Brut Security
14.9K subscribers
953 photos
76 videos
290 files
997 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
How many of you received this free Sony Swag?
🐳6πŸ‘2
Only 6 hours... and boom!
Found multiple critical vulnerabilities in
US Bank β€” including:

Leaked sensitive information

Hardcoded auth credentials

Unprotected sensitive endpoints

Unauthenticated access to the dashboard

And more juicy stuff...

ο»Ώ


Why you guys not following me yet?

It's like walking into a digital vault with no lock... just saying.

Ethically hacking to protect, not to exploit.
Does anyone know if they have a bug bounty or responsible disclosure program?
😱23πŸ‘11❀2
πŸ‘»Nuclei AI Prompts is a platform that offers a collection of ready-to-use security prompts for Nuclei. It helps penetration testers and security researchers speed up their work by providing prompts for common vulnerabilities like XSS, SQLi, RCE, and more. You can easily copy these prompts and use them in your security testing, and even contribute new ones to help grow the community.

βœ…Join Telegram - t.iss.one/brutsecurity
πŸ”₯nucleiprompts.com

#cybersecurity #bugbounty #bugbountytips #nuclei
πŸ‘5πŸ”₯5❀1🀝1
Discovering a Business Logic Flow Bug (Low-Hanging Fruit)

Try my this simple method to identify a common business logic flaw:

But wait β€” before you continue...
If you're not following me yet, what are you doing?


πŸ§ͺ Exploitation Steps:

1. Register a new account and take note of the username you used.
2. Verify and activate the account.
3. Delete the account.
4. Now, try registering again using the same username β€” observe what happens.


If the server still blocks or reserves the username after the account is deleted, congratulations! You've just uncovered a Business Logic Flow bug😁

#BugBountytips
πŸ‘16😁3πŸ”₯2🫑2πŸ‘¨β€πŸ’»1πŸ—Ώ1
collect emails, usernames from commit history of repos of an org from GitHub for more personalized targeting of employees

ghintel.secrets.ninja
❀20πŸ‘4πŸ”₯1😒1
Duplicate πŸ₯²
😒28🫑3πŸ‘1
Account Takeover via Email βš”οΈ

#infosec #cybersec #bugbountytips
πŸ”₯17πŸ‘3❀2πŸ‘2
There are some fast and simple Google Dorks that you should definitely apply to your target during recon.
These can often reveal sensitive information like .env files, database dumps, config files, and even backups.


1. Exposed .env Files
intitle:"Index of" ".env"
"DB_PASSWORD" filetype:env
"APP_ENV=local" | "DB_HOST=127.0.0.1"


2. Exposed SQLite Databases
intitle:"Index of" ".sqlite"
intitle:"Index of" "db.sqlite"
filetype:sqlite | filetype:sqlite3 | filetype:db


3. Misconfigured Laravel or Public Folder Exposure
inurl:/public/.env
inurl:/public/db.sqlite
intitle:"Index of" inurl:/public/


4. Backup / Config Files (often contain sensitive info)
intitle:"Index of" "backup"
intitle:"Index of" "config"
ext:sql | ext:bak | ext:old | ext:backup


5. Generic Index Dump
intitle:"Index of /" +passwd
intitle:"Index of /" +passwords


Before using these dorks, start by narrowing down your scope with site:target.com, then apply the specific dork to focus only on your target.

Follow meπŸ‘‰πŸΌ DarkShadow
#Bugbountytips
❀19πŸ‘6πŸ‘¨β€πŸ’»2πŸ”₯1
CVE-2025-3439: Deserialization of Untrusted Data in Everest Forms WordPress plugin, 9.8 rating πŸ”₯

A vulnerability in the 'field_value' parameter allows a remote unauthenticated attacker to perform PHP object injection. This in turn allows the attacker to achieve RCE, retrieve sensitive data and the ability to delete arbitrary files.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/CoAb6
πŸ‘‰ Dork: http.body:"plugins/everest-forms"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/everest-forms/everest-forms-contact-form-quiz-survey-newsletter-payment-form-builder-for-wordpress-311-unauthenticated-php-object-injection
❀3πŸ”₯2
You Can Find Race Condition Vulnerabilities ✨

Try to understand what it is:
This vulnerability occurs when a system's behavior depends on the timing of concurrent operations, allowing attackers to gain unauthorized access or perform unauthorized actions.

