Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
βš™οΈ Nuclei forge: free tool that helps you visually create Nuclei YAML templates !πŸ”₯

created by
@payloadartist ! πŸ‘

https://forge.bugbountyhunting.com
πŸ‘16❀7
πŸ” Wayback Subdomain Enumeration via Bash

Want to uncover hidden subdomains archived over time? This handy Bash function pulls subdomains from the Wayback Machine and helps with deep reconnaissance.

βž• Add this to your ~/.bashrc:


function wayback() {
curl -sk "https://web.archive.org/cdx/search/cdx?url=*.$1&output=txt&fl=original&collapse=urlkey&page=" | awk -F/ '{gsub(/:.*/, "", $3); print $3}' | sort -u
}


πŸ§ͺ Usage:

wayback target.com

It filters subdomains from archived URLs and sorts them uniquely.
πŸ”₯18❀11πŸ‘8
AI Security Checklist πŸ““
❀14πŸ—Ώ7πŸ”₯4πŸ‘3
βœ…shosubgo - Small tool to Grab subdomains using Shodan API
⚑https://github.com/incogbyte/shosubgo
❀12πŸ—Ώ5πŸ‘1
Names don’t matter. Bounty does.
❀29πŸ‘3πŸ‘¨β€πŸ’»3
🀑
😁72❀5🐳1
βœ…MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files.

⚑https://github.com/midoxnet/mapperplus
❀15πŸ‘2πŸ”₯1
🚨 New Batch Starting – August 2025 🚨
Brut Practical Web Penetration Testing (bPWP)

We’re back with a fresh batch of our most in-demand training – Brut Practical Web Penetration Testing – starting this August!

πŸ” Learn the art of Web Hacking with:
βœ… 100% Practical Sessions
βœ… Bug Bounty Approach
βœ… Real-World Lab Scenarios
βœ… Lifetime Community Access
βœ… Beginner-Friendly with Advanced Techniques

πŸ’» Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.

πŸ“† Limited Seats – Enroll Now
🌐
https://brutsec.com/bPWP

πŸ“© For Queries:
Telegram:
@wtf_brut
WhatsApp:
https://wa.link/brutsecurity | +918945971332
Email:
[email protected]
❀11🀝2
APKDeepLens is a Python based tool designed to scan Android applications (APK files) for security vulnerabilities.

βœ…
https://github.com/d78ui98/APKDeepLens/
❀12πŸ‘2
🚨 CVE-2025-41646 -
Critical Auth Bypass in RevPi Webstatus (≀ v2.4.5) 🚨
⚠️ Impacts ICS/OT environments – high risk!

πŸ› οΈ Root Cause:
Backend uses weak equality comparison, accepting a JSON boolean true instead of a password hash.

πŸ§ͺ PoC:
Send this in a login request:

{ "hashcode": true }

βœ… Result: You get full access without valid credentials!

πŸ”’ Fix: Upgrade to v2.4.6 – patch removes weak comparison logic.

🎯 Bug bounty takeaway:
Always test for type juggling and loose equality bugs in login flows, especially in OT/ICS systems where patch cycles are slower.
πŸ—Ώ12πŸ‘4❀2
CVE-2025-49826: DoS in Next.js, 7.5 rating❗️

A vulnerability in some versions of the Next.js framework allows attackers to perform cache poisoning, leading to a denial of service.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/raJ1k
πŸ‘‰ Dork: http.headers.x_powered_by:"Next.js"

Read more: https://github.com/vercel/next.js/security/advisories/GHSA-67rr-84xm-4c7r
😁9❀4
Brut Security pinned Β«Show Some Love Guyss πŸ‘€πŸ˜…https://brutsecurity.medium.com/brutdroid-the-ultimate-beginners-tool-to-set-up-an-android-pentesting-lab-15d2e92e2d67Β»
⚑Detects sensitive files on the web server.

cat allurls.txt | grep -E "\.xls|\.xml|\.xlsx|\.json|\.pdf|\.sql|\.doc|\.docx|\.pptx|\.txt|\.zip|\.tar\.gz|\.tgz|\.bak|\.7z|\.rar|\.log|\.cache|\.secret|\.db|\.backup|\.yml|\.gz|\.config|\.csv|\.yaml|\.md|\.md5"
❀21πŸ‘5😁2
a free online tool designed to generate dorks for precise, professional search. Built for the #OSINT community, ready to use. Better queries lead to better intelligence.🧠

πŸ”—
syntax.goldenowl.ai
🀝9πŸ”₯7❀5πŸ‘1
🎯wtfis - Passive hostname, domain and IP lookup tool for non-robots

βœ…https://github.com/pirxthepilot/wtfis
❀8
CVE-2025-48367: DoS in Redis, 7.0 rating❗️

One of two recent vulnerabilities discovered in Redis. Allows an attacker to perform a DoS, while the other allows an attacker to write out of bounds on hyperloglog operations, potentially leading to remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Lve8A
πŸ‘‰ Dork: redis:*

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9
πŸ”₯8🀝1
lock in & build your dream.
❀25πŸ‘7πŸ—Ώ7
🎯 TryHackMe Voucher Giveaway at 1000 Members! 🎯

We’re on the road to 1,000 members in our Discord community! πŸš€
Currently at 700+ strong, and once we hit 1K, we’ll be giving away a TryHackMe Voucher to Three lucky member! πŸ”πŸ’»

🟒 What You Need to Do:
Join the Discord: https://discord.gg/u7uMFV833h
Stay active, invite your friends
Once we reach 1,000 members, the giveaway will go live!

πŸ“’ Let’s grow this amazing community together – learning, hacking, and winning! πŸ’₯
πŸ”₯3❀2