Brut Security
14.8K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Brut Security pinned Β«Show Some Love Guyss πŸ‘€πŸ˜…https://brutsecurity.medium.com/brutdroid-the-ultimate-beginners-tool-to-set-up-an-android-pentesting-lab-15d2e92e2d67Β»
⚑Detects sensitive files on the web server.

cat allurls.txt | grep -E "\.xls|\.xml|\.xlsx|\.json|\.pdf|\.sql|\.doc|\.docx|\.pptx|\.txt|\.zip|\.tar\.gz|\.tgz|\.bak|\.7z|\.rar|\.log|\.cache|\.secret|\.db|\.backup|\.yml|\.gz|\.config|\.csv|\.yaml|\.md|\.md5"
❀21πŸ‘5😁2
a free online tool designed to generate dorks for precise, professional search. Built for the #OSINT community, ready to use. Better queries lead to better intelligence.🧠

πŸ”—
syntax.goldenowl.ai
🀝9πŸ”₯7❀5πŸ‘1
🎯wtfis - Passive hostname, domain and IP lookup tool for non-robots

βœ…https://github.com/pirxthepilot/wtfis
❀8
CVE-2025-48367: DoS in Redis, 7.0 rating❗️

One of two recent vulnerabilities discovered in Redis. Allows an attacker to perform a DoS, while the other allows an attacker to write out of bounds on hyperloglog operations, potentially leading to remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Lve8A
πŸ‘‰ Dork: redis:*

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9
πŸ”₯8🀝1
lock in & build your dream.
❀25πŸ‘7πŸ—Ώ7
🎯 TryHackMe Voucher Giveaway at 1000 Members! 🎯

We’re on the road to 1,000 members in our Discord community! πŸš€
Currently at 700+ strong, and once we hit 1K, we’ll be giving away a TryHackMe Voucher to Three lucky member! πŸ”πŸ’»

🟒 What You Need to Do:
Join the Discord: https://discord.gg/u7uMFV833h
Stay active, invite your friends
Once we reach 1,000 members, the giveaway will go live!

πŸ“’ Let’s grow this amazing community together – learning, hacking, and winning! πŸ’₯
πŸ”₯3❀2
CVE-2025-42963: Deserialization of Untrusted Data in SAP NetWeaver Application server for Java, 9.1 rating πŸ”₯

A vulnerability in the LogViewer component allows an authenticated attacker to exploit unsafe Java object deserialization, which could lead to complete control over the system.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/0c6Ud
πŸ‘‰ Dork: http.headers.server:"NetWeaver"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html
πŸ”₯5
▢️ It's LIVE!

πŸ“ŒSubWatch – your next favorite tool for automated VPS subdomain monitoring! πŸ”

βœ… Supported On VPS
βœ… Runs every 6 hours
βœ… Sends newly found subdomains directly to your Discord
βœ… Includes .txt file + message alerts
βœ… Perfect for bug bounty hunters & recon workflows

πŸ“½οΈ Watch the YouTube video & get started now:
πŸ‘‰
https://youtu.be/BkpSQKSTFUI

πŸ“₯ Download & Readme on GitHub:
πŸ‘‰
https://github.com/Brut-Security/SubWatch

πŸ”§ Powered by: subfinder, anew, jq, notify
Built with πŸ’™ by Brut Security

❀️ Give it a try, share it with your team, and drop your reactions below!
❀15
🚨CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices

🎯Severity: CRITICAL ⚠️

βœ…PoC: https://github.com/win3zz/CVE-2025-5777
❀3πŸ”₯3
CVE-2025-49704: Code Injection in Microsoft SharePoint, 8.8 rating❗️

The vulnerability allows an authenticated attacker to execute code over the network.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/1egrVπŸ‘‰ Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704
❀4
🚨 Bug Bounty Tip: Takeover Vulnerable S3 Buckets in Under a Minute! ☁️

Want to identify exposed Amazon S3 buckets linked to a target? Here's a quick method:
echo REDACTED.COM | cariddi | grep js | tee js_files | httpx -mc 200 | nuclei -tags aws,amazon

πŸ” Then check for public S3 buckets:
aws s3 ls s3://REDACTEDCOM.s3.amazonaws.com


πŸ‘‰ If the bucket name isn’t obvious:
echo REDACTED.COM | cariddi -e -s -info

⚠️ Found a vulnerable bucket? Don’t delete anything!
# Do NOT run this. Just for awareness:
aws s3 rm s3://REDACTEDCOM.s3.amazonaws.com --recursive



βœ… Always report responsibly. Never exploit β€” you're here to help, not harm.

⚑️ Happy Hunting!
❀11πŸ‘7πŸ”₯4πŸ—Ώ2
πŸ›‘οΈ Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload
(select(0)from(select(sleep(10)))v) β†’ 403 Forbidden

βœ… Bypass Payload

(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)



πŸ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.

βœ…Credit: @nav1n0x
❀35πŸ‘5πŸ—Ώ4😁1
Top 25 Recon Tools and their PurposesπŸ“
❀23πŸ‘3
To all my dear students and subscribers,
On this special occasion of Guru Purnima, remember:

🧠 β€œYour knowledge is your antivirus. Your guru is your source code.”

Stay curious, stay humble, and always keep learning.
– With gratitude,
Brut Security
1❀29πŸ‘7🀨2πŸ‘1
❀10
⚑SSTImap - Automatic SSTI detection tool with interactive interface

βœ…
https://github.com/vladko312/SSTImap
❀11πŸ‘3
Tired of switching tabs for OSINT and recon? Just join our Discord and type sudo help to unlock powerful tools in seconds!

βœ… IP & Domain Lookup
βœ… Email & Phone OSINT
βœ… Subdomain Enumeration
βœ… Reverse Image Search
βœ… URL & Virus Scanners
βœ… Temp Email, QR Tools, and more

🌟 You can create and play your own CTF in a minute , right inside Discord!

Try it out now β€” it’s fast, simple, and all in one chat.
πŸ”— https://discord.gg/u7uMFV833h

#ctf #bugbounty #osint #cybersecurity #discordtools #infosec
1🫑8❀4