Brut Security
14.8K subscribers
946 photos
75 videos
289 files
990 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: [email protected]
Download Telegram
Easily Identify SSRF on a Website Using a Single Command*

This approach leverages a combination of powerful tools:

- Findomain: Gathers all subdomains related to the target site.
- Httpx: Verifies the accessibility of these domains.
- Getallurls (gau): Extracts URLs from sources like AlienVault OTX, Wayback Machine, and Common Crawl.
- Qsreplace: Substitutes query string values in URLs with a user-specified value.

Steps:
1. Install the mentioned tools.
2. Run the following command:
   findomain -t DOMAIN -q | httpx -silent -threads 1000 | gau | grep "=" | qsreplace your.burpcollaborator.net  

Replace your.burpcollaborator.net with your server or Burp Collaborator address.

This method streamlines the search for SSRF vulnerabilities effectively.

#bugbounty #web #ssrf #cybersecurity #bugbountytips
Credit: Aman Dara
👍10🗿9🤨21
🚨403 Bypass list by @jhaddix Url Manipulation Methods Top 77 ways to bypass access control🚨
👍108
CVE-2025-0282, -0283: Two vulnerabilities in Ivanti Connect Secure, 7.0 - 9.0 rating 🔥

Stack-based buffer overflow caused potential RCE and privilege escalation.

Search at Netlas.io:
👉 Link: https://nt.ls/WMQwN
👉 Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283?language=en_US
👍4
Uncover Hidden Parameters & Spot XSS in One Go
19👍3
🔥CVE-2024-12828 POC. SafeUser Required
🔥31
Super Blind SQL Injection- $20000 bounty | Thousands of targets still vulnerable” by priyanshu shakya https://medium.com/@pranshux0x/super-blind-sql-injection-20000-bounty-thousands-of-targets-still-vulnerable-f9b013765448
👍8🔥5
🔥MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

https://github.com/robotshell/magicRecon
👍5
Google Dorks - Cloud Storage: site:https://s3.amazonaws.com "target[.]com" site:https://blob.core.windows.net "target[.]com" site:https://googleapis.com "target[.]com" site:https://drive.google.com "target[.]com"

👉Find buckets and sensitive data.
Combine:

site:
https://s3.amazonaws.com | site:https://blob.core.windows.net | site:https://googleapis.com | site:https://drive.google.com "target[.]com"

Add something to narrow the results: "confidential” “privileged" “not for public release”

Credit- Mike Takahashi
🔥9👍7
This media is not supported in your browser
VIEW IN TELEGRAM
OffSec Train 😂😂
1🗿19👨‍💻4🐳2🔥1
Ethical Hacking Study Guide - 2025
Download -
https://topmate.io/saumadip/1391531
🗿4
Just Flexing, what everyone have :P
🔥9👍5
Brut Security
Ethical Hacking Study Guide - 2025 Download -https://topmate.io/saumadip/1391531
Sorry to close the free download for everyone, many spammers are trying to spam by random name, email and phone number. I have to add 1 INR / 0.012$ to avoid spam on my mail. Sorry for the inconvenience!
🗿2
🚨 Top 50 Google Dorks for Bug Bounty Hunters!
10
Scan for WordPress, Joomla, Drupal and Moodle bugs via CMSmap.
6👍6
Ethical Hacking Study Guide - 2025
Download -https://topmate.io/saumadip/1391531
👍1