Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
๐Ÿ‡ฎ๐Ÿ‡ณ Operation CyberShakti
Independence Day Special Batch
Only for Beginners

๐Ÿ’ป Ethical Hacking & Web Pentesting
๐Ÿ“… Duration: 2 Months (Live Classes)
๐Ÿ‘ฅ 10 Students Per Batch
๐Ÿ’ฐ โ‚น3999
๐ŸŒ
https://brutsec.com/CyberShakti.pdf

๐Ÿ“ฉ Join / Ask Queries
Telegram: @wtf_brut
WhatsApp: wa.link/brutsecurity
https://wa.me/+918945971332

No experience? No problem.
Learn from scratch. Build real skills.
Only at Brut Security.


#OperationCyberShakti #BrutSecurity #EthicalHacking #BugBounty #Cybersecurity #BeginnersOnly
1โค12๐Ÿ”ฅ2๐Ÿค1
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿ•ต๏ธโ€โ™‚๏ธ Bug Bounty Tip - Extract JavaScript File URLs from Any Page!

Forget opening DevTools - use this bookmarklet to instantly extract all .js file URLs and download them in a .txt file.

๐Ÿš€ Why this matters:

Quickly collect all linked JavaScript files
Use them for static analysis (LinkFinder, SecretFinder, etc.)
Great for recon, endpoint discovery & auth bypasses

๐Ÿ“Œ Bookmarklet Code:
javascript:(function(){let urls=[];document.querySelectorAll('*').forEach(e=>{urls.push(e.src,e.href,e.url)});urls=[...new Set(urls)].filter(u=>u&&u.endsWith('.js')).join('\n');let blob=new Blob([urls],{type:'text/plain'});let a=document.createElement('a');a.href=URL.createObjectURL(blob);a.download='javascript_urls.txt';a.click();})();

๐Ÿ’ก How to use:
Create a new bookmark in your browser.
Paste the above code into the URL field.
Visit a target site and click the bookmark.
A javascript_urls.txt file will be downloaded with all .js links.

๐Ÿ”ฅ Now you can feed that into:
LinkFinder
SecretFinder
JSParser
Or manual analysis!
๐Ÿ”ฅ30โค21๐Ÿ‘2๐Ÿ‘2๐Ÿณ1๐Ÿค1
โšกDependency Confusion via JS Miner

@GodfatherOrwa just landed a clean P1 by leveraging JS Miner in Burp Suite ๐Ÿ”ฅ

Hereโ€™s how it went down ๐Ÿ‘‡

๐Ÿงฉ After crawling all endpoints, he went to:
Target โž Extensions โž JS Miner โž Run All Passive Scans

๐Ÿ’ฅ Thatโ€™s when he spotted: [JS Miner] Dependency Confusion
The vulnerable package was unclaimed on NPM ๐Ÿ‘€

๐Ÿ“ฆ Next steps he followed:

npm login
mkdir <package-name> && cd <package-name>
npm init -y
npm publish --access public


After claiming the package, he injected an RCE payload via package.json
๐Ÿงช Full POC: github.com/orwagodfather/NPM-RCE

๐Ÿ’ฃ Result? A solid P1 vulnerability and a perfect example of how effective Dependency Confusion still is.

Props to @GodfatherOrwa for consistently dropping fire techniques ๐Ÿ”ฅ
๐Ÿ”ฅ16โค8๐Ÿ—ฟ4๐Ÿ‘1
๐Ÿ” Bug Bounty Web Checklist
โœ…Track your web pentesting progress by checking each subcategory.
๐Ÿ‘‰https://nemocyberworld.github.io/BugBountyCheckList/
โค24๐Ÿ‘9
๐Ÿคก
๐Ÿ‘จโ€๐Ÿ’ป9๐Ÿ˜4๐Ÿ‘2๐Ÿคจ2
๐Ÿค15๐Ÿณ6โค2
BBRecon Masterflow - 2025.pdf
30.4 KB
๐Ÿš€ Bug Bounty Recon Masterflow โ€“ 2025 Edition ๐Ÿ”Ž
๐Ÿ˜9โค6๐Ÿ‘4๐Ÿ‘จโ€๐Ÿ’ป3
โš™๏ธ Nuclei forge: free tool that helps you visually create Nuclei YAML templates !๐Ÿ”ฅ

created by
@payloadartist ! ๐Ÿ‘

https://forge.bugbountyhunting.com
๐Ÿ‘16โค7
๐Ÿ” Wayback Subdomain Enumeration via Bash

Want to uncover hidden subdomains archived over time? This handy Bash function pulls subdomains from the Wayback Machine and helps with deep reconnaissance.

โž• Add this to your ~/.bashrc:


function wayback() {
curl -sk "https://web.archive.org/cdx/search/cdx?url=*.$1&output=txt&fl=original&collapse=urlkey&page=" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u
}


๐Ÿงช Usage:

wayback target.com

It filters subdomains from archived URLs and sorts them uniquely.
๐Ÿ”ฅ18โค11๐Ÿ‘8
AI Security Checklist ๐Ÿ““
โค14๐Ÿ—ฟ7๐Ÿ”ฅ4๐Ÿ‘3
โœ…shosubgo - Small tool to Grab subdomains using Shodan API
โšกhttps://github.com/incogbyte/shosubgo
โค12๐Ÿ—ฟ5๐Ÿ‘1
Names donโ€™t matter. Bounty does.
โค29๐Ÿ‘3๐Ÿ‘จโ€๐Ÿ’ป3
๐Ÿคก
๐Ÿ˜72โค5๐Ÿณ1
โœ…MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.

โšกhttps://github.com/midoxnet/mapperplus
โค15๐Ÿ‘2๐Ÿ”ฅ1
๐Ÿšจ New Batch Starting โ€“ August 2025 ๐Ÿšจ
Brut Practical Web Penetration Testing (bPWP)

Weโ€™re back with a fresh batch of our most in-demand training โ€“ Brut Practical Web Penetration Testing โ€“ starting this August!

๐Ÿ” Learn the art of Web Hacking with:
โœ… 100% Practical Sessions
โœ… Bug Bounty Approach
โœ… Real-World Lab Scenarios
โœ… Lifetime Community Access
โœ… Beginner-Friendly with Advanced Techniques

๐Ÿ’ป Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.

๐Ÿ“† Limited Seats โ€“ Enroll Now
๐ŸŒ
https://brutsec.com/bPWP

๐Ÿ“ฉ For Queries:
Telegram:
@wtf_brut
WhatsApp:
https://wa.link/brutsecurity | +918945971332
Email:
[email protected]
โค11๐Ÿค2
APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities.

โœ…
https://github.com/d78ui98/APKDeepLens/
โค12๐Ÿ‘2