Brut Security
14.7K subscribers
913 photos
73 videos
287 files
969 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
2 Seats Left! Enroll Now 😎
Forwarded from Brut Security
🚨 New Batch Starting – August 2025 🚨
Brut Practical Web Penetration Testing (bPWP)

We’re back with a fresh batch of our most in-demand training – Brut Practical Web Penetration Testing – starting this August!

πŸ” Learn the art of Web Hacking with:
βœ… 100% Practical Sessions
βœ… Bug Bounty Approach
βœ… Real-World Lab Scenarios
βœ… Lifetime Community Access
βœ… Beginner-Friendly with Advanced Techniques

πŸ’» Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.

πŸ“† Limited Seats – Enroll Now
🌐
https://brutsec.com/bPWP

πŸ“© For Queries:
Telegram:
@wtf_brut
WhatsApp:
https://wa.link/brutsecurity | +918945971332
Email:
[email protected]
❀5
⭐Chrome and Firefox extension that lists Amazon S3 Buckets while browsing

🚨Features:
Filters S3Buckets
Extract ACL permissions
Download recorded buckets
Manage recorded buckets
Tab-specific bucket recording

βœ…
https://github.com/AlecBlance/S3BucketList
πŸ”₯16❀4
⭐PACU - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

βœ…
https://github.com/RhinoSecurityLabs/pacu
❀13πŸ”₯8
⭐CYFARE-Reconner - Advanced Link Reconnaissance Extension For Firefox

✨ Features
Deep Discovery
Secret Detection
URL Analysis

βœ…
https://github.com/CYFARE/CYFARE-Reconner
❀12πŸ‘2
Akamai CloudTest - XXE Injection

Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection through the /concerto/services/RepositoryService SOAP endpoint.

Get: https://github.com/MuhammadWaseem29/CVE-2025-49493-Poc

References:
1. https://xbow.com/blog/xbow-akamai-cloudtest-xxe/
2. https://techdocs.akamai.com/cloudtest/changelog/june-2-2025-enhancements-and-bug-fixes
πŸ”₯5❀4
πŸ˜₯
πŸ—Ώ20😁10πŸ”₯6πŸ‘3😱3🫑3🐳2
Looking for a freelancer, familiar with FB, Instagram and Whatsapp marketing.

Send your resume to [email protected]
🚨CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%https://2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: https://codewithvamp.medium.com/cve-2025-0133-reflected-xss-vulnerability-in-palo-alto-globalprotect-gateway-portal-028128f2f5b9

Template: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml
❀7πŸ‘4
Bug Bounty Tip: HTTP Parameter Pollution (HPP)

Some apps mishandle duplicate parameters. You can bypass logic or elevate privileges by injecting multiple values:

GET /transfer?amount=100&admin=true&amount=1

⚠️ Always test:
β€’param=value1&param=value2
β€’Encoded (%26,)
❀20
Please open Telegram to view this post
VIEW IN TELEGRAM
↳ s3dns - a lightweight DNS server that helps uncover cloud storage buckets (AWS S3, Google Cloud Storage, and Azure Blob) by resolving DNS requests, tracing CNAMEs, and matching known bucket URL patterns.

What it does?
β€’ Resolves CNAME records to uncover hidden S3 locations
β€’ Detects AWS S3 bucket URL patterns
β€’ Helps find potentially exposed S3 buckets
β€’ Easy to deploy via Docker

Installation
git clone https://github.com/olizimmermann/s3dns.git
cd s3dns
pip install -r requirements.txt


Repository: Github
❀10πŸ‘4πŸ—Ώ3
πŸ“± Android Native Scanner β€” automatically detects RCE, tokens, API keys, URLs & base64 payloads inside .so files!

πŸ” Features:
🧨 system, exec, popen β†’ RCE scoring
πŸ” API key / token / JWT detection
🌍 Extracts hardcoded URLs & endpoints
🧬 JNI & native method scanner
πŸ“„ Auto-generated TXT reports

πŸ“Ž Project β†’
https://github.com/ynsmroztas/AndroidNativeScanner

πŸ’£ No more manual hunting in .so files.
⚑ One script, full visibility.
❀17πŸ‘5πŸ”₯4😒1
Hey Hunter's,
DarkShadow here, back again just dropping a POC.

🀫Unauthenticated WordPress Auth bypass πŸ”₯

After sending the 1st request use the provided last Cookie and send request on /wp-admin and BOOM auth bypassed πŸ’₯


ο»Ώ
#bugbountytips  #authbypass
πŸ”₯20❀7πŸ—Ώ5πŸ‘2
Hey Hunter's,
DarkShadow here ...

πŸ”₯Is that Cool?
πŸ”₯27🫑8🀝2❀1πŸ‘1
πŸ˜Άβ€πŸŒ«οΈ
πŸ”₯34😁5
Hey Hunter's,
DarkShadow here back again, just dropping a dork🀫


✨google dork searching public exploits from github😎

"CVE-YYYY-NNNN" exploit site:github.com

"CVE-YYYY-NNNN" exploit POC site:github.com

"CVE-YYYY-NNNN" proof of concept site:github.com


#dork #bugbountytips
❀10πŸ‘7πŸ”₯4
🚨 Brut Security - New Batch Starts 18th August!

Join our Ethical Hacking Network Pentesting & Web Pentesting / Bug Bounty training – practical sessions, real-world attacks, and community support from Day 1.

βœ… DM +918945971332 to enroll. Limited slots.
⭐https://wa.me/918945971332
❀7
Hey Hunter's,
DarkShadow hare back again.


π˜Ώπ™–π™§π™ π™€π™£π™™π™π™žπ™£π™™π™šπ™§ my own private tool which i used to extract endpoints from browse through passive recon.

✨ Features:
βœ… Extract subdomains.
βœ… Extract categories endpoints from subdomains.
βœ… Extract external domains.


If you find this tool useful, give it a ⭐️ and share it with others in the hacking & BugBounty community!

https://github.com/darkshadow2bd/DarkEndFinder
❀16πŸ‘3πŸ‘¨β€πŸ’»3😁2