Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
๐Ÿ—ฟ13๐Ÿ”ฅ7โค4๐Ÿ‘4
๐Ÿณ6๐Ÿ‘3
โœจIn the world of cybersecurity, there is no mercyโ€”only the relentless pursuit of vulnerabilities. Hunt with precision, adapt with resilience, and remember: itโ€™s hunt or be hunted. For those of us climbing to the top of the food chain, there can be no mercyโ€”only one rule: hunt or be hunted.โœจ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10๐Ÿ”ฅ4๐Ÿ‘1
๐Ÿ”– Dnsbruter - A powerful tool for active subdomain enumeration and discovery.

โœจ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.

๐Ÿ”— https://github.com/RevoltSecurities/Dnsbruter/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ12๐Ÿ‘4
โœจ CRLF Injection Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘11โค3
SQL injection.pdf
599.4 KB
๐Ÿ”ฅ5๐Ÿ‘1
CVE-2024-38819: Path Traversal in Spring Framework, 7.5 ratingโ—๏ธ

Another Path Traversal vulnerability in the Spring framework. This time there is even a PoC!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/AzCtg
๐Ÿ‘‰ Dork: tag.name:"spring"

Vendor's advisory: https://spring.io/security/cve-2024-38819
๐Ÿ‘6โค3
โšก๏ธSSRFUtility - SSRF Exploitation Tool
๐Ÿ”— https://ssrf.cvssadvisor.com/
โค15
๐Ÿคก๐Ÿคก
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿณ13๐Ÿ—ฟ8๐Ÿ‘3๐Ÿคจ2
๐Ÿ”– IVRE - The Ultimate Network Reconnaissance Framework

โœจ Key Features:
IVRE allows you to build your self-hosted, fully controlled alternatives to tools like Shodan, ZoomEye, Censys, and GreyNoise.

- Run your Passive DNS service
- Create tailor-made EASM tools
- Collect and analyze network intelligence using Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, and more!

Perfect for security researchers and network analysts.

๐Ÿ”— Get the tool here: https://github.com/ivre/ivre
๐Ÿ‘4
๐ŸŽ„ Wrapping Up an Amazing Year Together! ๐ŸŽ„

Hey Brut Fam! ๐Ÿš€As 2024 comes to a close, I want to thank each and every one of you for being part of this amazing journey. This year, weโ€™ve shared 1,500+ resources, learned, grown, and built an incredible community of 8,000+ members. Your support and engagement have made Brut Security what it is today. ๐Ÿ’ช

If youโ€™ve found value in the resources Iโ€™ve shared and want to support me in continuing this journey, you can now buy me a coffee โ˜• here:

โ˜„๏ธ https://buymeacoffee.com/saumadip

Itโ€™s not mandatoryโ€”just a small way to show appreciation if you feel like it.

Wishing you all a early very Merry Christmas ๐ŸŽ… and a Happy New Year ๐ŸŽ‰ filled with learning, growth, and success! Hereโ€™s to an even bigger and better 2025! ๐Ÿš€

Stay curious, stay secure. ๐Ÿ”
Please open Telegram to view this post
VIEW IN TELEGRAM
โค3๐Ÿ‘3๐Ÿ‘จโ€๐Ÿ’ป2๐Ÿ”ฅ1๐Ÿณ1
Brut Security pinned ยซ๐ŸŽ„ Wrapping Up an Amazing Year Together! ๐ŸŽ„ Hey Brut Fam! ๐Ÿš€As 2024 comes to a close, I want to thank each and every one of you for being part of this amazing journey. This year, weโ€™ve shared 1,500+ resources, learned, grown, and built an incredible communityโ€ฆยป
CVE-2024-50379, -54677: RCE and DoS in Apache Tomcat, 5.3 - 9.8 rating ๐Ÿ”ฅ

New vulnerabilities allow attackers to upload and execute malicious files disguised as legitimate ones, as well as cause OutOfMemoryError to shut down the server.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/WHRGO
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:64a3170a912786e9eece7e347b58f36471cb9d0bc790697b216c61050e6b1f08 OR http.headers.server:"Apache-Coyote"

Read more: https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r
โค2
๐Ÿ”– AnalyticsRelationships - Discover related domains and subdomains through Google Analytics IDs!

โœจ How it works:
- Extract Google Analytics IDs from a webpage.
- Query services like BuiltWith and HackerTarget to find domains and subdomains associated with those IDs.
- A simple yet effective tool for OSINT and reconnaissance!

๐Ÿ”— Get the tool here:
https://github.com/Josue87/AnalyticsRelationships
๐Ÿ‘1๐Ÿ”ฅ1
๐Ÿ“– The Art of Auditing

โœจ What it offers:
The first community-driven resource consolidating thousands of hours of expertise from top industry professionals. Ideal for security auditors, researchers, and enthusiasts, this comprehensive guide is a must-read.

๐Ÿ”— Explore it here:
https://web3-sec.gitbook.io/art-of-auditing
โค5