Brut Security
14.7K subscribers
917 photos
73 videos
287 files
971 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
⚑Awesome Cyber Security University
βœ…
https://brootware.github.io/awesome-cyber-security-university/
πŸ”₯21❀6πŸ‘4
Don't forget to give reactionsπŸ₯·
Please open Telegram to view this post
VIEW IN TELEGRAM
❀25πŸ‘1
CVE-2024-11187, -12705: Vulnerabilities in BIND DNS Software, 7.5 rating❗️

Two vulnerabilities in BIND allow DoS against DNS servers, which can be a preparatory step before the main attacks.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/bGSFv
πŸ‘‰ Dork: dns.banner:"BIND" OR dns_tcp.banner:"BIND"

Read more: https://kb.isc.org/docs/cve-2024-12705
❀7
❀3πŸ‘3🐳1
This media is not supported in your browser
VIEW IN TELEGRAM
▢️Bypass Bot Detection, a @PortSwiggerRes extension, is now live in the BApp Store!

πŸ”₯This extension helps you bypass TLS fingerprinting by mimicking browser fingerprints and brute-forcing protocol/cipher combinations!
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯19πŸ‘6❀1
Cloud Pentesting Cheatsheet.pdf
194 KB
πŸ”₯5πŸ‘3πŸ‘2❀1
❗️ A new reverse shell called ReverseShell_2025_01.ps1
At the time of publication, none of the scripts were flagged by antivirus systems. However, typically within 2-3 weeks after publication, some vendors begin to detect and flag the malicious files.


πŸ–₯ GitHub
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯5πŸ‘3
πŸ”₯DUMPING ENTIRE NOTION WORKSPACE VIA PROMPT INJECTION - Bug Bounty POC
https://t.iss.one/brutsecurity_poc/32
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘5πŸ”₯2
πŸ”₯GraphQL CSRF via fetch request when samesite attribute is missing in the cookie - Bug Bounty POC

https://t.iss.one/brutsecurity_poc/33
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯6
Checking Multiple Subdomains for S3 Buckets
#bugbounty #bugbountytips
πŸ‘4🐳4❀2πŸ”₯2πŸ‘1
Forwarded from Mr Rahim
0NE 0F MY B.EST FINDlNGS 0F 2024 UPL0ADED lN P0C CHA.NNEL https://t.iss.one/brutsecurity_poc/36
πŸ‘6
RustScan is a ultra-fast port scanner written In Rust (e.g., can scan 64K ports merely in seconds). It passes the results directly to Nmap for in-depth service enumeration and vulnerability analysis. This integration streamlines workflows by combining RustScan's speed with Nmap's detailed scanning capabilities πŸ˜ŽπŸ‘‡

RustScan is available on #Linux, #macOS and #Android termux

https://github.com/RustScan/RustScan
πŸ‘18πŸ—Ώ2❀1
Famus
🀣23πŸ‘2😁2
SubScan: A Chrome Extension for Bug Bounty Hunters

Check it out here:
https://github.com/Ractiurd/SubScan
πŸ”₯19πŸ‘5❀4
Bypass WAF using Burp Repeater - Unicode Encoding

Encode payloads into UTF-16 to bypass basic input validation.
❀14πŸ”₯7πŸ‘5
CVE-2024-56529: Session Fixation in Mailcow, 7.5 rating❗️

The application does not disable old session IDs, which allows a remote attacker to use existing IDs in the victim's browser.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/AuyJw
πŸ‘‰ Dork: http.title:"mailcow UI"

Vendor's advisory: https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6
πŸ”₯3πŸ‘2πŸ‘1
Exposed source code is a goldmine but don't limit yourself to just Git , some teams use Subversion, Mercurial, Bazaar & more!
πŸ”₯14πŸ‘2
πŸ”–JSA - Javascript security analysis (JSA) is a program for monitoring javascript files during the web application security assessment.

πŸ“± Github: πŸ”—Link
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯32❀10πŸ‘4
where is the reaction guysss? 🚨🚨🚨
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯12❀2πŸ‘1
πŸ’  Complete Web App Pentesting

πŸ”—
https://hacklido.com/lists/8
πŸ”₯31❀5