Brut Security
14.8K subscribers
919 photos
73 videos
287 files
975 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ•΅οΈβ€β™‚οΈ Bug Bounty Tip - Extract JavaScript File URLs from Any Page!

Forget opening DevTools - use this bookmarklet to instantly extract all .js file URLs and download them in a .txt file.

πŸš€ Why this matters:

Quickly collect all linked JavaScript files
Use them for static analysis (LinkFinder, SecretFinder, etc.)
Great for recon, endpoint discovery & auth bypasses

πŸ“Œ Bookmarklet Code:
javascript:(function(){let urls=[];document.querySelectorAll('*').forEach(e=>{urls.push(e.src,e.href,e.url)});urls=[...new Set(urls)].filter(u=>u&&u.endsWith('.js')).join('\n');let blob=new Blob([urls],{type:'text/plain'});let a=document.createElement('a');a.href=URL.createObjectURL(blob);a.download='javascript_urls.txt';a.click();})();

πŸ’‘ How to use:
Create a new bookmark in your browser.
Paste the above code into the URL field.
Visit a target site and click the bookmark.
A javascript_urls.txt file will be downloaded with all .js links.

πŸ”₯ Now you can feed that into:
LinkFinder
SecretFinder
JSParser
Or manual analysis!
πŸ”₯30❀21πŸ‘2πŸ‘2🐳1🀝1
⚑Dependency Confusion via JS Miner

@GodfatherOrwa just landed a clean P1 by leveraging JS Miner in Burp Suite πŸ”₯

Here’s how it went down πŸ‘‡

🧩 After crawling all endpoints, he went to:
Target ➝ Extensions ➝ JS Miner ➝ Run All Passive Scans

πŸ’₯ That’s when he spotted: [JS Miner] Dependency Confusion
The vulnerable package was unclaimed on NPM πŸ‘€

πŸ“¦ Next steps he followed:

npm login
mkdir <package-name> && cd <package-name>
npm init -y
npm publish --access public


After claiming the package, he injected an RCE payload via package.json
πŸ§ͺ Full POC: github.com/orwagodfather/NPM-RCE

πŸ’£ Result? A solid P1 vulnerability and a perfect example of how effective Dependency Confusion still is.

Props to @GodfatherOrwa for consistently dropping fire techniques πŸ”₯
πŸ”₯16❀8πŸ—Ώ4πŸ‘1
πŸ” Bug Bounty Web Checklist
βœ…Track your web pentesting progress by checking each subcategory.
πŸ‘‰https://nemocyberworld.github.io/BugBountyCheckList/
❀24πŸ‘9
🀑
πŸ‘¨β€πŸ’»9😁4πŸ‘2🀨2
🀝15🐳6❀2
BBRecon Masterflow - 2025.pdf
30.4 KB
πŸš€ Bug Bounty Recon Masterflow – 2025 Edition πŸ”Ž
😁9❀6πŸ‘4πŸ‘¨β€πŸ’»3
βš™οΈ Nuclei forge: free tool that helps you visually create Nuclei YAML templates !πŸ”₯

created by
@payloadartist ! πŸ‘

https://forge.bugbountyhunting.com
πŸ‘16❀7
πŸ” Wayback Subdomain Enumeration via Bash

Want to uncover hidden subdomains archived over time? This handy Bash function pulls subdomains from the Wayback Machine and helps with deep reconnaissance.

βž• Add this to your ~/.bashrc:


function wayback() {
curl -sk "https://web.archive.org/cdx/search/cdx?url=*.$1&output=txt&fl=original&collapse=urlkey&page=" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u
}


πŸ§ͺ Usage:

wayback target.com

It filters subdomains from archived URLs and sorts them uniquely.
πŸ”₯18❀11πŸ‘8
AI Security Checklist πŸ““
❀14πŸ—Ώ7πŸ”₯4πŸ‘3
βœ…shosubgo - Small tool to Grab subdomains using Shodan API
⚑https://github.com/incogbyte/shosubgo
❀12πŸ—Ώ5πŸ‘1
Names don’t matter. Bounty does.
❀29πŸ‘3πŸ‘¨β€πŸ’»3
🀑
😁72❀5🐳1
βœ…MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.

⚑https://github.com/midoxnet/mapperplus
❀15πŸ‘2πŸ”₯1
🚨 New Batch Starting – August 2025 🚨
Brut Practical Web Penetration Testing (bPWP)

We’re back with a fresh batch of our most in-demand training – Brut Practical Web Penetration Testing – starting this August!

πŸ” Learn the art of Web Hacking with:
βœ… 100% Practical Sessions
βœ… Bug Bounty Approach
βœ… Real-World Lab Scenarios
βœ… Lifetime Community Access
βœ… Beginner-Friendly with Advanced Techniques

πŸ’» Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.

πŸ“† Limited Seats – Enroll Now
🌐
https://brutsec.com/bPWP

πŸ“© For Queries:
Telegram:
@wtf_brut
WhatsApp:
https://wa.link/brutsecurity | +918945971332
Email:
[email protected]
❀11🀝2
APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities.

βœ…
https://github.com/d78ui98/APKDeepLens/
❀12πŸ‘2
🚨 CVE-2025-41646 -
Critical Auth Bypass in RevPi Webstatus (≀ v2.4.5) 🚨
⚠️ Impacts ICS/OT environments – high risk!

πŸ› οΈ Root Cause:
Backend uses weak equality comparison, accepting a JSON boolean true instead of a password hash.

πŸ§ͺ PoC:
Send this in a login request:

{ "hashcode": true }

βœ… Result: You get full access without valid credentials!

πŸ”’ Fix: Upgrade to v2.4.6 – patch removes weak comparison logic.

🎯 Bug bounty takeaway:
Always test for type juggling and loose equality bugs in login flows, especially in OT/ICS systems where patch cycles are slower.
πŸ—Ώ12πŸ‘4❀2
CVE-2025-49826: DoS in Next.js, 7.5 rating❗️

A vulnerability in some versions of the Next.js framework allows attackers to perform cache poisoning, leading to a denial of service.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/raJ1k
πŸ‘‰ Dork: http.headers.x_powered_by:"Next.js"

Read more: https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r
😁9❀4