Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
dON'T fORGET tO gIVE rEACTIONS
๐Ÿ—ฟ15๐Ÿซก9โค6๐Ÿ‘6๐Ÿณ5
Channel photo updated
๐Ÿ” Bug Bounty Tip โ€“ PDF Keyword Crawler

Hunting for sensitive info in public PDFs?

๐Ÿงฉ Use PDF Keyword Crawler Firefox add-on
๐Ÿ“ Load your urls.txt (with .pdf links)
๐Ÿ”‘ It scans for sensitive keywords automatically!

๐Ÿง  Great for discovering leaked secrets, creds, or internal docs.

๐Ÿ‘‰ Add-on: https://addons.mozilla.org/es-AR/firefox/addon/pdf-keyword-crawler/
๐Ÿ”ฅ9โค6
โšกPoC Exploit for the NTLM reflection SMB flaw CVE-2025-33073

โœ…
https://github.com/mverschu/CVE-2025-33073

๐Ÿ‘‰Follow
Brut on X
โค5๐Ÿ”ฅ3๐Ÿ™1
โšก๏ธOutdated but Helpful Some MySQL tricks to break some #WAFs out there. โš”๏ธ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
โค35๐Ÿ‘7๐Ÿ˜ฑ3๐Ÿ—ฟ2๐Ÿซก1
Where is the reactions? Please Keep Supporting Us by giving reactoins!
1๐Ÿ‘22โค11๐Ÿ”ฅ7๐Ÿ‘5
CVE-2025-4278, -5121, 2254 and other: Multiple vulnerabilities in GitLab, 3.7 - 8.7 ratingโ—๏ธ

In recent patch notes, GitLab reported ten vulnerabilities, including HTML injection, XSS, DoS, and more.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/dq6qU
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/#cve-2025-5121---missing-authorization-issue-impacts-gitlab-ultimate-ee
โค9
๐Ÿ‡ฎ๐Ÿ‡ณ Operation CyberShakti
Independence Day Special Batch
Only for Beginners

๐Ÿ’ป Ethical Hacking & Web Pentesting
๐Ÿ“… Duration: 2 Months (Live Classes)
๐Ÿ‘ฅ 10 Students Per Batch
๐Ÿ’ฐ โ‚น3999
๐ŸŒ
https://brutsec.com/CyberShakti.pdf

๐Ÿ“ฉ Join / Ask Queries
Telegram: @wtf_brut
WhatsApp: wa.link/brutsecurity
https://wa.me/+918945971332

No experience? No problem.
Learn from scratch. Build real skills.
Only at Brut Security.


#OperationCyberShakti #BrutSecurity #EthicalHacking #BugBounty #Cybersecurity #BeginnersOnly
1โค12๐Ÿ”ฅ2๐Ÿค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ต๏ธโ€โ™‚๏ธ Bug Bounty Tip - Extract JavaScript File URLs from Any Page!

Forget opening DevTools - use this bookmarklet to instantly extract all .js file URLs and download them in a .txt file.

๐Ÿš€ Why this matters:

Quickly collect all linked JavaScript files
Use them for static analysis (LinkFinder, SecretFinder, etc.)
Great for recon, endpoint discovery & auth bypasses

๐Ÿ“Œ Bookmarklet Code:
javascript:(function(){let urls=[];document.querySelectorAll('*').forEach(e=>{urls.push(e.src,e.href,e.url)});urls=[...new Set(urls)].filter(u=>u&&u.endsWith('.js')).join('\n');let blob=new Blob([urls],{type:'text/plain'});let a=document.createElement('a');a.href=URL.createObjectURL(blob);a.download='javascript_urls.txt';a.click();})();

๐Ÿ’ก How to use:
Create a new bookmark in your browser.
Paste the above code into the URL field.
Visit a target site and click the bookmark.
A javascript_urls.txt file will be downloaded with all .js links.

๐Ÿ”ฅ Now you can feed that into:
LinkFinder
SecretFinder
JSParser
Or manual analysis!
๐Ÿ”ฅ30โค21๐Ÿ‘2๐Ÿ‘2๐Ÿณ1๐Ÿค1
โšกDependency Confusion via JS Miner

@GodfatherOrwa just landed a clean P1 by leveraging JS Miner in Burp Suite ๐Ÿ”ฅ

Hereโ€™s how it went down ๐Ÿ‘‡

๐Ÿงฉ After crawling all endpoints, he went to:
Target โž Extensions โž JS Miner โž Run All Passive Scans

๐Ÿ’ฅ Thatโ€™s when he spotted: [JS Miner] Dependency Confusion
The vulnerable package was unclaimed on NPM ๐Ÿ‘€

๐Ÿ“ฆ Next steps he followed:

npm login
mkdir <package-name> && cd <package-name>
npm init -y
npm publish --access public


After claiming the package, he injected an RCE payload via package.json
๐Ÿงช Full POC: github.com/orwagodfather/NPM-RCE

๐Ÿ’ฃ Result? A solid P1 vulnerability and a perfect example of how effective Dependency Confusion still is.

Props to @GodfatherOrwa for consistently dropping fire techniques ๐Ÿ”ฅ
๐Ÿ”ฅ16โค8๐Ÿ—ฟ4๐Ÿ‘1
๐Ÿ” Bug Bounty Web Checklist
โœ…Track your web pentesting progress by checking each subcategory.
๐Ÿ‘‰https://nemocyberworld.github.io/BugBountyCheckList/
โค24๐Ÿ‘9
๐Ÿคก
๐Ÿ‘จโ€๐Ÿ’ป9๐Ÿ˜4๐Ÿ‘2๐Ÿคจ2
๐Ÿค15๐Ÿณ6โค2
BBRecon Masterflow - 2025.pdf
30.4 KB
๐Ÿš€ Bug Bounty Recon Masterflow โ€“ 2025 Edition ๐Ÿ”Ž
๐Ÿ˜9โค6๐Ÿ‘4๐Ÿ‘จโ€๐Ÿ’ป3