Brut Security
14.8K subscribers
939 photos
73 videos
287 files
984 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: [email protected]
Download Telegram
🔥 uff is a custom ffuf fork that relies on modified net/http and net/url libraries to go beyond what regular ffuf can do.

https://github.com/sw33tLie/uff
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥9👍3
⚡️ShrewdEye (sheye) is a set of utilities bundled into a single automated workflow to improve, simplify, and speed up resource discovery and vulnerabilities finding.

✔️https://github.com/zzzteph/sheye
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2210👍5
Why there is no reactions🙂?

Do let us know what content you guys looking for 👀
Please open Telegram to view this post
VIEW IN TELEGRAM
34😢5👍3🤝3😁1
🔥 Tried something new! Just dropped a quick guide on rooting Android Emulator + setting up Burp Suite for HTTPS interception.

Manual setup
Magisk + rootAVD
Trusted Burp cert
Meme vibes included 😎

📖 Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
1🔥238
Hey Hunters,

DarkShadow here back again—sorry for the delay, I’ve been a little sick. Please keep me in your prayers.

Anyway, just dropping a trick on how an out-of-scope target can lead to an in-scope critical vulnerability!

The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further what’s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.

But here’s the twist—it was still showing the content from the original website I had requested. So I thought, maybe it’s working like a proxy?

Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside it—a config.php file.

Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessible—not just localhost!

I tried connecting… and boom! I was successfully connected.
But wait—this domain is out of scope, right?

That’s what I thought too… until I started reading there massive database and was shocked—
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.


At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly that—added an admin user to the database.

Now, on the target website, there’s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?

BOOM! 💥
It logged me into the admin dashboard.


And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.


So guys, if you enjoyed this method, don’t forget to show some love—and please, pray for me, I’m really sick right now.

And don’t forget to follow me on X (Twitter):
x.com/Darkshadow2bd

#bugbountytips #infosec
👏2010👍5😱4
https://powerade.com.s3.amazonaws.com/index.html

guy's let's see whos explaination is better!

what is the impact after takeover a in-scop target S3 bucket?🤔
👍11🔥51🗿1
Hey Hunter's,
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.

Before, don't forget to share and show your love guy's.
For more follow me on my X 👉🏼
DarkShadow
24👍4👏3
CVE-2025-47577: Unrestricted Upload of File with Dangerous Type in TI WooCommerce Wishlist Plugin, 10.0 rating 🔥🔥🔥

Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.

Search at Netlas.io:
👉 Link: https://nt.ls/jYyss
👉 Dork: http.body:"plugins/ti-woocommerce-wishlist"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
😱84👍2
😢8🗿1
List of 100 Web Vulnerabilities
🤝30🫡6🗿2😁1👨‍💻1
📣 1 Month Discord Nitro Giveaway! 📣

Want a free month of Discord Nitro? Here's your chance to win! 🔥

To enter:
1️⃣ Follow me on Medium: https://medium.com/@0xbrut
2️⃣ Send a screenshot as proof to my Telegram bot ✏️ @brutsecurity_bot

That’s it! 💥
Don’t miss out – support me and get a shot at Nitro! 💎
Please open Telegram to view this post
VIEW IN TELEGRAM
14🔥2🗿2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
csprecon - Discover new target domains using Content Security Policy

🚨https://github.com/edoardottt/csprecon
🔥122
dON'T fORGET tO gIVE rEACTIONS
1🤝22🗿8
Hacking XSS with Browsers https://hackerone.com/reports/1209098
🤣393🔥2🗿1
⚠️wpprobe - WPProbe is a fast and efficient WordPress plugin scanner that leverages REST API enumeration (?rest_route) to detect installed plugins without brute-force.

🖥https://github.com/Chocapikk/wpprobe
Please open Telegram to view this post
VIEW IN TELEGRAM
16🔥6
Hey Hunter's,
DarkShadow here back again, dropping a really interesting thing!

🔥RCE in Auth Login

Don't forget to show your love hacker's ❤️
👏2714🫡7👍2🔥1🤨1
Hey Hunter's,
DarkShadow here back again, just dropping a simple dork that find every VDP in worl wide 😎

(body="/responsible-disclosure" || body="/.well-known/security.txt") && port="443"



#bugbountytips #infosec #dork
🔥168😁4🐳2🗿2👍1