. Thanks Everyone!
🚫
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘36❀11πŸ”₯8