Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ‘€Just because a subdomain exists in public sources doesn’t mean it’s live.

You can chain Subfinder with Shuffledns to enumerate subdomains & resolve only valid ones.
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯18❀6πŸ‘2πŸ‘2
SSTI.txt
17.8 KB
100+ SSTI Payloads
πŸ‘10πŸ”₯6❀1
Recon Skills and Tips.pptx.pdf
825.4 KB
πŸ’΅πŸ’΅πŸ’΅Recon Skills and Tips by Godfather ORWA ⚑️
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯13❀4πŸ‘3
Browser Syncjacking
Check it out: lnkd.in/gBnd-YJu
πŸ”₯18🀨7πŸ‘4
Where is the reactions guys??
❀19
Cross Site Scripting (XSS) Through File Upload SVG ---> https://t.iss.one/brutsecurity_poc/38
❀15
🀣26πŸ—Ώ4πŸ‘3🐳3❀2
⚠️Data Breach Alert - OpenAI⚠️

A threat actor claims to be in possession of login credentials (email and password) for 20 million OpenAI accounts.
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ—Ώ25πŸ”₯3😱3πŸ‘1πŸ‘¨β€πŸ’»1
πŸ”₯Gourlex is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.

βœ…https://github.com/trap-bytes/gourlex
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ‘3🐳1
πŸ”₯ CRTO Aspirants & Red Teamers – Must-Check Resource!

⚑If you're preparing for the Certified Red Team Operator (CRTO) or want to refine your red teaming skills, this GitHub repo is a goldmine.

https://github.com/h3ll0clar1c3/CRTO
πŸ‘13❀8πŸ”₯3
β˜„οΈβ˜„οΈUser information Leak Vulnerability in GitHub P1 Bug Bounty live __ POC

https://t.iss.one/brutsecurity_poc/39
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ”₯7πŸ‘1πŸ—Ώ1
Reactions Please πŸ‘€
Please open Telegram to view this post
VIEW IN TELEGRAM
❀18🀝2πŸ‘1
Please open Telegram to view this post
VIEW IN TELEGRAM
❀12πŸ—Ώ4πŸ€”2🐳1
πŸ“š Good collection of cheat sheets, guides and resources on #Pentesting, reverse engineering and exploit dev πŸ›‘οΈ

- https://x0rb3l.github.io/Cyber-Bookmarks/bookmarks.html
πŸ”₯15❀5πŸ‘3πŸ—Ώ2
Advanced Web Hacking.pdf
10.2 MB
NotSoSecure Advanced Web Hacking
πŸ‘13πŸ”₯6
⚑️Misconfig Mapper - A fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/or bug bounty targets.

β˜„οΈhttps://github.com/intigriti/misconfig-mapper
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯17πŸ‘5
β˜„οΈSubCerts is an automated tool designed to extract subdomains from certificate transparency logs using the crt.sh API. This tool is able to identify subdomains of a target domain by leveraging publicly available certificates.

⚠️https://github.com/0xJin/SubCerts
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘27πŸ”₯11🫑8❀2
πŸ“ˆπŸ“‰Your one Reaction is my reason to post such contents.
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘55🫑18πŸ”₯10πŸ—Ώ4❀2πŸ‘¨β€πŸ’»1
πŸ”’Bug Bounty Tip: Algolia API Key Exposure Can Lead to Web Log Access with CRUD Permissions

⭐️If an Algolia API key is exposed, it may allow access to search logs with Create, Read, Update, and Delete (CRUD) privileges. This can reveal user queries and other sensitive data.

πŸ” Tip: Always inspect main.js files for exposed keys.

#bugbountytip #bugbounty #infosec #hacking #hacker
Please open Telegram to view this post
VIEW IN TELEGRAM
❀13πŸ‘7πŸ”₯3
CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it out!

- ctfsearch.hackmap.win

#infosec #cybersec #bugbountytips
20πŸ”₯22❀6πŸ‘2
Bleach's Bug Bounty Blues
<unknown>
🫑6❀3🀣2πŸ‘1