Brut Security
14.7K subscribers
909 photos
73 videos
287 files
966 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
CVE-2025-7384: Critical PHP Object Injection in WordPress Plugin

A critical vulnerability has been found in the Database for Contact Form 7, WPForms, and Elementor forms WordPress plugin. Since this is a backend-only plugin, it is not directly detectable through standard search dorks. Supported frontend plugins could help determine the scope. However, only about 1% of hosts identified this way are actually vulnerable.

๐Ÿ” Netlas: https://nt.ls/Be3g6
โ„น๏ธ Advisory: https://nt.ls/RoI8t
๐Ÿ˜5
Brut Security pinned Deleted message
๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members

โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link.

๐Ÿ“Œ How it works:

โœฆ Click our link:
https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96
โœฆ Get instant 5% discount on your purchase

๐Ÿ’ก Perfect for bug bounty hunters, pentesters, and researchers who rely on fast, deep internet asset scanning.

#bugbounty #pentesting #osint #cybersecurity #tools
๐Ÿ”ฅ3โค1
Brut Security pinned ยซ๐Ÿ”ฅ Exclusive ZoomEye Offer for Brut Security Members โœ…ZoomEye is giving Brut Security members 5% off any membership plan โ€” monthly or yearly โ€” through our special link. ๐Ÿ“Œ How it works: โœฆ Click our link: https://www.zoomeye.ai/pricing?aff=INVITE-2SW2-FC96โ€ฆยป
๐ŸŽ‰ Happy Independence Day, India! ๐Ÿ‡ฎ๐Ÿ‡ณ

Today we celebrate freedom, unity, and the courage to protect what matters.
To all our friends across the globe โ€” hereโ€™s to peace, respect, and security for every nation. ๐ŸŒ๐Ÿ’ป

Love from the Brut Security family to yours. โค๏ธ
โค21
Hey Hunter's,
DarkShadow here back again, just look at this...

IP Abuse Reports for
127.0.0.1

abuseipdb.com/check/127.0.0.1
๐Ÿ˜6โค1๐Ÿค1๐Ÿซก1
Hey Hunter's,
DarkShadow here back again, just look at this crazy one! I see someone find this crazy DOS๐Ÿ”ฅ

Many GraphQL endpoints allow complex queries without auth. If protections like depth limits are missing.
Server will try to resolve it = CPU spike or crash (DOS).


Show your love Guy's โค๏ธ
โค11๐Ÿ—ฟ9๐Ÿค2
โœ…To detect Credit & Debit Card Number Leakage use this Nuclei Template - https://github.com/projectdiscovery/nuclei-templates/blob/main/http/miscellaneous/credit-card-number-detect.yaml
1๐Ÿ‘9๐Ÿ‘4โค1
๐Ÿ˜‚๐Ÿ˜‚
๐Ÿ˜31๐Ÿ”ฅ4๐Ÿ‘2โค1
Hey Hunter's,
DarkShadow here back again
, just dropping a unique XSS method which execute in response header.

XSS in Facebook Response header๐Ÿ’ฅ

Tip: Always check XSS in redirection parameters.


show your love Guy's โค๏ธ๐Ÿ”ฅ

#bugbountytips #xss
โค18๐Ÿ”ฅ6๐Ÿ‘5๐Ÿ—ฟ3
Hey Hunter's,
DarkShadow here back again, just dropping a unique method to bypass waf for XSS ๐Ÿ”ฅ

Waf Blocked โŒ
javascript:alert()

Waf welcome โœ…
javascript:new Functiondocument.body.style.background="red"

โœ”๏ธ If waf Blocked additional functions then try to change the background color๐Ÿ’ฅ


#bugbountytips #xss
๐Ÿ‘10โค7๐Ÿ‘4
Shodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member

Go Grab it Now โœจ
๐Ÿ˜14๐Ÿ‘1๐Ÿ—ฟ1
Brut Security pinned ยซShodan.io $5 Lifetime Membership sale is live for the next 24 hours: account.shodan.io/billing/member Go Grab it Now โœจยป
Guy's DarkShadow here ๐Ÿ™‚
Tools: manual testing!
by DarkShadow
๐Ÿ”ฅ15๐Ÿ‘4โค1
Hunter's, DarkShadow here!

One liner for finding files

subfinder -d domain.com -silent | \
while read host; do \
 for path in /config.js /config.json /app/config.js /settings.json /database.json /firebase.json /.env /.env.production /api_keys.json /credentials.json /secrets.json /google-services.json /package.json /package-lock.json /composer.json /pom.xml /docker-compose.yml /manifest.json /service-worker.js; do \
  echo "$host$path"; \
 done; \
done | httpx -mc 200


#bugbountytips
โค29๐Ÿ‘จโ€๐Ÿ’ป3๐Ÿ—ฟ3๐Ÿ”ฅ2
๐Ÿ˜ถโ€๐ŸŒซ๏ธ
๐Ÿ˜33๐Ÿ˜ข6๐Ÿ—ฟ4โค1
Hunter's, the vulnerability was SSRF loading AWS cloud access.

and effects:

IITE โ€“ Institute of Information Technology & Education: Access to confidential student information, assessment data, and internal records.

MUHS โ€“ Maharashtra University of Health Sciences: Exposure of examination content, student records, and academic documents.

GSEB โ€“ Gujarat Secondary & Higher Secondary Education Board: Exposure of sensitive student records, exam papers, hall tickets, and related educational data.

RGUHS โ€“ Rajiv Gandhi University of Health Sciences: Access to examination papers, student records, and other confidential academic information.

i have a video POC wanna see how i was able exploit this bug!?


And don't forget to follow me ๐Ÿ‘‰๐Ÿผ x.com/darkshadow2bd


#ssrf
๐Ÿ‘10๐Ÿ‘3๐Ÿซก2๐Ÿ”ฅ1
If you are new, don't think pro's comes there position easily.

Finding a valid bug is not about how much tools you have or know, remember knowledge dose.

There no shortcut, no guidelines.
If you able to do your self, you able to gain experience.

~DarkShadow
โค28