The main concept to exploit it is by abusing functionality where a web application handles a sensitive action through multiple simultaneous requests. If the backend is vulnerable, it may process your malicious request alongside a legitimate one at the same time!


You can find this vulnerability in the following functionalities of web applications:

1. User Account Creation – Creating multiple accounts using the same email.


2. Account Deletion – Deleting a victim’s account without logging into their account.


3. Email Verification Bypass – Sending the same verification link to both the real and an external email address.


4. Password Reset Flows – Sending a reset link to both the victim’s and attacker’s email addresses simultaneously.


5. Privilege Escalation During Role Assignment – Creating a normal user and assigning admin privileges at the same time using the same email.


6. Coupon/Voucher Redemption – Redeeming the same coupon multiple times before it's marked as used.


7. Payment Processing – Performing multiple payments or withdrawals with insufficient balance.


8. File Upload – Uploading multiple files at the same endpoint simultaneously, potentially triggering remote code execution (RCE).


9. Voting or Rating Systems – Sending multiple votes or ratings at the same time using the same request.


10. Subscription Plan Upgrades – Triggering parallel requests to gain a higher-tier plan without being properly charged.

I will try to share many techniques to find and exploit these functionalities. If you guys enjoy to read this don't forget to react πŸ”₯
And follow me πŸ‘‰πŸΌ
DarkShadow
πŸ”₯24πŸ‘4❀3
May the colours of the new year paint your life with bountiful happiness and joy. Happy Pohela Boishakh! ❀✨
Please open Telegram to view this post
VIEW IN TELEGRAM
1❀19
⚠️Trishul - A web-based framework for mobile application security testing. Trishul simplifies the process of setting up and using tools like Frida for application hooking and security analysis.

⭐️https://github.com/xronyx/Trishul/
Please open Telegram to view this post
VIEW IN TELEGRAM
❀12πŸ‘3😱2
β˜„οΈGLPI Vulnerability - CVE-2025-24799 Unauthenticated SQL Injection Exploit. An unauthenticated user can perform a SQL injection through the inventory endpoint.


⚑️Exploit: https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Are you using a VPS for bug bounty or cybersecurity stuff?
Tired of all the hassle when moving small files around? πŸ‘»

Try this absolute gem πŸ”₯

cat filename.txt | nc termbin.com 9999


πŸ–₯Boom! You get a link like https://termbin.com/abcd β€” share it, save it, or just keep it for later. No login, no setup. Just pure terminal magic. ✨

Perfect for notes, PoCs, or scripts when you're working remotely on a VPS. πŸ’»πŸ”’

#bugbounty #cybersecurity #linuxTips #vps #infosec #hacking #brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❀15πŸ‘5πŸ”₯1
⚑While reading JavaScript files, I discovered a Broken Access Control vulnerability!

Guys, while analyzing a JS file, I noticed the target was using a dynamic app structure. Inside the JS file, I found some hardcoded URLs related to the dashboard view, including tokens β€” which instantly caught my attention!

Out of curiosity, I tried accessing those URLs without the token, and it redirected me to the login page. But once I accessed them with the token… BOOM! I got full access to the dashboard without any authentication! πŸ’₯

Never skip manually reviewing JS files β€” they often contain juicy endpoints and hidden treasures! πŸ’―

Follow me πŸ‘‰πŸΌ DarkShadow

#bugbountytips
πŸ‘16πŸ‘3πŸ”₯3❀2😱2