Brut Security
14.7K subscribers
909 photos
73 videos
287 files
965 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
⭐PACU - The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.

βœ…
https://github.com/RhinoSecurityLabs/pacu
❀13πŸ”₯8
⭐CYFARE-Reconner - Advanced Link Reconnaissance Extension For Firefox

✨ Features
Deep Discovery
Secret Detection
URL Analysis

βœ…
https://github.com/CYFARE/CYFARE-Reconner
❀12πŸ‘2
Akamai CloudTest - XXE Injection

Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection through the /concerto/services/RepositoryService SOAP endpoint.

Get: https://github.com/MuhammadWaseem29/CVE-2025-49493-Poc

References:
1. https://xbow.com/blog/xbow-akamai-cloudtest-xxe/
2. https://techdocs.akamai.com/cloudtest/changelog/june-2-2025-enhancements-and-bug-fixes
πŸ”₯5❀4
πŸ˜₯
πŸ—Ώ20😁10πŸ”₯6πŸ‘3😱3🫑3🐳2
Looking for a freelancer, familiar with FB, Instagram and Whatsapp marketing.

Send your resume to [email protected]
🚨CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%https://2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: https://codewithvamp.medium.com/cve-2025-0133-reflected-xss-vulnerability-in-palo-alto-globalprotect-gateway-portal-028128f2f5b9

Template: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml
❀7πŸ‘4
Bug Bounty Tip: HTTP Parameter Pollution (HPP)

Some apps mishandle duplicate parameters. You can bypass logic or elevate privileges by injecting multiple values:

GET /transfer?amount=100&admin=true&amount=1

⚠️ Always test:
β€’param=value1&param=value2
β€’Encoded (%26,)
❀20
Please open Telegram to view this post
VIEW IN TELEGRAM
↳ s3dns - a lightweight DNS server that helps uncover cloud storage buckets (AWS S3, Google Cloud Storage, and Azure Blob) by resolving DNS requests, tracing CNAMEs, and matching known bucket URL patterns.

What it does?
β€’ Resolves CNAME records to uncover hidden S3 locations
β€’ Detects AWS S3 bucket URL patterns
β€’ Helps find potentially exposed S3 buckets
β€’ Easy to deploy via Docker

Installation
git clone https://github.com/olizimmermann/s3dns.git
cd s3dns
pip install -r requirements.txt


Repository: Github
❀10πŸ‘4πŸ—Ώ3
πŸ“± Android Native Scanner β€” automatically detects RCE, tokens, API keys, URLs & base64 payloads inside .so files!

πŸ” Features:
🧨 system, exec, popen β†’ RCE scoring
πŸ” API key / token / JWT detection
🌍 Extracts hardcoded URLs & endpoints
🧬 JNI & native method scanner
πŸ“„ Auto-generated TXT reports

πŸ“Ž Project β†’
https://github.com/ynsmroztas/AndroidNativeScanner

πŸ’£ No more manual hunting in .so files.
⚑ One script, full visibility.
❀17πŸ‘5πŸ”₯4😒1
Hey Hunter's,
DarkShadow here, back again just dropping a POC.

🀫Unauthenticated WordPress Auth bypass πŸ”₯

After sending the 1st request use the provided last Cookie and send request on /wp-admin and BOOM auth bypassed πŸ’₯


ο»Ώ
#bugbountytips  #authbypass
πŸ”₯20❀7πŸ—Ώ5πŸ‘2
Hey Hunter's,
DarkShadow here ...

πŸ”₯Is that Cool?
πŸ”₯27🫑8🀝2❀1πŸ‘1
πŸ˜Άβ€πŸŒ«οΈ
πŸ”₯34😁5
Hey Hunter's,
DarkShadow here back again, just dropping a dork🀫


✨google dork searching public exploits from github😎

"CVE-YYYY-NNNN" exploit site:github.com

"CVE-YYYY-NNNN" exploit POC site:github.com

"CVE-YYYY-NNNN" proof of concept site:github.com


#dork #bugbountytips
❀10πŸ‘7πŸ”₯4
🚨 Brut Security - New Batch Starts 18th August!

Join our Ethical Hacking Network Pentesting & Web Pentesting / Bug Bounty training – practical sessions, real-world attacks, and community support from Day 1.

βœ… DM +918945971332 to enroll. Limited slots.
⭐https://wa.me/918945971332
❀7
Hey Hunter's,
DarkShadow hare back again.


π˜Ώπ™–π™§π™ π™€π™£π™™π™π™žπ™£π™™π™šπ™§ my own private tool which i used to extract endpoints from browse through passive recon.

✨ Features:
βœ… Extract subdomains.
βœ… Extract categories endpoints from subdomains.
βœ… Extract external domains.


If you find this tool useful, give it a ⭐️ and share it with others in the hacking & BugBounty community!

https://github.com/darkshadow2bd/DarkEndFinder
❀16πŸ‘3πŸ‘¨β€πŸ’»3😁2
Bug Hunters Methodology v4
@Jason Haddix
πŸ”₯12😱6❀2πŸ‘2
CVE-2025-7443: Unrestricted Upload of File with Dangerous Type in BerqWP Plugin, 8.1 rating❗️

Lack of file validation allows attackers to upload arbitrary files, which can lead to RCE.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/puxoz
πŸ‘‰ Dork: http.body:"plugins/searchpro"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/searchpro/berqwp-2242-unauthenticated-arbitrary-file-upload
πŸ‘¨β€πŸ’»6❀3🫑2
πŸ‘¨β€πŸ³ Damn-Vulnerable-RESTaurant πŸ‘¨β€πŸ³

⚑️An intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.

βœ…Get:
https://github.com/theowni/Damn-Vulnerable-RESTaurant-API-Game
πŸ”₯14❀12