Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โ˜„๏ธSubCerts is an automated tool designed to extract subdomains from certificate transparency logs using the crt.sh API. This tool is able to identify subdomains of a target domain by leveraging publicly available certificates.

โš ๏ธhttps://github.com/0xJin/SubCerts
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘27๐Ÿ”ฅ11๐Ÿซก8โค2
๐Ÿ“ˆ๐Ÿ“‰Your one Reaction is my reason to post such contents.
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘55๐Ÿซก18๐Ÿ”ฅ10๐Ÿ—ฟ4โค2๐Ÿ‘จโ€๐Ÿ’ป1
๐Ÿ”’Bug Bounty Tip: Algolia API Key Exposure Can Lead to Web Log Access with CRUD Permissions

โญ๏ธIf an Algolia API key is exposed, it may allow access to search logs with Create, Read, Update, and Delete (CRUD) privileges. This can reveal user queries and other sensitive data.

๐Ÿ” Tip: Always inspect main.js files for exposed keys.

#bugbountytip #bugbounty #infosec #hacking #hacker
Please open Telegram to view this post
VIEW IN TELEGRAM
โค13๐Ÿ‘7๐Ÿ”ฅ3
CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it out!

- ctfsearch.hackmap.win

#infosec #cybersec #bugbountytips
20๐Ÿ”ฅ22โค6๐Ÿ‘2
Bleach's Bug Bounty Blues
<unknown>
๐Ÿซก6โค3๐Ÿคฃ2๐Ÿ‘1
โค11๐Ÿ—ฟ7
โ˜„๏ธwappalyzer-next - wappalyzer alternative based on wappalyzer browser extension.

โšก๏ธโšก๏ธโšก๏ธโšก๏ธ170+ new technologies added in the latest update of wappalyzer, grab it!

โŒจ๏ธhttps://github.com/s0md3v/wappalyzer-next
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘12โค4๐Ÿ”ฅ3๐Ÿค”1
โšก๏ธExclusive Collection of Private Nuclei Templates

1. Akokonunes
2. Emadshanab
3.
BoobooHQ
4. SirBugs
5. Linuxadi
6. 0xKayala
7. Bhataasim1
8. H0tak88r
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ28๐Ÿ‘3๐Ÿณ2๐Ÿ—ฟ2
Want to learn more about Oauth bugs?

Here's a detailed writeup by @Doyensec on Oauth vulns like:

- Redirect Scheme Hijacking
- Scope Upgrade
- Client Confusion
- Mutable Claims

https://blog.doyensec.com/2025/01/30/oauth-common-vulnerabilities.html

#bugbounty #bugbountytips
๐Ÿ‘12โค3
Bypassing File Upload Restrictions on Xiaomi Using
.extensions./%00.png

Method _BUG BOUNTY POC_
https://t.iss.one/brutsecurity_poc/40
๐Ÿ‘7๐Ÿณ2๐Ÿ—ฟ2
Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulnerabilities, and potential risks within JavaScript files on websites.
-> GitHub.com/VFA250/Morgan
๐Ÿ”ฅ11โค4๐Ÿ‘3
โ˜„๏ธSearch Engine for Bug Bounty Hunters
- https://nitinyadav00.github.io/Bug-Bounty-Search-Engine/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘16๐Ÿ”ฅ5๐Ÿค”3
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ6๐Ÿ‘2
๐Ÿ“ŠVulnerable Bank - An intentionally vulnerable application built for learning secure code reviews and to test api pentesting skills.

๐Ÿ–ฅhttps://github.com/Commando-X/vuln-bank
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ14๐Ÿ‘5๐Ÿ˜ฑ3
Start solving and share your writeup with our community members in discussions group. https://t.iss.one/brutsec
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”–A useful one-liner that extracts all API endpoints from AngularJS and Angular JavaScript files.

curl -s URL | grep -Po "(\/)((?:[a-zA-Z\-_\:\.0-9\{\}]+))(\/)*((?:[a-zA-Z\-_\:\.0-9\{\}]+))(\/)((?:[a-zA-Z\-_\/\:\.0-9\{\}]+))" | sort -u
Please open Telegram to view this post
VIEW IN TELEGRAM
โค19๐Ÿ”ฅ5๐Ÿ—ฟ4๐Ÿ‘2๐Ÿ‘2๐Ÿณ2
๐ŸšจGoogle Dorks๐Ÿšจ

These are awesome dorks that may lead you to great findings when testing an application or doing bug bounty hunting.
๐Ÿ”ฅ20๐Ÿ‘3
๐—ฃ๐—ฎ๐˜†๐—น๐—ผ๐—ฎ๐—ฑ ๐—ช๐—ถ๐˜‡๐—ฎ๐—ฟ๐—ฑ ๐Ÿค– - AI assistant that utilizes GPT-3.5 and GPT-4 language models to interpret and generate cybersecurity payloads.

๐Ÿ”— payload-wizard.vercel.app
๐Ÿ‘11๐Ÿ”ฅ4