Brut Security
14.7K subscribers
910 photos
73 videos
287 files
966 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
⭐CYFARE-Reconner - Advanced Link Reconnaissance Extension For Firefox

✨ Features
Deep Discovery
Secret Detection
URL Analysis

βœ…
https://github.com/CYFARE/CYFARE-Reconner
❀12πŸ‘2
Akamai CloudTest - XXE Injection

Akamai CloudTest before 60 2025.06.02 (12988) allows file inclusion via XML External Entity (XXE) injection through the /concerto/services/RepositoryService SOAP endpoint.

Get: https://github.com/MuhammadWaseem29/CVE-2025-49493-Poc

References:
1. https://xbow.com/blog/xbow-akamai-cloudtest-xxe/
2. https://techdocs.akamai.com/cloudtest/changelog/june-2-2025-enhancements-and-bug-fixes
πŸ”₯5❀4
πŸ˜₯
πŸ—Ώ20😁10πŸ”₯6πŸ‘3😱3🫑3🐳2
Looking for a freelancer, familiar with FB, Instagram and Whatsapp marketing.

Send your resume to [email protected]
🚨CVE-2025-0133 : Payload + Template

Payload: %3Csvg%20xmlns%3D%22http%3A%2F%https://2Fwww.w3.org%2F2000%2Fsvg%22%3E%3Cscript%3Eprompt%28%22XSS%22%29%3C%2Fscript%3E%3C%2Fsvg%3E

Write-up: https://codewithvamp.medium.com/cve-2025-0133-reflected-xss-vulnerability-in-palo-alto-globalprotect-gateway-portal-028128f2f5b9

Template: https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-0133.yaml
❀7πŸ‘4
Bug Bounty Tip: HTTP Parameter Pollution (HPP)

Some apps mishandle duplicate parameters. You can bypass logic or elevate privileges by injecting multiple values:

GET /transfer?amount=100&admin=true&amount=1

⚠️ Always test:
β€’param=value1&param=value2
β€’Encoded (%26,)
❀20
Please open Telegram to view this post
VIEW IN TELEGRAM
↳ s3dns - a lightweight DNS server that helps uncover cloud storage buckets (AWS S3, Google Cloud Storage, and Azure Blob) by resolving DNS requests, tracing CNAMEs, and matching known bucket URL patterns.

What it does?
β€’ Resolves CNAME records to uncover hidden S3 locations
β€’ Detects AWS S3 bucket URL patterns
β€’ Helps find potentially exposed S3 buckets
β€’ Easy to deploy via Docker

Installation
git clone https://github.com/olizimmermann/s3dns.git
cd s3dns
pip install -r requirements.txt


Repository: Github
❀10πŸ‘4πŸ—Ώ3
πŸ“± Android Native Scanner β€” automatically detects RCE, tokens, API keys, URLs & base64 payloads inside .so files!

πŸ” Features:
🧨 system, exec, popen β†’ RCE scoring
πŸ” API key / token / JWT detection
🌍 Extracts hardcoded URLs & endpoints
🧬 JNI & native method scanner
πŸ“„ Auto-generated TXT reports

πŸ“Ž Project β†’
https://github.com/ynsmroztas/AndroidNativeScanner

πŸ’£ No more manual hunting in .so files.
⚑ One script, full visibility.
❀17πŸ‘5πŸ”₯4😒1
Hey Hunter's,
DarkShadow here, back again just dropping a POC.

🀫Unauthenticated WordPress Auth bypass πŸ”₯

After sending the 1st request use the provided last Cookie and send request on /wp-admin and BOOM auth bypassed πŸ’₯


ο»Ώ
#bugbountytips  #authbypass
πŸ”₯20❀7πŸ—Ώ5πŸ‘2
Hey Hunter's,
DarkShadow here ...

πŸ”₯Is that Cool?
πŸ”₯27🫑8🀝2❀1πŸ‘1
πŸ˜Άβ€πŸŒ«οΈ
πŸ”₯34😁5
Hey Hunter's,
DarkShadow here back again, just dropping a dork🀫


✨google dork searching public exploits from github😎

"CVE-YYYY-NNNN" exploit site:github.com

"CVE-YYYY-NNNN" exploit POC site:github.com

"CVE-YYYY-NNNN" proof of concept site:github.com


#dork #bugbountytips
❀10πŸ‘7πŸ”₯4
🚨 Brut Security - New Batch Starts 18th August!

Join our Ethical Hacking Network Pentesting & Web Pentesting / Bug Bounty training – practical sessions, real-world attacks, and community support from Day 1.

βœ… DM +918945971332 to enroll. Limited slots.
⭐https://wa.me/918945971332
❀7
Hey Hunter's,
DarkShadow hare back again.


π˜Ώπ™–π™§π™ π™€π™£π™™π™π™žπ™£π™™π™šπ™§ my own private tool which i used to extract endpoints from browse through passive recon.

✨ Features:
βœ… Extract subdomains.
βœ… Extract categories endpoints from subdomains.
βœ… Extract external domains.


If you find this tool useful, give it a ⭐️ and share it with others in the hacking & BugBounty community!

https://github.com/darkshadow2bd/DarkEndFinder
❀16πŸ‘3πŸ‘¨β€πŸ’»3😁2
Bug Hunters Methodology v4
@Jason Haddix
πŸ”₯12😱6❀2πŸ‘2
CVE-2025-7443: Unrestricted Upload of File with Dangerous Type in BerqWP Plugin, 8.1 rating❗️

Lack of file validation allows attackers to upload arbitrary files, which can lead to RCE.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/puxoz
πŸ‘‰ Dork: http.body:"plugins/searchpro"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/searchpro/berqwp-2242-unauthenticated-arbitrary-file-upload
πŸ‘¨β€πŸ’»6❀3🫑2
πŸ‘¨β€πŸ³ Damn-Vulnerable-RESTaurant πŸ‘¨β€πŸ³

⚑️An intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.

βœ…Get:
https://github.com/theowni/Damn-Vulnerable-RESTaurant-API-Game
πŸ”₯14❀12
Media is too big
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow here back again!

SubClick One-click Subdomain Finder Bookmark template.

This is my private tool that I use during bug hunting.
If you guys like it, I’ll publish it on my GitHub.
I’ve uploaded a sample video demo β€” let me know what you think!


🧠 Features
βœ… One-click execution – just add to bookmarks and click
βœ… No setup required – works as a browser bookmarklet
βœ… Fast subdomain discovery from multiple public sources
βœ… Subdomain live check (best-effort, despite CORS/CSP)
βœ… Download results as .txt directly from the browser
βœ… Displays subdomains as clickable links with basic status
βœ… Fully client-side – no server or data collection involved
βœ… Bug bounty friendly – made for recon & live target scanning

#bugbountytips #infosec
🀝13❀7🫑4πŸ”₯2