Brut Security
15K subscribers
960 photos
76 videos
290 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
πŸ‘»πŸ‘»SubCat is a powerful subdomain discovery tool that passively aggregates data from a variety of online sources to identify valid subdomains for websites. Designed with a modular and efficient architecture, SubCat is ideal for penetration testers, bug bounty hunters, and security researchers.

🀍🀍https://github.com/duty1g/subcat
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘8πŸ‘5πŸ”₯5
Want to find the origin IP?
1-Hunt for a subdomain with no WAF
2-extract the ASN
2-check it on bgp.he.net
3- grab the IP range, and verify a live IP.
Welcome to their world!

#bugbountytips #BugBounty
πŸ”₯29πŸ‘3😱1
🀝19πŸ‘8πŸ”₯5
CVE-2025-1661: Path Traversal in The HUSKY WordPress Plugin, 9.8 rating πŸ”₯

The vulnerability allows an attacker to execute arbitrary files on the server, including PHP code.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/OEg7k
πŸ‘‰ Dork: http.body:"plugins/woocommerce-products-filter"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce-products-filter/husky-products-filter-professional-for-woocommerce-1365-unauthenticated-local-file-inclusion
😱6πŸ”₯4πŸ‘2πŸ‘1
CVE-2025-25291, -25292 and other: Multiple vulnerabilitites in GitLab, 8.8 rating❗️

Traditionally, GitLab publishes information about several vulnerabilities at once. These include Interpretation Conflict, DoS, Credentials Disclose, etc.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/PDxYA
πŸ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/03/12/patch-release-gitlab-17-9-2-released/
πŸ‘4πŸ‘¨β€πŸ’»2
Disclosing YouTube Creator Emails for a $20k Bounty
From creator privacy to phishing paradise: How a secret parameter could have exposed the private email addresses of monetized YouTube channels
πŸ”₯10πŸ‘3πŸ—Ώ2
πŸ”₯9πŸ‘2
Nightmare
Nightmare is an intro to binary exploitation / reverse engineering course based around ctf challenges.
❀7πŸ‘1
πŸ”₯5😱1
πŸ”–The ultimate 403 Bypass wordlists and tester notes by JHaddix

πŸ“± Github: πŸ”— Link
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9πŸ‘4πŸ—Ώ2
🎯 Mastering CRTO? This Resource is Pure Gold!

If you're preparing for Certified Red Team Operator (CRTO) or want to sharpen your adversary emulation skills, I’ve found something invaluable for you!

πŸ”— Check here :
https://m4lici0u5.com/notes/crto-notes/

πŸ” What’s inside?

πŸ΄β€β˜ οΈ Cobalt Strike – Beacons, pivoting & advanced tactics.
πŸ΄β€β˜ οΈ AD Attacks – Lateral movement, Kerberoasting, DCSync & more.
πŸ΄β€β˜ οΈ Bypassing Defenses – EDR evasion, AMSI bypass, OPSEC tricks.
πŸ΄β€β˜ οΈ Persistence & PrivEsc – Staying stealthy like real APTs.
πŸ”₯11πŸ‘4πŸ—Ώ4🫑3
CVE-2024-13918, -13919: XSS in Laravel Framework, 8.0 rating❗️

The vulnerabilities allow an attacker to execute code in the victim's browser via Reflected XSS if the victim clicks on a decoy link.

More then 770k instances at Netlas.io:
πŸ‘‰ Link: https://nt.ls/95OAY
πŸ‘‰ Dork: http.headers.set_cookie:"laravel_session="

Read more: https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20241209-01_Laravel_Reflected_XSS_via_Request_Parameter_in_Debug-Mode_Error_Page
πŸ‘5❀3😱1πŸ‘¨β€πŸ’»1
πŸ”–Subdomain Enumeration Using Rapiddns.io

function rappidns() {
curl -s "https://rapiddns.io/subdomain/$1?full=1" | grep -oE "[\.a-zA-Z0-9-]+\.$1" | tr '[:upper:]' '[:lower:]' | sort -u
}
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘17😒2
Get Windows Domain Information:

C:\> nltest /DCLIST:DomainName
C:\> nltest /DCNAME:DomainName
C:\> nltest /DSGETDC:DomainName

These commands utilize nltest, a command-line tool included with Windows Server and some client versions (when Remote Server Administration Tools, RSAT, are installed).

Below is a detailed breakdown:

1. nltest /DCLIST:DomainName

Purpose: Lists all domain controllers for the specified domain (DomainName).

Output: Displays a list of domain controllers with their names, IP addresses, and site information.

Example:
C:\> nltest /DCLIST:EXAMPLE
DC: \\https://DC01.example.com [192.168.1.10] Site: Default-First-Site-Name
DC: \\https://DC02.example.com [192.168.1.11] Site: Default-First-Site-Name
The command completed successfully

2. nltest /DCNAME:DomainName

Purpose: Retrieves the name of a domain controller for the specified domain.

Output: Returns a single DC name, often the one the workstation is communicating with.

Example:
C:\> nltest /DCNAME:EXAMPLE
DC: \\https://DC01.example.com
The command completed successfully

3. nltest /DSGETDC:DomainName

Purpose: Queries and returns detailed information about a domain controller for the specified domain, including its name, IP, site, and more.

Output: Provides a verbose output with attributes like DC name, IP address, domain GUID, and forest details.

Example:
C:\> nltest /DSGETDC:EXAMPLE
DC: \\https://DC01.example.com
Address: 192.168.1.10
Dom Guid: {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}
Site: Default-First-Site-Name
Flags: PDC GC DS LDAP KDC TIMESERV GTIMESERV WRITABLE
The command completed successfully
πŸ‘15❀6πŸ”₯1
#promo Join for BB Tips - @pythagorex
πŸ‘5🀝1
πŸ‘»πŸ‘»Zseano's Bug Bounty methodology

🀍https://www.bugbountyhunter.com/methodology/zseanos-methodology.pdf
πŸ”₯@brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
🫑12πŸ‘3πŸ”₯3