Brut Security
14.8K subscribers
920 photos
73 videos
287 files
976 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Brut Security pinned ยซโ–ถ๏ธ It's LIVE! ๐Ÿ“ŒSubWatch โ€“ your next favorite tool for automated subdomain monitoring! ๐Ÿ” โœ… Runs every 6 hours โœ… Sends newly found subdomains directly to your Discord โœ… Includes .txt file + message alerts โœ… Perfect for bug bounty hunters & recon workflowsโ€ฆยป
CVE-2025-47110: Cross-site Scripting in Magento (and Adobe Commerce), 9.1 rating ๐Ÿ”ฅ

An XSS vulnerability in Magento and Adobe Commerce allows an attacker to inject code into vulnerable forms and execute it in the victim's browser.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/v6wk6
๐Ÿ‘‰ Dork: tag.name:"magento" AND http.headers.server:"Apache"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb25-50.html
โค10๐Ÿ‘3
CVE-2025-4798, -4799: Absolute Path Traversal in DownloadManager WordPress Plugin, 4.9 - 7.2 ratingโ—๏ธ

Vulnerabilities shared with us by the pen tester who found them. Allow attackers to manipulate files on the server, which can lead to RCE.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/DH8EA
๐Ÿ‘‰ Dork: http.body:"plugins/wp-downloadmanager"

More information here: https://youtu.be/QTe3rf0-e7U?si=THZKoKeI1vN-arR7
๐Ÿ‘8โค2
๐Ÿคฃ49๐Ÿ˜3๐Ÿ˜ข2
Hey Hunters,
Sorry for the delayโ€”
DarkShadow here, back again dropping one of my secret methodologies ๐Ÿ˜

๐ŸŒ€ AWS S3 Bucket Takeover Like a Pro โ€” Super Simple but Highly Effective ๐Ÿ”ฅ

โœจBefore diving in, letโ€™s understand the whole scenario...

๐Ÿ‘€ 1. Which buckets are vulnerable to takeover?
๐Ÿ‘€ 2. Whatโ€™s the real impact of taking over an S3 bucket?
๐Ÿ‘€ 3. How do we find S3 buckets that are potentially vulnerable?
๐Ÿ‘€ 4. How can we validate whether a bucket was actually used by the target?


โšก 1. Vulnerable Buckets:
If a target previously used an S3 bucket and deleted itโ€”but the subdomain (CNAME) is still pointing to amazonaws.comโ€”thatโ€™s a perfect takeover opportunity.

โšก 2. Impact:
If the bucket is still referenced anywhere in the backend or services, and the target forgot to remove it, you might even achieve RCE. In some cases, it can lead to full system compromise.

โšก 3. Finding Buckets (Using FOFA):
Hereโ€™s how I hunt them down using FOFA:

๐Ÿง  FOFA Dork:

body="specified bucket does not exist" && (host="target.com" || host="target_domain_name_only") && port="443"

๐Ÿ” This dork gives you subdomains that point to missing or deleted buckets. FOFA indexes fingerprints across the webโ€”even for deleted resourcesโ€”so itโ€™s a goldmine for finding exposed assets the target forgot.

โšก 4. Validating Ownership:

๐Ÿ”Ž Method 1: GitHub Recon
Use GitHub dorks like:

org:target_org "target.s3.amazonaws.com"


Or simply search:

"target.s3.amazonaws.com"


You might discover hardcoded links, past commits, or configuration files that prove the target was using this bucket.

๐ŸŒ Method 2: DNS History (Not Always Effective, But Worth a Shot)
Check if the bucket was ever configured for static website hosting.

Use these tools to check historical DNS records:

https://securitytrails.com
https://dnsdumpster.com
https://viewdns.info
https://www.robtex.com

If any DNS leaks or CNAME records are found, analyze them to build your proof of ownership.


๐ŸŽฏ So guys, I hope you enjoyed reading this little piece of my methodology.
๐Ÿ’ฅ Donโ€™t forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#dork #takeover #bugbountytips
๐Ÿ‘15โค12๐Ÿ‘2๐Ÿณ2๐Ÿ”ฅ1
dON'T fORGET tO gIVE rEACTIONS
๐Ÿ—ฟ15๐Ÿซก9โค6๐Ÿ‘6๐Ÿณ5
Channel photo updated
๐Ÿ” Bug Bounty Tip โ€“ PDF Keyword Crawler

Hunting for sensitive info in public PDFs?

๐Ÿงฉ Use PDF Keyword Crawler Firefox add-on
๐Ÿ“ Load your urls.txt (with .pdf links)
๐Ÿ”‘ It scans for sensitive keywords automatically!

