Brut Security
15K subscribers
955 photos
76 videos
290 files
999 links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: [email protected]
Download Telegram
You Can Find Race Condition Vulnerabilities ✨

Try to understand what it is:
This vulnerability occurs when a system's behavior depends on the timing of concurrent operations, allowing attackers to gain unauthorized access or perform unauthorized actions.

The main concept to exploit it is by abusing functionality where a web application handles a sensitive action through multiple simultaneous requests. If the backend is vulnerable, it may process your malicious request alongside a legitimate one at the same time!


You can find this vulnerability in the following functionalities of web applications:

1. User Account Creation – Creating multiple accounts using the same email.


2. Account Deletion – Deleting a victim’s account without logging into their account.


3. Email Verification Bypass – Sending the same verification link to both the real and an external email address.


4. Password Reset Flows – Sending a reset link to both the victim’s and attacker’s email addresses simultaneously.


5. Privilege Escalation During Role Assignment – Creating a normal user and assigning admin privileges at the same time using the same email.


6. Coupon/Voucher Redemption – Redeeming the same coupon multiple times before it's marked as used.


7. Payment Processing – Performing multiple payments or withdrawals with insufficient balance.


8. File Upload – Uploading multiple files at the same endpoint simultaneously, potentially triggering remote code execution (RCE).


9. Voting or Rating Systems – Sending multiple votes or ratings at the same time using the same request.


10. Subscription Plan Upgrades – Triggering parallel requests to gain a higher-tier plan without being properly charged.

I will try to share many techniques to find and exploit these functionalities. If you guys enjoy to read this don't forget to react πŸ”₯
And follow me πŸ‘‰πŸΌ
DarkShadow
πŸ”₯24πŸ‘4❀3
May the colours of the new year paint your life with bountiful happiness and joy. Happy Pohela Boishakh! ❀✨
Please open Telegram to view this post
VIEW IN TELEGRAM
1❀19
⚠️Trishul - A web-based framework for mobile application security testing. Trishul simplifies the process of setting up and using tools like Frida for application hooking and security analysis.

⭐️https://github.com/xronyx/Trishul/
Please open Telegram to view this post
VIEW IN TELEGRAM
❀12πŸ‘3😱2
β˜„οΈGLPI Vulnerability - CVE-2025-24799 Unauthenticated SQL Injection Exploit. An unauthenticated user can perform a SQL injection through the inventory endpoint.


⚑️Exploit: https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Are you using a VPS for bug bounty or cybersecurity stuff?
Tired of all the hassle when moving small files around? πŸ‘»

Try this absolute gem πŸ”₯

cat filename.txt | nc termbin.com 9999


πŸ–₯Boom! You get a link like https://termbin.com/abcd β€” share it, save it, or just keep it for later. No login, no setup. Just pure terminal magic. ✨

Perfect for notes, PoCs, or scripts when you're working remotely on a VPS. πŸ’»πŸ”’

#bugbounty #cybersecurity #linuxTips #vps #infosec #hacking #brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❀15πŸ‘5πŸ”₯1
⚑While reading JavaScript files, I discovered a Broken Access Control vulnerability!

Guys, while analyzing a JS file, I noticed the target was using a dynamic app structure. Inside the JS file, I found some hardcoded URLs related to the dashboard view, including tokens β€” which instantly caught my attention!

Out of curiosity, I tried accessing those URLs without the token, and it redirected me to the login page. But once I accessed them with the token… BOOM! I got full access to the dashboard without any authentication! πŸ’₯

Never skip manually reviewing JS files β€” they often contain juicy endpoints and hidden treasures! πŸ’―

Follow me πŸ‘‰πŸΌ DarkShadow

#bugbountytips
πŸ‘16πŸ‘3πŸ”₯3❀2😱2
This media is not supported in your browser
VIEW IN TELEGRAM
πŸš€ Launching Soon: Bug Bounty Domain Scraper – Firefox Extension! 🦊

Tired of manually collecting scopes from HackerOne, Bugcrowd, or other platforms? This upcoming Firefox extension is built just for bug bounty hunters like YOU! πŸ’£πŸ’»

πŸ”What it does:
βœ… Scrapes wildcard & normal domains from any bug bounty program page
βœ… Filters out the noise and keeps only clean domains
βœ… Saves results in .txt format β€” one domain per line
βœ… Bonus: One-click copy to clipboard!
βœ… No coding knowledge required β€” just install & click

πŸ§ͺ Tested and working perfectly.
πŸ“¦ Official launch coming SOON. Stay tuned for the drop!

#bugbounty #infosec #tools #bugbountyTips #recon #firefox #cybersecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯27πŸ‘9❀4
Join Discord - πŸ€– https://discord.gg/u7uMFV833h πŸ€–
πŸ‘3
Don't forget to give a Like & Star :)
❀12
πŸ₯· Hall of Fame @ GEA.com – done!
Thanks to my automations, finding bugs is easier than ever.

πŸ“©
DM

#bugbounty #halloffame #webpentesting #automation #brutsecurity #infosec
1πŸ‘9❀7πŸ‘3πŸ”₯3
⚑ Find XSS in One of the Most Commonly Vulnerable Parts of a Website πŸ’₯

You’ve probably seen websites with an AI-powered chatbot feature, right?
Well, this is one of the spots where I often find XSS vulnerabilities with ease.

Try it out β€”
but always remember to use document.domain to verify whether the payload is executing on your in-scope domain or inside an iframe from a different domain. This helps confirm if the XSS is actually exploitable or sandboxed.


Don't forget to react and follow me πŸ‘‰πŸΌ DarkShadow 😁

#xss #Bugbountytips
❀19πŸ—Ώ5πŸ‘3🐳2🀝2
⚑Hello Hunters! Ready to find your first bounty? Try this underrated approach! ✨

Most bug hunters go after common issues like XSS, SQLi, SSRF, CSRF, IDOR, open redirection, CVEs, or use automated scanners. But don't sleep on JavaScript file analysis β€” it's a goldmine for critical bugs.

Automated tools help extract endpoints and sensitive info, but manual JS review reveals the real logic and flow of the app β€” things scanners often miss.

Here are vulnerabilities you can find just by reading JS files:

1. Authentication bypass
2. Sensitive info leaks
3. Hardcoded credentials
4. Config/env file disclosure
5. Hidden login portals
6. JWT secrets & API keys
7. Outdated services loed CVE to exploit
8. Dependency confusion
9. File upload endpoints
10. RFI β†’ RCE
11. Open redirection
12. DOM-based XSS
13. WebSocket endpoints
14. Hidden parameters
15. IDOR


Pro tip:
don’t ignore <script> tags in HTML/PHP files β€” they can might triggered RFI, LFI, and more.

Upcoming posts will reveal step-by-step methodologies for JavaScript file analysis to uncover critical vulnerabilities.
Till then, keep learning, keep exploring.

Follow me πŸ‘‰πŸΌ DarkShadow

#BugBountytips@brutsecurity
❀26πŸ‘9😁3πŸ”₯2🀝2
Brut Security
Launching Soon!
Where is the reactions?
😁23πŸ‘9🀣7πŸ—Ώ4🀨1πŸ‘¨β€πŸ’»1