Brut Security
YouTube
π¨ Algolia Admin API Key CRITICAL Flaw Exposed! 2024 Exploit POC | Bug Bounty POCπ₯
β οΈ WARNING: For Educational & Ethical Purposes Only! β οΈ
In this video, I demonstrate a critical security vulnerability involving the Algolia Admin API Key and provide a step-by-step proof-of-concept (PoC) to showcase how this exploit could be abused. If youβreβ¦
In this video, I demonstrate a critical security vulnerability involving the Algolia Admin API Key and provide a step-by-step proof-of-concept (PoC) to showcase how this exploit could be abused. If youβreβ¦
π₯10β€2
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π15πΏ8π₯5β€4π1π«‘1
Please open Telegram to view this post
VIEW IN TELEGRAM
π11π7β€3
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯37π€£6π3πΏ1
β‘οΈgrepsubsfromwebpages
β Extract subdomains automatically while visiting webpages. Just add target domain name and this extension will start extracting subs from the webpages you visit.
πhttps://github.com/hackersthan/grepsubsfromwebpages
β Extract subdomains automatically while visiting webpages. Just add target domain name and this extension will start extracting subs from the webpages you visit.
πhttps://github.com/hackersthan/grepsubsfromwebpages
π9β€2π₯2
This media is not supported in your browser
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
π13β€7π₯5
Please open Telegram to view this post
VIEW IN TELEGRAM
π’21π€£4π2π₯1
π¨ CVE-2025-1094: PostgreSQL psql SQL injection
π₯PoC:https://github.com/rapid7/metasploit-framework/pull/19877
π§Deep Dive :https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis
πDorks:
HUNTER : protocol="postgresql"
FOFA : product="PostgreSQL"
SHODAN : "port:5432 PostgreSQL"
π°Refer:https://thecyberthrone.in/2025/02/15/cve-2025-1094-impacts-postgresql-with-sql-injection/
π₯PoC:https://github.com/rapid7/metasploit-framework/pull/19877
π§Deep Dive :https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis
πDorks:
HUNTER : protocol="postgresql"
FOFA : product="PostgreSQL"
SHODAN : "port:5432 PostgreSQL"
π°Refer:https://thecyberthrone.in/2025/02/15/cve-2025-1094-impacts-postgresql-with-sql-injection/
π12π₯5β€3π1
This media is not supported in your browser
VIEW IN TELEGRAM
javascript:(async function(){let scanningDiv=document.createElement("div");scanningDiv.style.position="fixed",scanningDiv.style.bottom="0",scanningDiv.style.left="0",scanningDiv.style.width="100%",scanningDiv.style.maxHeight="50%",scanningDiv.style.overflowY="scroll",scanningDiv.style.backgroundColor="white",scanningDiv.style.color="black",scanningDiv.style.padding="10px",scanningDiv.style.zIndex="9999",scanningDiv.style.borderTop="2px solid black",scanningDiv.innerHTML="<h4>Scanning...</h4>",document.body.appendChild(scanningDiv);let e=[],t=new Set;async function n(e){try{const t=await fetch(e);return t.ok?await t.text():(console.error(`Failed to fetch ${e}: ${t.status}`),null)}catch(t){return console.error(`Error fetching ${e}:`,t),null}}function o(e){return(e.startsWith("/")||e.startsWith("./")||e.startsWith("../"))&&!e.includes(" ")&&!/[^\x20-\x7E]/.test(e)&&e.length>1&&e.length<200}function s(e){return[...e.matchAll(/['"]((?:\/|\.\.\/|\.\/)[^'"]+)['"]/g)].map(e=>e[1]).filter(o)}async function c(o){if(t.has(o))return;t.add(o),console.log(`Fetching and processing: ${o}`);const c=await n(o);if(c){const t=s(c);e.push(...t)}}const l=performance.getEntriesByType("resource").map(e=>e.name);console.log("Resources found:",l);for(const e of l)await c(e);const i=[...new Set(e)];console.log("Final list of unique paths:",i),console.log("All scanned resources:",Array.from(t)),scanningDiv.innerHTML=`<h4>Unique Paths Found:</h4><ul>${i.map(e=>`<li>${e}</li>`).join("")}</ul>`})();
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯33π7β€3
β‘οΈOne Million Dorks - A repository with text files containing a million dorks for finding potentially vulnerable web pages and sensitive data (in Google and other search engines). Can be used with various automation tools.
π―https://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork
#bugbounty #cybersecurity
π―https://github.com/HackShiv/OneDorkForAll/tree/main/dorks/1M_dork
#bugbounty #cybersecurity
π₯19π9
Schlix CMS 2.2.7-2 Arbitrary File Upload - POC ---> https://t.iss.one/brutsecurity_poc/41
β€3π1
Please open Telegram to view this post
VIEW IN TELEGRAM
π€£40π₯1
Nuclei v3.3.9 (@pdiscoveryio) has -ai option to generate and run nuclei templates on the fly in natural language.
This is a list of prompts for this option:
- sensitive data exposure
- SQLi
- XSS
- SSRF
https://github.com/reewardius/Nuclei-AI-Prompts
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯34π6πΏ2
Please open Telegram to view this post
VIEW IN TELEGRAM
π€£46π6π’1π€¨1
This media is not supported in your browser
VIEW IN TELEGRAM
Writeup- https://blog.chebuya.com/posts/server-side-request-forgery-on-sliver-c2/
POC- https://github.com/chebuya/exploits/tree/main/CVE-2025-27090%3A%20Sliver%20C2%20SSRF
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯43π7β€2π€£1
Don't forget to react guys π π
Please open Telegram to view this post
VIEW IN TELEGRAM
π€25π€£7π5π2
CVE-2025-26465, -26466: Two vulnerabilities in OpenSSH, 6.8 ratingβοΈ
MitM and DoS in OpenSSH. The severity level is medium, but the vulnerabilities cover many versions: from 2013 for -26465 and from 2023 for -26466.
Search at Netlas.io:
π Link: https://nt.ls/1TTrj
π Dork: ssh.server_key_exchange.client_to_server_compression:"[email protected]"
Read more: https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466
MitM and DoS in OpenSSH. The severity level is medium, but the vulnerabilities cover many versions: from 2013 for -26465 and from 2023 for -26466.
Search at Netlas.io:
π Link: https://nt.ls/1TTrj
π Dork: ssh.server_key_exchange.client_to_server_compression:"[email protected]"
Read more: https://blog.qualys.com/vulnerabilities-threat-research/2025/02/18/qualys-tru-discovers-two-vulnerabilities-in-openssh-cve-2025-26465-cve-2025-26466
π10π₯5β€2π±1π€£1