Brut Security
15.1K subscribers
963 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: [email protected]
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
urlhunter: A recon tool that allows searching on URLs that are exposed via shortener services

Link:
https://github.com/utkusen/urlhunter
๐Ÿ”ฅ18๐Ÿ‘3โค2๐Ÿค2
CVE-2025-26794: SQL Injection in Exim 4.98, 7.5 ratingโ—๏ธ

A vulnerability in the Exim mail transfer agent could allow a remote attacker to perform SQL injection.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/ge4Iy
๐Ÿ‘‰ Dork: smtp.banner:"Exim 4.98"

Vendor's advisory: https://www.exim.org/static/doc/security/CVE-2025-26794.txt
๐Ÿ”ฅ35๐Ÿ‘10๐Ÿณ1
Don't forget to react guys ๐Ÿ˜ข
๐Ÿ”ฅ45๐Ÿ‘7๐Ÿ—ฟ4๐Ÿ˜3๐Ÿคฃ3
๐Ÿ‘ป๐Ÿ‘ปURL's Manipulation 4 Reconnaissance

๐Ÿ”ฅ30 ways to gather information about the target domain just by adding different words to URL.

๐Ÿ›กhttps://osintteam.blog/urls-osint-bf5c9b087455
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘14๐Ÿ”ฅ3๐Ÿณ1๐Ÿ—ฟ1
CVE-2025-1128: RCE in Everest Forms WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

The vulnerability allows an unauthenticated attacker to perform a wide range of actions with the site: upload arbitrary files, RCE, delete config files.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/q6pgJ
๐Ÿ‘‰ Dork: http.body:"plugins/everest-forms"

Read more: https://www.wordfence.com/blog/2025/02/100000-wordpress-sites-affected-by-arbitrary-file-upload-read-and-deletion-vulnerability-in-everest-forms-wordpress-plugin/
๐Ÿ”ฅ11๐Ÿ‘1
๐Ÿ‘ป๐Ÿ‘ป๐Ÿ‘ปLenovo XSS via Unrestricted File Upload PoC---> https://t.iss.one/brutsecurity_poc/42
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ—ฟ3
๐Ÿ‘ป๐Ÿ‘ป A search engine for CTF writeups
๐Ÿ›กhttps://ctfsearch.hackmap.win/
Please open Telegram to view this post
VIEW IN TELEGRAM
10โค28๐Ÿ‘6
๐—š๐—ฎ๐—บ๐—ฒ ๐—ผ๐—ณ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜†

๐Ÿ‘ป๐Ÿ‘ปGOAD is a pentest active directory LAB project. This lab aims to give pentesters a vulnerable AD environment ready to use to practice usual attack techniques.

๐Ÿ”ฅhttps://github.com/Orange-Cyberdefense/GOAD
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ17๐Ÿ‘7โค2
๐Ÿ‘ป๐Ÿ‘ปSpoofProof helps security professionals detect email domain spoofing vulnerabilities and validate DMARC, SPF, and DKIM configurations, making email security assessments seamless and efficient.

โญExtension Name: SpoofProof - Domain Spoofing Validation

๐Ÿ”— BApp Store:
https://portswigger.net/bappstore/a321360c6e114b3dab6f2c67d68c241a
๐Ÿ’ป Source Code:
https://github.com/portswigger/spoofproof
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ20โค6๐Ÿ‘4๐Ÿคจ2
Don't forget to react guys ๐Ÿ˜”
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ—ฟ21๐Ÿ”ฅ10๐Ÿ‘6๐Ÿ‘4๐Ÿณ2๐Ÿคฃ1๐Ÿซก1
๐Ÿคฃ86๐Ÿณ8โค1๐Ÿ˜1๐Ÿ‘จโ€๐Ÿ’ป1
CVE-2025-20029: Command Injection in F5 BIG-IP, 8.8 ratingโ—๏ธ

The vulnerability allows an attacker to escalate privileges, execute arbitrary commands, and manipulate system files. Not the latest vulnerability, but the PoC was published just recently!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/e17gN
๐Ÿ‘‰ Dork: http.headers.server:"BigIP"

Vendor's advisory: https://my.f5.com/manage/s/article/K000148587
๐Ÿ‘7โค3๐Ÿ˜ฑ2
CVE-2025-24752: XSS in Elementor Page Builder, 7.1 ratingโ—๏ธ

Reflected XSS in a large number of sites. Thanks to our friend Chirag Artani for suggesting the query!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/8wpei
๐Ÿ‘‰ Dork: http.body:"plugins/elementor" AND host_type:domain

Read more: https://patchstack.com/articles/reflected-xss-patched-in-essential-addons-for-elementor-affecting-2-million-sites/
โค4๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
Active link finding with xnLinkFinder! ๐Ÿš€

Command breakdown:
-i https://bugcrowd.com โ†’ Target domain
-sp https://bugcrowd.com โ†’ Scope prefix
-sf "bugcrowd.*" โ†’ Scope filter
-d 2 โ†’ Crawl depth
-v โ†’ Verbose output
๐Ÿ‘10โค9
This media is not supported in your browser
VIEW IN TELEGRAM
Popping alert(1) doesn't show REAL impact.

Escalate your XSS by stealing cookies instead๐Ÿ‘‡
๐Ÿ—ฟ15๐Ÿ”ฅ4โค2