Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Price Tampering & Store XSS Bug poc _ Price Manipulation _ CodePrefer ---> https://t.iss.one/brutsecurity_poc/24
πŸ”₯8🀨3πŸ—Ώ2πŸ™1
β˜„οΈCrlfix - An accurate and concurrent CRLF Injection Vulnerability Scanner

▢️https://github.com/RevoltSecurities/Crlfix?tab=readme-ov-file
Please open Telegram to view this post
VIEW IN TELEGRAM
1πŸ”₯6πŸ‘3
What’s the best cybersecurity book you’ve ever read? πŸ“šπŸ”’
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯8❀4
πŸ”₯Robofinder is a powerful Python script designed to search for and retrieve historical robots.txt files from Archive.org for any given website. This tool is ideal for security researchers, web archivists, and penetration testers to uncover previously accessible paths or directories that were listed in a site's robots.txt.

πŸ”–https://github.com/Spix0r/robofinder
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯14πŸ‘2
⚑Awesome Cyber Security University
βœ…
https://brootware.github.io/awesome-cyber-security-university/
πŸ”₯21❀6πŸ‘4
Don't forget to give reactionsπŸ₯·
Please open Telegram to view this post
VIEW IN TELEGRAM
❀25πŸ‘1
CVE-2024-11187, -12705: Vulnerabilities in BIND DNS Software, 7.5 rating❗️

Two vulnerabilities in BIND allow DoS against DNS servers, which can be a preparatory step before the main attacks.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/bGSFv
πŸ‘‰ Dork: dns.banner:"BIND" OR dns_tcp.banner:"BIND"

Read more: https://kb.isc.org/docs/cve-2024-12705
❀7
❀3πŸ‘3🐳1
This media is not supported in your browser
VIEW IN TELEGRAM
▢️Bypass Bot Detection, a @PortSwiggerRes extension, is now live in the BApp Store!

πŸ”₯This extension helps you bypass TLS fingerprinting by mimicking browser fingerprints and brute-forcing protocol/cipher combinations!
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯19πŸ‘6❀1
Cloud Pentesting Cheatsheet.pdf
194 KB
πŸ”₯5πŸ‘3πŸ‘2❀1
❗️ A new reverse shell called ReverseShell_2025_01.ps1
At the time of publication, none of the scripts were flagged by antivirus systems. However, typically within 2-3 weeks after publication, some vendors begin to detect and flag the malicious files.


πŸ–₯ GitHub
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯5πŸ‘3
πŸ”₯DUMPING ENTIRE NOTION WORKSPACE VIA PROMPT INJECTION - Bug Bounty POC
https://t.iss.one/brutsecurity_poc/32
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘5πŸ”₯2
πŸ”₯GraphQL CSRF via fetch request when samesite attribute is missing in the cookie - Bug Bounty POC

https://t.iss.one/brutsecurity_poc/33
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯6
Checking Multiple Subdomains for S3 Buckets
#bugbounty #bugbountytips
πŸ‘4🐳4❀2πŸ”₯2πŸ‘1
Forwarded from Mr Rahim
0NE 0F MY B.EST FINDlNGS 0F 2024 UPL0ADED lN P0C CHA.NNEL https://t.iss.one/brutsecurity_poc/36
πŸ‘6
RustScan is a ultra-fast port scanner written In Rust (e.g., can scan 64K ports merely in seconds). It passes the results directly to Nmap for in-depth service enumeration and vulnerability analysis. This integration streamlines workflows by combining RustScan's speed with Nmap's detailed scanning capabilities πŸ˜ŽπŸ‘‡

RustScan is available on #Linux, #macOS and #Android termux

https://github.com/RustScan/RustScan
πŸ‘18πŸ—Ώ2❀1
Famus
🀣23πŸ‘2😁2
SubScan: A Chrome Extension for Bug Bounty Hunters

Check it out here:
https://github.com/Ractiurd/SubScan
πŸ”₯19πŸ‘5❀4