Brut Security
14.7K subscribers
911 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
Notes from "How to Crush Bug Bounties in the first 12 Months" by @hakluke
๐Ÿ”ฅ16๐Ÿ‘จโ€๐Ÿ’ป1๐Ÿ—ฟ1
Guy's finally i made Linuxbomber.

A tool that exploit Linux environment and able to damage permanently any Linux OS even some case's it exploit hardware.

Let me know can i upload the tool in my GitHub?

Made just for educational purpose only
๐Ÿ”ฅ21๐Ÿ˜ฑ5๐Ÿ™4โค2๐Ÿ˜2๐Ÿค”1
One of my student in very 1st day of the Advanced Web Pentesing session, just performed a basic automation scan and got sensitive information disclosure.

โœ…If you want to enroll and learn from very beginner level then DM us on https://wa.link/brutsecurity
๐Ÿ‘4
๐Ÿšจ CVE-2025-53652: Jenkins Git Parameter Plugin Unvalidated Input Vulnerability

๐Ÿ”ฅPoC :https://github.com/pl4tyz/CVE-2025-53652-Jenkins-Git-Parameter-Analysis

๐Ÿ‘‡Dorks
HUNTER : https://product.name="Jenkins"

๐Ÿ“ฐRefer:https://jenkins.io/security/advisory/2025-07-09/#SECURITY-3419

https://github.com/advisories/GHSA-qcj2-99cg-mppf
โค8
DomLoggerpp by @kevin_mizu is a simple web extension that helps you identify JavaScript DOM sinks that could lead to DOM-based vulnerabilities (such as XSS)! ๐Ÿ˜Ž

Check it out! ๐Ÿ‘‡
๐Ÿ”—
https://github.com/kevin-mizu/domloggerpp
๐Ÿ”ฅ7๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:

1๏ธโƒฃ See if a GET request accepts POST
2๏ธโƒฃ See if it accepts HTTP/1
3๏ธโƒฃ Disable "Update Content-Length"
4๏ธโƒฃ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked

0

G

5๏ธโƒฃ Send request twice.

If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!

Try this out for yourself in our CL.TE lab:
https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
๐Ÿ‘19โค8๐Ÿ‘3๐Ÿณ1
CVE-2025-7384: Critical PHP Object Injection in WordPress Plugin

A critical vulnerability has been found in the Database for Contact Form 7, WPForms, and Elementor forms WordPress plugin. Since this is a backend-only plugin, it is not directly detectable through standard search dorks. Supported frontend plugins could help determine the scope. However, only about 1% of hosts identified this way are actually vulnerable.

๐Ÿ” Netlas: https://nt.ls/Be3g6
โ„น๏ธ Advisory: https://nt.ls/RoI8t
๐Ÿ˜5
Brut Security pinned Deleted message
๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members

โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link.

๐Ÿ“Œ How it works:

โœฆ Click our link:
https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96
โœฆ Get instant 5% discount on your purchase

๐Ÿ’ก Perfect for bug bounty hunters, pentesters, and researchers who rely on fast, deep internet asset scanning.

#bugbounty #pentesting #osint #cybersecurity #tools
๐Ÿ”ฅ3โค1
Brut Security pinned ยซ๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link. ๐Ÿ“Œ How it works: โœฆ Click our link: https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96โ€ฆยป
๐ŸŽ‰ Happy Independence Day, India! ๐Ÿ‡ฎ๐Ÿ‡ณ

Today we celebrate freedom, unity, and the courage to protect what matters.
To all our friends across the globe โ€” hereโ€™s to peace, respect, and security for every nation. ๐ŸŒ๐Ÿ’ป

Love from the Brut Security family to yours. โค๏ธ
โค21
Hey Hunter's,
DarkShadow here back again, just look at this...

IP Abuse Reports for
127.0.0.1

abuseipdb.com/check/127.0.0.1
๐Ÿ˜6โค1๐Ÿค1๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just look at this crazy one! I see someone find this crazy DOS๐Ÿ”ฅ

Many GraphQL endpoints allow complex queries without auth. If protections like depth limits are missing.
Server will try to resolve it = CPU spike or crash (DOS).


Show your love Guy's โค๏ธ
โค11๐Ÿ—ฟ9๐Ÿค2
โœ…To detect Credit & Debit Card Number Leakage use this Nuclei Template - https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/credit-card-number-detect.yaml
1๐Ÿ‘9๐Ÿ‘4โค1
๐Ÿ˜‚๐Ÿ˜‚
๐Ÿ˜31๐Ÿ”ฅ4๐Ÿ‘2โค1
Hey Hunter's,
DarkShadow here back again
, just dropping a unique XSS method which execute in response header.

XSS in Facebook Response header๐Ÿ’ฅ

Tip: Always check XSS in redirection parameters.


show your love Guy's โค๏ธ๐Ÿ”ฅ

#bugbountytips #xss
โค18๐Ÿ”ฅ6๐Ÿ‘5๐Ÿ—ฟ3