Brut Security
14.8K subscribers
946 photos
75 videos
289 files
990 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Hey Hunters,

DarkShadow here again. We all know how frustrating it is to test file upload vulnerabilitiesโ€”sometimes the file uploads, but you canโ€™t execute it because WAFs or IDS jump in.

So, Iโ€™ve built a next-level, compact script that actually bypasses most WAF and IDS protections. It uses 3 stealth techniques to evade restrictions and offers 2 output modes for flexibility.

What makes it even cooler?
No password needed.
It uses a unique auth mechanism based on the User-Agent headerโ€”no login form, no cookies, nothing else. If your User-Agent matches, youโ€™re in. If not, the script wonโ€™t even respond.



Wanna try it out? drop a comment and let me know. And of course, follow me on X โ†’ DarkShadow

#wafbypass
๐Ÿ˜ฑ8๐Ÿ‘7โค6๐Ÿ”ฅ4๐Ÿณ1๐Ÿ—ฟ1
Hey Hunter's,
DarkShadow here back again. Dropping a Google XSS POC1๐Ÿ˜

โœ…POC steps:
Vuln host: aihub.cloud.google.com
Vuln param: /url?q= (GET method)
Tecniq: double url encoding 
Payload: "><svg/onload=alert(document.domain)>

a simple XSS payload as usual๐Ÿ˜

The vulnerability has been patched๐Ÿฅฑ

Don't forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#xss #poc #googlebug
๐Ÿ˜ฑ10๐Ÿ‘7๐Ÿ”ฅ4๐Ÿซก2๐Ÿ—ฟ1
โšกWaybackLister is a reconnaissance tool that taps into the Wayback Machine to fetch historical URLs for a domain, parses unique paths, and checks if any of those paths currently expose directory listings. It's fast, multithreaded, and built for practical use in security assessments and bug bounty recon.

โœ…https://github.com/anmolksachan/wayBackLister

โœ… Join Telegram For More Content: t.iss.one/brutsecurity
----------------------------------------------------------
๐ŸŽ“ Ready to Skill Up? Enroll Now โ†’ wa.link/brutsecurity

#CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity
โค9๐Ÿ‘7๐Ÿ”ฅ5
CVE-2025-27007: Privilege Escalation in OttoKit WordPress Plugin, 9.8 rating ๐Ÿ”ฅ

Errors in the logic of the plugin's API could potentially lead to an attacker gaining access to the administrator account. According to Patchstack, exploitation of the vulnerability began just an hour after public disclosure!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/y4FXX
๐Ÿ‘‰ Dork: http.body:"plugins/suretriggers"

Read more: https://patchstack.com/database/wordpress/plugin/suretriggers/vulnerability/wordpress-suretriggers-1-0-82-privilege-escalation-vulnerability?_s_id=cve
๐Ÿ‘14
Good morning hackers ๐Ÿฅฑ
Need more Google bug POC's? ๐Ÿ˜


ใ…ค
๐Ÿ‘33๐Ÿ”ฅ8๐Ÿ˜2๐Ÿค2
๐Ÿ“CPTS Cheat Sheet
๐Ÿ”—
https://github.com/zagnox/CPTS-cheatsheet
โค11๐Ÿค3
๐Ÿ”ฅSensitive informations leaks vai fofa Dorking ๐Ÿ’ฅ

Hey Hunter's, DarkShadow back again dropping a simple and effective dork.

Leaking firebase configurations๐Ÿ‘€

Fofa query:
body="firebaseapp" && domain="example.com"

Or

(body="firebaseapp" || body="firebaseconfig") && host=".target_domain_name_only"


If you guy's really enjoy to read my methodology's don't forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#dork #bugbountytips
๐Ÿ—ฟ8๐Ÿ‘6โค4
Hey Hunter's,
Dark Shadow here back again. Dropping a Google XSS POC-2๐Ÿ˜

โœ…POC steps:

โ€ขVuln host: books.google.com
โ€ขXss type: stored based XSS
โ€ขVuln param: book name title and publisher name parameter.
โ€ขTechnique: direct inject the payload. Without any kind of encoding. (Reason: no input sanitization)
Payload: "><svg/onload=prompt(1)>

A simple payload can flip the game if you are use it in right place.๐Ÿ˜
The vulnerability has been patched๐Ÿฅฑ

Let me knowโ€”arenโ€™t you all interested to know that Google rewarded $31,337 for an SSRF vulnerability?
And
Don't forget to follow me ๐Ÿ‘‰๐Ÿผ
DarkShadow  

#xss #googlebug
๐Ÿ”ฅ23๐Ÿ—ฟ8๐Ÿ‘4โค2๐Ÿณ2
๐Ÿคฃ39๐Ÿ˜ข2๐Ÿ”ฅ1
CVE-2025-20188: Use of Hard-coded Credentials in Cisco IOS XE, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

Due to hard-coded JWT, Cisco IOS XE instances may be vulnerable to arbitrary file uploads, path traversal, and arbitrary command execution. Catalyst controllers are primarily affected.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/BKkJI
๐Ÿ‘‰ Dork: certificate.issuer_dn:"IOS-Self-Signed-Certificate"

Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-file-uplpd-rHZG9UfC
๐Ÿ”ฅ6๐Ÿ‘2๐Ÿ˜ฑ1
Hey Hunter's,

If you're facing difficulties setting up Kali NetHunter, then Proot-Distro is a powerful and user-friendly alternative. It offers an easy and comprehensive solution for running multiple Linux distributions directly in Termuxโ€”no root required.


Explore it on GitHub:

https://github.com/termux/proot-distro
๐Ÿ‘จโ€๐Ÿ’ป5โค4๐Ÿ—ฟ1
Hey Hunter's
DarkShadow here โ€” back again with some killer techniques most bug bounty hunters overlook.

IP Spoofing Headers for Bypass & Testing:

X-Forwarded-For: 127.0.0.1
# Trusted by proxies/load balancers
X-Real-IP: 127.0.0.1
# Common in NGINX setups
X-Client-IP: 127.0.0.1
# Used for rate limiting/tracking
X-Remote-IP: 127.0.0.1
# May influence backend logic
X-Remote-Addr: 127.0.0.1
# Tries to override remote IP
True-Client-IP: 127.0.0.1
# Used by CDNs (e.g. Akamai)
CF-Connecting-IP: 127.0.0.1
# Cloudflare real IP header
Fastly-Client-IP: 127.0.0.1
# Fastly CDN client IP
X-Cluster-Client-IP: 127.0.0.1
# Seen in clustered environments
Forwarded: for=127.0.0.1
# RFC standard version of XFF
X-Originating-IP: 127.0.0.1
# Used by mail servers & legacy apps
X-Forwarded-Host: 127.0.0.1
# Can affect virtual host routing
X-Forwarded-Server: 127.0.0.1
# Backend routing logic
X-Real-Hostname: localhost
# Tries to spoof internal host
Via: 127.0.0.1
# May appear in proxy chains
Forwarded-For: 127.0.0.1
# Non-standard but seen in wild
Proxy-Client-IP: 127.0.0.1
# Java-based servers (Tomcat)
WL-Proxy-Client-IP: 127.0.0.1
# WebLogic-specific header
๏ปฟ

Use: Bypass IP whitelisting, rate limits, geo-blocks, SSRF filters, or trigger internal behavior. Combine multiple for better results in black-box testing.

Don't forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#bugbountytips #wafbypass
๐Ÿ”ฅ23โค7๐Ÿ‘4๐Ÿ—ฟ3๐Ÿค2