Brut Security
14.7K subscribers
909 photos
73 videos
287 files
966 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:

1๏ธโƒฃ See if a GET request accepts POST
2๏ธโƒฃ See if it accepts HTTP/1
3๏ธโƒฃ Disable "Update Content-Length"
4๏ธโƒฃ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked

0

G

5๏ธโƒฃ Send request twice.

If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!

Try this out for yourself in our CL.TE lab:
https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
๐Ÿ‘19โค8๐Ÿ‘3๐Ÿณ1
CVE-2025-7384: Critical PHP Object Injection in WordPress Plugin

A critical vulnerability has been found in the Database for Contact Form 7, WPForms, and Elementor forms WordPress plugin. Since this is a backend-only plugin, it is not directly detectable through standard search dorks. Supported frontend plugins could help determine the scope. However, only about 1% of hosts identified this way are actually vulnerable.

๐Ÿ” Netlas: https://nt.ls/Be3g6
โ„น๏ธ Advisory: https://nt.ls/RoI8t
๐Ÿ˜5
Brut Security pinned Deleted message
๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members

โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link.

๐Ÿ“Œ How it works:

โœฆ Click our link:
https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96
โœฆ Get instant 5% discount on your purchase

๐Ÿ’ก Perfect for bug bounty hunters, pentesters, and researchers who rely on fast, deep internet asset scanning.

#bugbounty #pentesting #osint #cybersecurity #tools
๐Ÿ”ฅ3โค1
Brut Security pinned ยซ๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link. ๐Ÿ“Œ How it works: โœฆ Click our link: https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96โ€ฆยป
๐ŸŽ‰ Happy Independence Day, India! ๐Ÿ‡ฎ๐Ÿ‡ณ

Today we celebrate freedom, unity, and the courage to protect what matters.
To all our friends across the globe โ€” hereโ€™s to peace, respect, and security for every nation. ๐ŸŒ๐Ÿ’ป

Love from the Brut Security family to yours. โค๏ธ
โค21
Hey Hunter's,
DarkShadow here back again, just look at this...

IP Abuse Reports for
127.0.0.1

abuseipdb.com/check/127.0.0.1
๐Ÿ˜6โค1๐Ÿค1๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just look at this crazy one! I see someone find this crazy DOS๐Ÿ”ฅ

Many GraphQL endpoints allow complex queries without auth. If protections like depth limits are missing.
Server will try to resolve it = CPU spike or crash (DOS).


Show your love Guy's โค๏ธ
โค11๐Ÿ—ฟ9๐Ÿค2
โœ…To detect Credit & Debit Card Number Leakage use this Nuclei Template - https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/credit-card-number-detect.yaml
1๐Ÿ‘9๐Ÿ‘4โค1
๐Ÿ˜‚๐Ÿ˜‚
๐Ÿ˜31๐Ÿ”ฅ4๐Ÿ‘2โค1
Hey Hunter's,
DarkShadow here back again
, just dropping a unique XSS method which execute in response header.

XSS in Facebook Response header๐Ÿ’ฅ

Tip: Always check XSS in redirection parameters.


show your love Guy's โค๏ธ๐Ÿ”ฅ

#bugbountytips #xss
โค18๐Ÿ”ฅ6๐Ÿ‘5๐Ÿ—ฟ3
Hey Hunter's,
DarkShadow here back again, just dropping a unique method to bypass waf for XSS ๐Ÿ”ฅ

Waf Blocked โŒ
javascript:alert()

Waf welcome โœ…
javascript:new Functiondocument.body.style.background="red"

โœ”๏ธ If waf Blocked additional functions then try to change the background color๐Ÿ’ฅ


#bugbountytips #xss
๐Ÿ‘10โค7๐Ÿ‘4
Shodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member

Go Grab it Now โœจ
๐Ÿ˜14๐Ÿ‘1๐Ÿ—ฟ1
Brut Security pinned ยซShodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member Go Grab it Now โœจยป
Guy's DarkShadow here ๐Ÿ™‚
Tools: manual testing!
by DarkShadow
๐Ÿ”ฅ15๐Ÿ‘4โค1
Hunter's, DarkShadow here!

One liner for finding files

subfinder -d domain.com -silent | \
while read host; do \
 for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json /google-services.json /package.json /package-lock.json /composer.json /pom.xml /docker-compose.yml /manifest.json /service-worker.js; do \
  echo "$host$path"; \
 done; \
done | httpx -mc 200


#bugbountytips
โค29๐Ÿ‘จโ€๐Ÿ’ป3๐Ÿ—ฟ3๐Ÿ”ฅ2
๐Ÿ˜ถโ€๐ŸŒซ๏ธ
๐Ÿ˜33๐Ÿ˜ข6๐Ÿ—ฟ4โค1
Hunter's, the vulnerability was SSRF loading AWS cloud access.

and effects:

IITE โ€“ Institute of Information Technology & Education: Access to confidential student information, assessment data, and internal records.

MUHS โ€“ Maharashtra University of Health Sciences: Exposure of examination content, student records, and academic documents.

GSEB โ€“ Gujarat Secondary & Higher Secondary Education Board: Exposure of sensitive student records, exam papers, hall tickets, and related educational data.

RGUHS โ€“ Rajiv Gandhi University of Health Sciences: Access to examination papers, student records, and other confidential academic information.

i have a video POC wanna see how i was able exploit this bug!?


And don't forget to follow me ๐Ÿ‘‰๐Ÿผ x.com/darkshadow2bd


#ssrf
๐Ÿ‘10๐Ÿ‘3๐Ÿซก2๐Ÿ”ฅ1