Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
🐳6πŸ‘3
✨In the world of cybersecurity, there is no mercyβ€”only the relentless pursuit of vulnerabilities. Hunt with precision, adapt with resilience, and remember: it’s hunt or be hunted. For those of us climbing to the top of the food chain, there can be no mercyβ€”only one rule: hunt or be hunted.✨
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯4πŸ‘1
πŸ”– Dnsbruter - A powerful tool for active subdomain enumeration and discovery.

✨ Features:
Dnsbruter uses DNS resolution to bruteforce and identify subdomains efficiently. Its multithreading capability allows users to control concurrency for faster and more effective results. Perfect for researchers and pen testers targeting domain reconnaissance.

πŸ”— https://github.com/RevoltSecurities/Dnsbruter/
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯12πŸ‘4
✨ CRLF Injection Tips
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘11❀3
SQL injection.pdf
599.4 KB
πŸ”₯5πŸ‘1
CVE-2024-38819: Path Traversal in Spring Framework, 7.5 rating❗️

Another Path Traversal vulnerability in the Spring framework. This time there is even a PoC!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/AzCtg
πŸ‘‰ Dork: tag.name:"spring"

Vendor's advisory: https://spring.io/security/cve-2024-38819
πŸ‘6❀3
⚑️SSRFUtility - SSRF Exploitation Tool
πŸ”— https://ssrf.cvssadvisor.com/
❀15
🀑🀑
Please open Telegram to view this post
VIEW IN TELEGRAM
🐳13πŸ—Ώ8πŸ‘3🀨2
πŸ”– IVRE - The Ultimate Network Reconnaissance Framework

✨ Key Features:
IVRE allows you to build your self-hosted, fully controlled alternatives to tools like Shodan, ZoomEye, Censys, and GreyNoise.

- Run your Passive DNS service
- Create tailor-made EASM tools
- Collect and analyze network intelligence using Nmap, Masscan, Zeek, p0f, ProjectDiscovery tools, and more!

Perfect for security researchers and network analysts.

πŸ”— Get the tool here: https://github.com/ivre/ivre
πŸ‘4
πŸŽ„ Wrapping Up an Amazing Year Together! πŸŽ„

Hey Brut Fam! πŸš€As 2024 comes to a close, I want to thank each and every one of you for being part of this amazing journey. This year, we’ve shared 1,500+ resources, learned, grown, and built an incredible community of 8,000+ members. Your support and engagement have made Brut Security what it is today. πŸ’ͺ

If you’ve found value in the resources I’ve shared and want to support me in continuing this journey, you can now buy me a coffee β˜• here:

β˜„οΈ https://buymeacoffee.com/saumadip

It’s not mandatoryβ€”just a small way to show appreciation if you feel like it.

Wishing you all a early very Merry Christmas πŸŽ… and a Happy New Year πŸŽ‰ filled with learning, growth, and success! Here’s to an even bigger and better 2025! πŸš€

Stay curious, stay secure. πŸ”
Please open Telegram to view this post
VIEW IN TELEGRAM
❀3πŸ‘3πŸ‘¨β€πŸ’»2πŸ”₯1🐳1
Brut Security pinned Β«πŸŽ„ Wrapping Up an Amazing Year Together! πŸŽ„ Hey Brut Fam! πŸš€As 2024 comes to a close, I want to thank each and every one of you for being part of this amazing journey. This year, we’ve shared 1,500+ resources, learned, grown, and built an incredible community…»
CVE-2024-50379, -54677: RCE and DoS in Apache Tomcat, 5.3 - 9.8 rating πŸ”₯

New vulnerabilities allow attackers to upload and execute malicious files disguised as legitimate ones, as well as cause OutOfMemoryError to shut down the server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/WHRGO
πŸ‘‰ Dork: http.favicon.hash_sha256:64a3170a912786e9eece7e347b58f36471cb9d0bc790697b216c61050e6b1f08 OR http.headers.server:"Apache-Coyote"

Read more: https://lists.apache.org/thread/y6lj6q1xnp822g6ro70tn19sgtjmr80r
❀2
πŸ”– AnalyticsRelationships - Discover related domains and subdomains through Google Analytics IDs!

✨ How it works:
- Extract Google Analytics IDs from a webpage.
- Query services like BuiltWith and HackerTarget to find domains and subdomains associated with those IDs.
- A simple yet effective tool for OSINT and reconnaissance!

πŸ”— Get the tool here:
https://github.com/Josue87/AnalyticsRelationships
πŸ‘1πŸ”₯1
πŸ“– The Art of Auditing

✨ What it offers:
The first community-driven resource consolidating thousands of hours of expertise from top industry professionals. Ideal for security auditors, researchers, and enthusiasts, this comprehensive guide is a must-read.

πŸ”— Explore it here:
https://web3-sec.gitbook.io/art-of-auditing
❀5
🚨CVE-2024-50379: Apache Tomcat - RCE via write-enabled default servlet.

πŸ‘‡Dorks
HUNTER:/
product.name="Apache Tomcat"
FOFA:product="APACHE-Tomcat"
SHODAN:product:"Apache Tomcat"

πŸ“°
https://lnkd.in/g_nmV2MM
❀4
🚨 [CVE-2024-56145] Exploit released! 🚨

Details, PoC, and setup instructions:
πŸ”— https://github.com/Chocapikk/CVE-2024-56145

Learn more:
πŸ“– https://www.assetnote.io/resources/research/how-an-obscure-php-footgun-led-to-rce-in-craft-cms

#bugbountytips #BugBounty
πŸ‘8