Brut Security
15K subscribers
958 photos
76 videos
290 files
1K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
πŸ‘»CVE-2025-24071: Windows Explorer initiates an SMB authentication request upon extracting a .library-ms file from a .rar archive, exposing NTLM hashes. Extraction alone triggers the vulnerability.

⭐️POC- https://t.iss.one/brutsecurity_poc/45
Please open Telegram to view this post
VIEW IN TELEGRAM
1πŸ”₯17😱4❀3
dON'T fORGET tO gIVE rEACTIONS
😱11πŸ”₯7❀5πŸ‘4
⚑The Ultimate PNPT Study Guide – Master Pentesting & Crush the Exam!

πŸ”—Link:
https://github.com/TrshPuppy/PNPT-study-guide
❀10πŸ”₯4πŸ‘3
⚑SubDomain Grabber - A bug bounty tool to download, unzip, and clean subdomains from Chaos ProjectDiscovery.

🚨Converts *.
abc.com to https://abc.com, organizes into directories, and removes ZIPs. Offers a colorful CLI, filters (BugCrowd, HackerOne, etc.), sorting, and pagination.

βœ…
https://github.com/MuhammadWaseem29/SubDomain-Grabber
πŸ”₯10πŸ‘6
Subdominator - Unleash the Power of Subdomain Enumeration

https://github.com/RevoltSecurities/Subdominator
❀19πŸ‘3
πŸ‘» Looking for a Discord Moderator!πŸ‘»

⚠️We need an active mod to help manage the Brut Security server. Based on performance, you’ll be rewarded with swags, gift cards, or TryHackMe vouchers!

πŸ”₯Join & Apply Now: https://discord.gg/u7uMFV833h
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4
Brut Security pinned Β«πŸ‘» Looking for a Discord Moderator!πŸ‘» ⚠️We need an active mod to help manage the Brut Security server. Based on performance, you’ll be rewarded with swags, gift cards, or TryHackMe vouchers! πŸ”₯Join & Apply Now: https://discord.gg/u7uMFV833hΒ»
πŸ›‘Research Paper πŸ“–Next.js and the corrupt middleware: the authorizing artifact

πŸ”₯https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯14❀4
☺️Your support keeps me motivated to share more valuable content! If you found this helpful, drop a like & send stars ⭐ to help me keep going.

πŸ’¬ For queries, message me on Telegram: @wtf_brut
πŸŽ“ For course enrollment, reach out on WhatsApp: wa.link/brutsecurity
4πŸ‘31πŸ”₯9❀3πŸ‘¨β€πŸ’»1🫑1
πŸ” Want to find exploitable CVEs for cybersecurity testing?

Use CVEmap to spot vulnerabilities with public proof-of-concept, marked exploitable by CISA, remotely exploitable, and without Nuclei templates yet!

Flags to use: -k (CISA exploitable), -t=false (no template), -poc (has proof-of-concept), -re (remote).

Happy hunting! πŸ› οΈ
πŸ‘18❀9
If you found a file upload function for an image, try introducing an image with XSS in the filename like so:
<img src=x onerror=alert('XSS')>.png
"><img src=x onerror=alert('XSS')>.png
"><svg onmouseover=alert(1)>.svg
<<script>alert('xss')<!--a-->a.png
❀13πŸ‘6
Use Vulhub to reproduce Next.js Middleware Authorization Bypass (CVE-2025-29927)
https://github.com/vulhub/vulhub/tree/master/next.js/CVE-2025-29927
πŸ”₯7❀3πŸ‘2πŸ‘¨β€πŸ’»2
🚨 0day Hunters, Pay Attention! 🚨

CVE-2025-29927 – Next.js Middleware Auth Bypass [EXPLOIT]

Ever wondered what happens when middleware security checks fail silently? This vuln lets you slip past authentication like a ghost.

πŸ’₯ Reproduce it with Vulhub. Exploit it with Nuclei.

It’s waiting in our Discord.
πŸ”— [Exploit Download]
πŸ”₯13πŸ‘3
Who wants a Spotify Premium 4-month coupon? 🎧πŸ’₯

Drop your favorite hacking playlist, and the best one wins the coupon! πŸ”₯🎢
❀18πŸ‘5
πŸ›  ExplainShell – Decode Shell Commands

Found a complex command in a PoC or exploit? Paste it into ExplainShell and see a breakdown of each argument.

πŸ” Great for analyzing payloads, understanding Linux commands, and improving your skills.

Essential for Bug Bounty & Pentesting.
πŸ”₯21πŸ‘5❀2
Dalfox v2.10.0 released! It uses way less CPU while XSS scanning even faster than before.

github.com/hahwul/dalfox

#DAST #Security #BugBounty
πŸ—Ώ27πŸ‘10
Unknown vulnerability in CrushFTP, no rating❗️

The vulnerability allows attackers to gain unauthenticated access if any HTTP(S) port is exposed in the configuration.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/tI4nF
πŸ‘‰ Dork: http.headers.server:"CrushFTP"

Read more: https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/
πŸ‘4