Brut Security
15K subscribers
956 photos
76 videos
290 files
1K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
⚑SubDomain Grabber - A bug bounty tool to download, unzip, and clean subdomains from Chaos ProjectDiscovery.

🚨Converts *.
abc.com to https://abc.com, organizes into directories, and removes ZIPs. Offers a colorful CLI, filters (BugCrowd, HackerOne, etc.), sorting, and pagination.

βœ…
https://github.com/MuhammadWaseem29/SubDomain-Grabber
πŸ”₯10πŸ‘6
Subdominator - Unleash the Power of Subdomain Enumeration

https://github.com/RevoltSecurities/Subdominator
❀19πŸ‘3
πŸ‘» Looking for a Discord Moderator!πŸ‘»

⚠️We need an active mod to help manage the Brut Security server. Based on performance, you’ll be rewarded with swags, gift cards, or TryHackMe vouchers!

πŸ”₯Join & Apply Now: https://discord.gg/u7uMFV833h
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘4
Brut Security pinned Β«πŸ‘» Looking for a Discord Moderator!πŸ‘» ⚠️We need an active mod to help manage the Brut Security server. Based on performance, you’ll be rewarded with swags, gift cards, or TryHackMe vouchers! πŸ”₯Join & Apply Now: https://discord.gg/u7uMFV833hΒ»
πŸ›‘Research Paper πŸ“–Next.js and the corrupt middleware: the authorizing artifact

πŸ”₯https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯14❀4
☺️Your support keeps me motivated to share more valuable content! If you found this helpful, drop a like & send stars ⭐ to help me keep going.

πŸ’¬ For queries, message me on Telegram: @wtf_brut
πŸŽ“ For course enrollment, reach out on WhatsApp: wa.link/brutsecurity
4πŸ‘31πŸ”₯9❀3πŸ‘¨β€πŸ’»1🫑1
πŸ” Want to find exploitable CVEs for cybersecurity testing?

Use CVEmap to spot vulnerabilities with public proof-of-concept, marked exploitable by CISA, remotely exploitable, and without Nuclei templates yet!

Flags to use: -k (CISA exploitable), -t=false (no template), -poc (has proof-of-concept), -re (remote).

Happy hunting! πŸ› οΈ
πŸ‘18❀9
If you found a file upload function for an image, try introducing an image with XSS in the filename like so:
<img src=x onerror=alert('XSS')>.png
"><img src=x onerror=alert('XSS')>.png
"><svg onmouseover=alert(1)>.svg
<<script>alert('xss')<!--a-->a.png
❀13πŸ‘6
Use Vulhub to reproduce Next.js Middleware Authorization Bypass (CVE-2025-29927)
https://github.com/vulhub/vulhub/tree/master/next.js/CVE-2025-29927
πŸ”₯7❀3πŸ‘2πŸ‘¨β€πŸ’»2
🚨 0day Hunters, Pay Attention! 🚨

CVE-2025-29927 – Next.js Middleware Auth Bypass [EXPLOIT]

Ever wondered what happens when middleware security checks fail silently? This vuln lets you slip past authentication like a ghost.

πŸ’₯ Reproduce it with Vulhub. Exploit it with Nuclei.

It’s waiting in our Discord.
πŸ”— [Exploit Download]
πŸ”₯13πŸ‘3
Who wants a Spotify Premium 4-month coupon? 🎧πŸ’₯

Drop your favorite hacking playlist, and the best one wins the coupon! πŸ”₯🎢
❀18πŸ‘5
πŸ›  ExplainShell – Decode Shell Commands

Found a complex command in a PoC or exploit? Paste it into ExplainShell and see a breakdown of each argument.

πŸ” Great for analyzing payloads, understanding Linux commands, and improving your skills.

Essential for Bug Bounty & Pentesting.
πŸ”₯21πŸ‘5❀2
Dalfox v2.10.0 released! It uses way less CPU while XSS scanning even faster than before.

github.com/hahwul/dalfox

#DAST #Security #BugBounty
πŸ—Ώ27πŸ‘10
Unknown vulnerability in CrushFTP, no rating❗️

The vulnerability allows attackers to gain unauthenticated access if any HTTP(S) port is exposed in the configuration.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/tI4nF
πŸ‘‰ Dork: http.headers.server:"CrushFTP"

Read more: https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/
πŸ‘4
CVE-2025-30232: Use-after-free in Exim, "medium" rating❗️

A vulnerability in some versions of Exim potentially allows an attacker to perform Privilege Escalation, if he has command line access.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/mtDNc
πŸ‘‰ Dork: smtp.banner:"Exim 4.96" OR smtp.banner:"Exim 4.97" OR smtp.banner:"Exim 4.98" OR smtp.banner:"Exim 4.98.1"

Vendor's advisory: https://exim.org/static/doc/security/CVE-2025-30232.txt
❀8πŸ‘1
☺️Your support keeps me motivated to share more valuable content! If you found this helpful, drop a like & send stars ⭐ to help me keep going.

πŸ’¬ For queries, message me on Telegram: @wtf_brut
πŸŽ“ For course enrollment, reach out on WhatsApp: wa.link/brutsecurity
3❀13πŸ‘8🐳3πŸ”₯2
CVE-2025-1974: Improper Isolation or Compartmentalization in Kubernetes Ingress Controller, 9.8 rating πŸ”₯

In some cases, an unauthenticated attacker may be able to execute remote code in the context of the ingress-nginx controller.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/G6SC7
πŸ‘‰ Dork: certificate.issuer_dn:"Kubernetes Ingress Controller"

Vendor's advisory: https://github.com/kubernetes/kubernetes/issues/131009
πŸ‘10🀝2❀1
🀣59πŸ‘8😁2🀝2
πŸ” Ultimate Secret Scanner Regex Collection πŸ”

30+ regex patterns to detect leaked credentials:

βœ… API keys (Google, AWS, Stripe)
βœ… Auth tokens (OAuth, JWT)
βœ… Private keys (RSA, PGP)
βœ… Emails, URLs, UUIDs

https://github.com/Lu3ky13/Search-for-all-leaked-keys-secrets-using-one-regex-/tree/main

#bugbounty #bugbountytip
πŸ‘14πŸ—Ώ12❀2