๐Ÿง  Great for discovering leaked secrets, creds, or internal docs.

๐Ÿ‘‰ Add-on: https://addons.mozilla.org/es-AR/firefox/addon/pdf-keyword-crawler/
๐Ÿ”ฅ9โค6
โšกPoC Exploit for the NTLM reflection SMB flaw CVE-2025-33073

โœ…
https://github.com/mverschu/CVE-2025-33073

๐Ÿ‘‰Follow
Brut on X
โค5๐Ÿ”ฅ3๐Ÿ™1
โšก๏ธOutdated but Helpful Some MySQL tricks to break some #WAFs out there. โš”๏ธ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
โค35๐Ÿ‘7๐Ÿ˜ฑ3๐Ÿ—ฟ2๐Ÿซก1
Where is the reactions? Please Keep Supporting Us by giving reactoins!
1๐Ÿ‘22โค11๐Ÿ”ฅ7๐Ÿ‘5
CVE-2025-4278, -5121, 2254 and other: Multiple vulnerabilities in GitLab, 3.7 - 8.7 ratingโ—๏ธ

In recent patch notes, GitLab reported ten vulnerabilities, including HTML injection, XSS, DoS, and more.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/dq6qU
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/#cve-2025-5121---missing-authorization-issue-impacts-gitlab-ultimate-ee
โค9
๐Ÿ‡ฎ๐Ÿ‡ณ Operation CyberShakti
Independence Day Special Batch
Only for Beginners

๐Ÿ’ป Ethical Hacking & Web Pentesting
๐Ÿ“… Duration: 2 Months (Live Classes)
๐Ÿ‘ฅ 10 Students Per Batch
๐Ÿ’ฐ โ‚น3999
๐ŸŒ
https://brutsec.com/CyberShakti.pdf

๐Ÿ“ฉ Join / Ask Queries
Telegram: @wtf_brut
WhatsApp: wa.link/brutsecurity
https://wa.me/+918945971332

No experience? No problem.
Learn from scratch. Build real skills.
Only at Brut Security.


#OperationCyberShakti #BrutSecurity #EthicalHacking #BugBounty #Cybersecurity #BeginnersOnly
1โค12๐Ÿ”ฅ2๐Ÿค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ต๏ธโ€โ™‚๏ธ Bug Bounty Tip - Extract JavaScript File URLs from Any Page!

Forget opening DevTools - use this bookmarklet to instantly extract all .js file URLs and download them in a .txt file.

๐Ÿš€ Why this matters:

Quickly collect all linked JavaScript files
Use them for static analysis (LinkFinder, SecretFinder, etc.)
Great for recon, endpoint discovery & auth bypasses

๐Ÿ“Œ Bookmarklet Code:
javascript:(function(){let urls=[];document.querySelectorAll('*').forEach(e=>{urls.push(e.src,e.href,e.url)});urls=[...new Set(urls)].filter(u=>u&&u.endsWith('.js')).join('\n');let blob=new Blob([urls],{type:'text/plain'});let a=document.createElement('a');a.href=URL.createObjectURL(blob);a.download='javascript_urls.txt';a.click();})();

๐Ÿ’ก How to use:
Create a new bookmark in your browser.
Paste the above code into the URL field.
Visit a target site and click the bookmark.
A javascript_urls.txt file will be downloaded with all .js links.

๐Ÿ”ฅ Now you can feed that into:
LinkFinder
SecretFinder
JSParser
Or manual analysis!
๐Ÿ”ฅ30โค21๐Ÿ‘2๐Ÿ‘2๐Ÿณ1๐Ÿค1
โšกDependency Confusion via JS Miner

@GodfatherOrwa just landed a clean P1 by leveraging JS Miner in Burp Suite ๐Ÿ”ฅ

Hereโ€™s how it went down ๐Ÿ‘‡

๐Ÿงฉ After crawling all endpoints, he went to:
Target โž Extensions โž JS Miner โž Run All Passive Scans

๐Ÿ’ฅ Thatโ€™s when he spotted: [JS Miner] Dependency Confusion
The vulnerable package was unclaimed on NPM ๐Ÿ‘€

๐Ÿ“ฆ Next steps he followed:

npm login
mkdir <package-name> && cd <package-name>
npm init -y
npm publish --access public


After claiming the package, he injected an RCE payload via package.json
๐Ÿงช Full POC: github.com/orwagodfather/NPM-RCE

๐Ÿ’ฃ Result? A solid P1 vulnerability and a perfect example of how effective Dependency Confusion still is.

Props to @GodfatherOrwa for consistently dropping fire techniques ๐Ÿ”ฅ
๐Ÿ”ฅ16โค8๐Ÿ—ฟ4๐Ÿ‘1