Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Bug Bounty Checklist.pdf
149.5 KB
πŸ”₯21πŸ‘6❀5
Hey Hunter's,
DarkShadow here back again!

Check your burp isn't this feature is enable?

Most of hackers miss this thing. So, this is a great opportunity to make bounty using this burp feature.

#bugbountytips #burp
1❀8πŸ‘7πŸ‘4πŸ”₯2
πŸͺ² Bug Bounty Pro Tip: #H2C Upgrade Bypass

Target: Applications using HTTP/2 Cleartext (h2c) upgrades.

The Core Idea: Many Web Application Firewalls (WAFs) and reverse proxies process HTTP/1.1 but fail to correctly inspect traffic after it's upgraded to HTTP/2.

How to Test:

1. Find a target that accepts an Upgrade: h2c header (common in Java, gRPC, and some reverse proxies like Nginx).

2. Send an initial HTTP/1.1 request with the upgrade header:

GET / HTTP/1.1
Host: example.com
Upgrade: h2c
Connection: Upgrade

3. If the server agrees (responds with HTTP/1.1 101 Switching Protocols), the connection is now HTTP/2.

4. The Bypass: Craft and send malformed or smuggled HTTP/2 frames (e.g., with the :method header set to GET or POST). The downstream WAF may not parse this, allowing you to access internal endpoints or bypass security controls.

Why it works: The security boundary often only exists at the HTTP/1.1 layer. Once upgraded, your HTTP/2 traffic might be forwarded directly to the backend without inspection.

#BugBounty #Hacking #WebSecurity #WAFBypass #HTTP2
1πŸ”₯29❀14πŸ‘5
dON'T fORGET tO gIVE rEACTIONS
❀26πŸ”₯6😁4πŸ—Ώ1
⚑Sn1per - Automate your recon like never before!

βœ… https://github.com/1N3/Sn1per
πŸ”₯19❀9😱2
⚑S3Scan - A powerful S3 bucket security scanner designed for penetration testing and bug bounty hunting. This tool automatically detects misconfigurations and security vulnerabilities in AWS S3 buckets.

βœ…https://github.com/KingOfBugbounty/s3tk
πŸ‘20❀6πŸ‘¨β€πŸ’»2
Mobile Hacking Bug Bounty.pdf
4.4 MB
Mobile Hacking Bug Bounty: The Practical Checklist
1πŸ‘18πŸ”₯10❀2πŸ‘2🐳1
⚑Bug Bounty Reports Extractor - CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.

βœ…
https://github.com/newstartlikenoneanthor-pixel/report-extractor
❀17πŸ”₯6😱2
😁56πŸ‘5πŸ—Ώ2πŸ‘¨β€πŸ’»1🫑1
⚑️Recently updated Proof-of-Concepts

βœ”οΈLink to Download - https://github.com/0xMarcio/cve
Please open Telegram to view this post
VIEW IN TELEGRAM
❀17πŸ”₯5πŸ‘4πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
β˜„οΈFind new associated domains with this simple Google dork:

"Β© <COMPANY>. all rights reserved." -".<COMPANY>.com"
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯17❀7πŸ‘4😱1
dON'T fORGET tO gIVE rEACTIONS
❀22πŸ—Ώ8πŸ”₯2🀨2
Hey Hunter's,
DarkShadow here back again!

A hidden backdoor was in PHP version which allow remote code execution In user-agent header.

Guess Guy's which version it is?

#backdoor
❀19😁2πŸ‘¨β€πŸ’»1
πŸ”₯Google Dork - Exposed Configs πŸ”

site:example[.]com ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json

Β©TakSec
Please open Telegram to view this post
VIEW IN TELEGRAM
❀30πŸ‘13πŸ”₯6
β˜„οΈJSRecon-Buddy - A simple browser extension to quickly find interesting security-related information on a webpage.

πŸ”΄https://github.com/TheArqsz/JSRecon-Buddy
Please open Telegram to view this post
VIEW IN TELEGRAM
1πŸ”₯24❀8πŸ‘4πŸ‘4🀝1
dON'T fORGET tO gIVE rEACTIONS
πŸ”₯15
β˜„οΈ Malicious PDF Generator - Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

✨ https://github.com/jonaslejon/malicious-pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
❀14πŸ‘9πŸ‘2