https://github.com/sw33tLie/uff
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥9👍3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥22❤10👍5
Why there is no reactions🙂 ?
Do let us know what content you guys looking for👀
Do let us know what content you guys looking for
Please open Telegram to view this post
VIEW IN TELEGRAM
❤34😢5👍3🤝3😁1
🔥 Tried something new! Just dropped a quick guide on rooting Android Emulator + setting up Burp Suite for HTTPS interception.
✅ Manual setup
✅ Magisk + rootAVD
✅ Trusted Burp cert
✅ Meme vibes included 😎
📖 Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
✅ Manual setup
✅ Magisk + rootAVD
✅ Trusted Burp cert
✅ Meme vibes included 😎
📖 Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
1🔥23❤8
Hey Hunters,
DarkShadow here back again—sorry for the delay, I’ve been a little sick. Please keep me in your prayers.
The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further what’s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.
But here’s the twist—it was still showing the content from the original website I had requested. So I thought, maybe it’s working like a proxy?
Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside it—a config.php file.
Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessible—not just localhost!
I tried connecting… and boom! I was successfully connected.
But wait—this domain is out of scope, right?
That’s what I thought too… until I started reading there massive database and was shocked—
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.
At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly that—added an admin user to the database.
Now, on the target website, there’s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?
BOOM! 💥
It logged me into the admin dashboard.
And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.✅
So guys, if you enjoyed this method, don’t forget to show some love—and please, pray for me, I’m really sick right now.
And don’t forget to follow me on X (Twitter): x.com/Darkshadow2bd
#bugbountytips #infosec
DarkShadow here back again—sorry for the delay, I’ve been a little sick. Please keep me in your prayers.
Anyway, just dropping a trick on how an out-of-scope target can lead to an in-scope critical vulnerability!
The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further what’s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.
But here’s the twist—it was still showing the content from the original website I had requested. So I thought, maybe it’s working like a proxy?
Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside it—a config.php file.
Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessible—not just localhost!
I tried connecting… and boom! I was successfully connected.
But wait—this domain is out of scope, right?
That’s what I thought too… until I started reading there massive database and was shocked—
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.
At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly that—added an admin user to the database.
Now, on the target website, there’s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?
BOOM! 💥
It logged me into the admin dashboard.
And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.✅
So guys, if you enjoyed this method, don’t forget to show some love—and please, pray for me, I’m really sick right now.
And don’t forget to follow me on X (Twitter): x.com/Darkshadow2bd
#bugbountytips #infosec
👏20❤10👍5😱4
https://powerade.com.s3.amazonaws.com/index.html
guy's let's see whos explaination is better!
what is the impact after takeover a in-scop target S3 bucket?🤔
guy's let's see whos explaination is better!
what is the impact after takeover a in-scop target S3 bucket?🤔
👍11🔥5❤1🗿1
Hey Hunter's,
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.
Before, don't forget to share and show your love guy's.
For more follow me on my X 👉🏼 DarkShadow
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.
Before, don't forget to share and show your love guy's.
For more follow me on my X 👉🏼 DarkShadow
❤24👍4👏3
Follow the Brut Security channel on WhatsApp: https://whatsapp.com/channel/0029VacUEmpCnA8014ZLnm1L
WhatsApp.com
Brut Security | WhatsApp Channel
Brut Security WhatsApp Channel. We offer Cyber Security Training, Penetration Testing Services and Bug Bounty Tips to protect businesses and individuals from cyber attacks. Feel Free to DM🛡️. 59 followers
🔥4
CVE-2025-47577: Unrestricted Upload of File with Dangerous Type in TI WooCommerce Wishlist Plugin, 10.0 rating 🔥🔥🔥
Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.
Search at Netlas.io:
👉 Link: https://nt.ls/jYyss
👉 Dork: http.body:"plugins/ti-woocommerce-wishlist"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.
Search at Netlas.io:
👉 Link: https://nt.ls/jYyss
👉 Dork: http.body:"plugins/ti-woocommerce-wishlist"
Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
😱8❤4👍2
Want a free month of Discord Nitro? Here's your chance to win!
To enter:
1️⃣ Follow me on Medium: https://medium.com/@0xbrut
2️⃣ Send a screenshot as proof to my Telegram bot
That’s it!
Don’t miss out – support me and get a shot at Nitro!
Please open Telegram to view this post
VIEW IN TELEGRAM
1❤4🔥2🗿2😢1
This media is not supported in your browser
VIEW IN TELEGRAM
⚡ csprecon - Discover new target domains using Content Security Policy
🚨https://github.com/edoardottt/csprecon
🚨https://github.com/edoardottt/csprecon
🔥12❤2
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
Brut Security - Bug Bounty POC's
▶️New bug bounty target! Check out ⡈⠇⣂⡠⡁⠌⡁⠔⠪⣁⠥⢃⡡⣄⢆⠪⡐⢐⠇⢰⡰⠬⢆⡘⠆⢤⢰⠸⡠⡔⢨⣁⠃⢔⡑⡂⠓⢠⢅⢤⡠⡢⡑⣁⡒⢤⢨ for details on their vulnerability disclosure program. Happy hunting! 👑✨
❤11
⭐ Hacking XSS with Browsers https://hackerone.com/reports/1209098
🤣39❤3🔥2🗿1
?rest_route) to detect installed plugins without brute-force.https://github.com/Chocapikk/wpprobePlease open Telegram to view this post
VIEW IN TELEGRAM
❤16🔥6
Please open Telegram to view this post
VIEW IN TELEGRAM
Telegram
Brut Security - Bug Bounty POC's
⚡️Browse and search bug bounty programs from various platforms.
☄️https://menaxa.xyz/programs
❗️For Queries @brutsecurity_bot
☄️https://menaxa.xyz/programs
❗️For Queries @brutsecurity_bot
❤10
Hey Hunter's,
DarkShadow here back again, just dropping a simple dork that find every VDP in worl wide 😎
#bugbountytips #infosec #dork
DarkShadow here back again, just dropping a simple dork that find every VDP in worl wide 😎
(body="/responsible-disclosure" || body="/.well-known/security.txt") && port="443"
#bugbountytips #infosec #dork
🔥16❤8😁4🐳2🗿2👍1