Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
โšกPoC Exploit for the NTLM reflection SMB flaw CVE-2025-33073

โœ…
https://github.com/mverschu/CVE-2025-33073

๐Ÿ‘‰Follow
Brut on X
โค5๐Ÿ”ฅ3๐Ÿ™1
โšก๏ธOutdated but Helpful Some MySQL tricks to break some #WAFs out there. โš”๏ธ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
โค35๐Ÿ‘7๐Ÿ˜ฑ3๐Ÿ—ฟ2๐Ÿซก1
Where is the reactions? Please Keep Supporting Us by giving reactoins!
1๐Ÿ‘22โค11๐Ÿ”ฅ7๐Ÿ‘5
CVE-2025-4278, -5121, 2254 and other: Multiple vulnerabilities in GitLab, 3.7 - 8.7 ratingโ—๏ธ

In recent patch notes, GitLab reported ten vulnerabilities, including HTML injection, XSS, DoS, and more.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/dq6qU
๐Ÿ‘‰ Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/06/11/patch-release-gitlab-18-0-2-released/#cve-2025-5121---missing-authorization-issue-impacts-gitlab-ultimate-ee
โค9
๐Ÿ‡ฎ๐Ÿ‡ณ Operation CyberShakti
Independence Day Special Batch
Only for Beginners

๐Ÿ’ป Ethical Hacking & Web Pentesting
๐Ÿ“… Duration: 2 Months (Live Classes)
๐Ÿ‘ฅ 10 Students Per Batch
๐Ÿ’ฐ โ‚น3999
๐ŸŒ
https://brutsec.com/CyberShakti.pdf

๐Ÿ“ฉ Join / Ask Queries
Telegram: @wtf_brut
WhatsApp: wa.link/brutsecurity
https://wa.me/+918945971332

No experience? No problem.
Learn from scratch. Build real skills.
Only at Brut Security.


#OperationCyberShakti #BrutSecurity #EthicalHacking #BugBounty #Cybersecurity #BeginnersOnly
1โค12๐Ÿ”ฅ2๐Ÿค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ต๏ธโ€โ™‚๏ธ Bug Bounty Tip - Extract JavaScript File URLs from Any Page!

Forget opening DevTools - use this bookmarklet to instantly extract all .js file URLs and download them in a .txt file.

๐Ÿš€ Why this matters:

Quickly collect all linked JavaScript files
Use them for static analysis (LinkFinder, SecretFinder, etc.)
Great for recon, endpoint discovery & auth bypasses

๐Ÿ“Œ Bookmarklet Code:
javascript:(function(){let urls=[];document.querySelectorAll('*').forEach(e=>{urls.push(e.src,e.href,e.url)});urls=[...new Set(urls)].filter(u=>u&&u.endsWith('.js')).join('\n');let blob=new Blob([urls],{type:'text/plain'});let a=document.createElement('a');a.href=URL.createObjectURL(blob);a.download='javascript_urls.txt';a.click();})();

๐Ÿ’ก How to use:
Create a new bookmark in your browser.
Paste the above code into the URL field.
Visit a target site and click the bookmark.
A javascript_urls.txt file will be downloaded with all .js links.

๐Ÿ”ฅ Now you can feed that into:
LinkFinder
SecretFinder
JSParser
Or manual analysis!
๐Ÿ”ฅ30โค21๐Ÿ‘2๐Ÿ‘2๐Ÿณ1๐Ÿค1
โšกDependency Confusion via JS Miner

@GodfatherOrwa just landed a clean P1 by leveraging JS Miner in Burp Suite ๐Ÿ”ฅ

Hereโ€™s how it went down ๐Ÿ‘‡

๐Ÿงฉ After crawling all endpoints, he went to:
Target โž Extensions โž JS Miner โž Run All Passive Scans

๐Ÿ’ฅ Thatโ€™s when he spotted: [JS Miner] Dependency Confusion
The vulnerable package was unclaimed on NPM ๐Ÿ‘€

๐Ÿ“ฆ Next steps he followed:

npm login
mkdir <package-name> && cd <package-name>
npm init -y
npm publish --access public


After claiming the package, he injected an RCE payload via package.json
๐Ÿงช Full POC: github.com/orwagodfather/NPM-RCE

๐Ÿ’ฃ Result? A solid P1 vulnerability and a perfect example of how effective Dependency Confusion still is.

Props to @GodfatherOrwa for consistently dropping fire techniques ๐Ÿ”ฅ
๐Ÿ”ฅ16โค8๐Ÿ—ฟ4๐Ÿ‘1
๐Ÿ” Bug Bounty Web Checklist
โœ…Track your web pentesting progress by checking each subcategory.
๐Ÿ‘‰https://nemocyberworld.github.io/BugBountyCheckList/
โค24๐Ÿ‘9
๐Ÿคก
๐Ÿ‘จโ€๐Ÿ’ป9๐Ÿ˜4๐Ÿ‘2๐Ÿคจ2
๐Ÿค15๐Ÿณ6โค2
BBRecon Masterflow - 2025.pdf
30.4 KB
๐Ÿš€ Bug Bounty Recon Masterflow โ€“ 2025 Edition ๐Ÿ”Ž
๐Ÿ˜9โค6๐Ÿ‘4๐Ÿ‘จโ€๐Ÿ’ป3
โš™๏ธ Nuclei forge: free tool that helps you visually create Nuclei YAML templates !๐Ÿ”ฅ

created by
@payloadartist ! ๐Ÿ‘

https://forge.bugbountyhunting.com
๐Ÿ‘16โค7
๐Ÿ” Wayback Subdomain Enumeration via Bash

Want to uncover hidden subdomains archived over time? This handy Bash function pulls subdomains from the Wayback Machine and helps with deep reconnaissance.

โž• Add this to your ~/.bashrc:


function wayback() {
curl -sk "https://web.archive.org/cdx/search/cdx?url=*.$1&output=txt&fl=original&collapse=urlkey&page=" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u
}


๐Ÿงช Usage:

wayback target.com

It filters subdomains from archived URLs and sorts them uniquely.
๐Ÿ”ฅ18โค11๐Ÿ‘8
AI Security Checklist ๐Ÿ““
โค14๐Ÿ—ฟ7๐Ÿ”ฅ4๐Ÿ‘3