Brut Security
15.1K subscribers
963 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: [email protected]
Download Telegram
๐Ÿ‘ป๐Ÿ‘ป A search engine for CTF writeups
๐Ÿ›กhttps://ctfsearch.hackmap.win/
Please open Telegram to view this post
VIEW IN TELEGRAM
10โค28๐Ÿ‘6
๐—š๐—ฎ๐—บ๐—ฒ ๐—ผ๐—ณ ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜†

๐Ÿ‘ป๐Ÿ‘ปGOAD is a pentest active directory LAB project. This lab aims to give pentesters a vulnerable AD environment ready to use to practice usual attack techniques.

๐Ÿ”ฅhttps://github.com/Orange-Cyberdefense/GOAD
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ17๐Ÿ‘7โค2
๐Ÿ‘ป๐Ÿ‘ปSpoofProof helps security professionals detect email domain spoofing vulnerabilities and validate DMARC, SPF, and DKIM configurations, making email security assessments seamless and efficient.

โญExtension Name: SpoofProof - Domain Spoofing Validation

๐Ÿ”— BApp Store:
https://portswigger.net/bappstore/a321360c6e114b3dab6f2c67d68c241a
๐Ÿ’ป Source Code:
https://github.com/portswigger/spoofproof
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ20โค6๐Ÿ‘4๐Ÿคจ2
Don't forget to react guys ๐Ÿ˜”
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ—ฟ21๐Ÿ”ฅ10๐Ÿ‘6๐Ÿ‘4๐Ÿณ2๐Ÿคฃ1๐Ÿซก1
๐Ÿคฃ86๐Ÿณ8โค1๐Ÿ˜1๐Ÿ‘จโ€๐Ÿ’ป1
CVE-2025-20029: Command Injection in F5 BIG-IP, 8.8 ratingโ—๏ธ

The vulnerability allows an attacker to escalate privileges, execute arbitrary commands, and manipulate system files. Not the latest vulnerability, but the PoC was published just recently!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/e17gN
๐Ÿ‘‰ Dork: http.headers.server:"BigIP"

Vendor's advisory: https://my.f5.com/manage/s/article/K000148587
๐Ÿ‘7โค3๐Ÿ˜ฑ2
CVE-2025-24752: XSS in Elementor Page Builder, 7.1 ratingโ—๏ธ

Reflected XSS in a large number of sites. Thanks to our friend Chirag Artani for suggesting the query!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/8wpei
๐Ÿ‘‰ Dork: http.body:"plugins/elementor" AND host_type:domain

Read more: https://patchstack.com/articles/reflected-xss-patched-in-essential-addons-for-elementor-affecting-2-million-sites/
โค4๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
Active link finding with xnLinkFinder! ๐Ÿš€

Command breakdown:
-i https://bugcrowd.com โ†’ Target domain
-sp https://bugcrowd.com โ†’ Scope prefix
-sf "bugcrowd.*" โ†’ Scope filter
-d 2 โ†’ Crawl depth
-v โ†’ Verbose output
๐Ÿ‘10โค9
This media is not supported in your browser
VIEW IN TELEGRAM
Popping alert(1) doesn't show REAL impact.

Escalate your XSS by stealing cookies instead๐Ÿ‘‡
๐Ÿ—ฟ15๐Ÿ”ฅ4โค2
Sensitive Files by Fuzzing Key .git Paths.

/.git
/.gitkeep
/.git-rewrite
/.gitreview
/.git/HEAD
/.gitconfig
/.git/index
/.git/logs
/.svnignore
/.gitattributes
/.gitmodules
/.svn/entries
๐Ÿ”ฅ10โค7๐Ÿ‘4๐Ÿซก3
๐Ÿ”–Find Leaked Credentials Using Google Chrome dev Tools

๐Ÿ“ฑ Github: ๐Ÿ”— Link
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘18โค4๐Ÿซก4๐Ÿ‘1
How many bugs do you know?
๐Ÿ”ฅ24๐Ÿ‘จโ€๐Ÿ’ป8๐Ÿ˜ฑ3
Is your open URL redirect payload getting blocked? ๐Ÿง

Try one of these payloads to bypass it! ๐Ÿค‘

https://www.intigriti.com/researchers/blog/hacking-tools/open-url-redirects-a-complete-guide-to-exploiting-open-url-redirect-vulnerabilities
โค7๐Ÿ‘3๐Ÿ”ฅ2
Crazy Aliyun WAF Bypass:
cat /etc/hosts - triggers WAF
tac /etc/hosts - ๐Ÿง™โ€โ™‚๏ธ

Credit: @galnagli
#bugbountytips #bugbounty
๐Ÿ”ฅ5๐Ÿคจ3โค2๐Ÿ‘2๐Ÿ—ฟ2
๐Ÿ’ญEveryoneโ€™s journey in bug bounty is unique. What worked for one hacker may not work for you, and thatโ€™s okay. Your growth isnโ€™t defined by someone elseโ€™s timeline. You have your own challenges to face, your own lessons to learn, and your own way of mastering this craft.

Some will find their first bug in a week, while others might take months. Some will excel in recon, others in web exploitation. Itโ€™s not about how fast you get thereโ€”itโ€™s about persistence, learning, and adapting. Every failed attempt is a step forward, every mistake a lesson.

So, donโ€™t compare your journey to others. Focus on your progress. Keep hacking, keep improving, and most importantly, keep walking your own path. Success will follow.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค25๐Ÿ‘5
Brut Security pinned ยซ๐Ÿ’ญEveryoneโ€™s journey in bug bounty is unique. What worked for one hacker may not work for you, and thatโ€™s okay. Your growth isnโ€™t defined by someone elseโ€™s timeline. You have your own challenges to face, your own lessons to learn, and your own way of masteringโ€ฆยป