Brut Security
15.1K subscribers
963 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
πŸ‘»πŸ‘»πŸ‘»Penetration Testing Notes

πŸ›‘πŸ›‘https://github.com/0xDigimon/PenetrationTesting_Notes-
Please open Telegram to view this post
VIEW IN TELEGRAM
🀝14πŸ‘6❀3πŸ‘3
πŸ”Ž Search for Default Passwords !

pip3 install defaultcreds-cheat-sheet
πŸ‘21πŸ”₯8
πŸ‘»πŸ‘»Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.

⚠️https://github.com/nicholasaleks/Damn-Vulnerable-Drone
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯11❀6🫑4πŸ‘2
WANT SOME HACKTHEBOX SWAGS? 🎁πŸ”₯

Here’s your shot at winning exclusive Cyber Apocalypse 2025 swag packs – hoodies, coasters, phone stands, and more! πŸ’€πŸ’»

πŸ” Just
reshare this post as much as possible!
πŸ† Top 4 most reshared posts will WIN!

Tag your hacker buddies and spread the word! Let’s grab that HTB loot! πŸš€πŸ”₯

βœ…
https://x.com/wtf_brut/status/1898032895970922523

#CyberApocalypse2025 #HackTheBox #CTF
πŸ”₯9πŸ€”4πŸ‘3
🀣47πŸ‘2πŸ”₯2πŸ‘¨β€πŸ’»1
"If there’s a flaw in the system, then you have the skill to find it!" -Brut_Security
πŸ—Ώ18πŸ‘2🫑1
πŸ‘»πŸ‘»BACK-ME-UP - A tool to automate a bugbounty process as: Tool will execute multiple tools to collect URLs from internet archives then use some useful patterns/RegEx to look for Sensitive Data Leakage in the form of multiple juicy extensions.

⭐️⭐️https://github.com/Dheerajmadhukar/back-me-up
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11πŸ‘10
CVE-2025-27622, -27623, -27624, -27625: Multiple vulnerabilitites in Jenkins, medium rating❗️

The vulnerabilities allow attackers to view encrypted secret values ​​and potentially store attacker-controlled content in other users' profiles.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/SyXh2
πŸ‘‰ Dork: http.headers.x_jenkins:*

Vendor's advisory: https://www.jenkins.io/security/advisory/2025-03-05/
πŸ‘¨β€πŸ’»5πŸ€”1
🚨 The Biggest CTF of the Year is HERE! 🚨

πŸ”₯ Cyber Apocalypse CTF 2025 is coming – and it’s FREE for everyone! Whether you’re a beginner or a seasoned hacker, this is your chance to compete, learn, and win from a massive $90,000 prize pool! πŸ’°πŸ’»

πŸ› οΈ Why Join?
βœ… Open to all skill levels – no prior experience needed!
βœ… Hands-on challenges in web, crypto, forensics, and more!
βœ… Battle it out with the best minds in cybersecurity!
βœ… A chance to grab exclusive HTB swag packs!

πŸ’‘ Join the competition now!
πŸ‘‰ https://hackthebox.com/events/cyber-apocalypse-2025
😱7πŸ‘1
Forwarded from MR. Z
Hey all Just released New tool Dnsprober v1.0.0 , a tool that helps you for dns reconnaissance and with more concurrent and scalable and easy to install run and ability to make different types of DNS queries efficiently, check it out here:
https://github.com/RevoltSecurities/Dnsprober
πŸ”₯21
Where is the reactions 🧐🀨
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯28πŸ‘5😁2
AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories.

https://github.com/AggressiveUser/AllForOne
πŸ”₯32❀8πŸ‘8πŸ‘6
πŸ‘»πŸ‘»SubCat is a powerful subdomain discovery tool that passively aggregates data from a variety of online sources to identify valid subdomains for websites. Designed with a modular and efficient architecture, SubCat is ideal for penetration testers, bug bounty hunters, and security researchers.

🀍🀍https://github.com/duty1g/subcat
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘8πŸ‘5πŸ”₯5
Want to find the origin IP?
1-Hunt for a subdomain with no WAF
2-extract the ASN
2-check it on bgp.he.net
3- grab the IP range, and verify a live IP.
Welcome to their world!

#bugbountytips #BugBounty
πŸ”₯29πŸ‘3😱1
🀝19πŸ‘8πŸ”₯5
CVE-2025-1661: Path Traversal in The HUSKY WordPress Plugin, 9.8 rating πŸ”₯

The vulnerability allows an attacker to execute arbitrary files on the server, including PHP code.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/OEg7k
πŸ‘‰ Dork: http.body:"plugins/woocommerce-products-filter"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-products-filter/husky-products-filter-professional-for-woocommerce-1365-unauthenticated-local-file-inclusion
😱6πŸ”₯4πŸ‘2πŸ‘1
CVE-2025-25291, -25292 and other: Multiple vulnerabilitites in GitLab, 8.8 rating❗️

Traditionally, GitLab publishes information about several vulnerabilities at once. These include Interpretation Conflict, DoS, Credentials Disclose, etc.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/PDxYA
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released/
πŸ‘4πŸ‘¨β€πŸ’»2