Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
๐Ÿ”ฅCVE-2025-59934: Critical Flaw in Formbricks Allows Unauthorized
Password Resets via Forged JWT Tokens


๐Ÿ˜˜POC -https://github.com/formbricks/formbricks/security/advisories/GHSA-7229-q9pv-j6p4

๐ŸซกDorks : https://product.name="Formbricks"
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10โค5๐Ÿ‘1
Happy Durga Puja to all Brut Security members! May Maa Durga bless you with strength, wisdom, and protection in every battle you fight, both in life and in cyberspace. ๐Ÿ˜‡๐Ÿ˜‡๐Ÿ˜‡
Please open Telegram to view this post
VIEW IN TELEGRAM
โค17๐Ÿ™8๐Ÿ‘2
Hey Hunter's,
Darkshadow here back again, just dropping another SSRF!

Look this SSRF in
exif.tools that i got. Interesting but not impactful. But still it's confirmed SSRF presents.

โœจTip:
1๏ธโƒฃIf server made unauthenticated HTTP request and any how you see the http response content means critical SSRF

2๏ธโƒฃIf not showing any http response content means blind SSRF medium severity

#bugbountytips #ssrf
๐Ÿ—ฟ11๐Ÿ”ฅ3โค1
๐Ÿ”ฅFlareProx - Simple IP Rotation & URL Redirection via Cloudflare Workers. It automatically deploys HTTP proxy endpoints on Cloudflare Workers for easy redirection of all traffic to any URL you specify. It supports all HTTP methods (GET, POST, PUT, DELETE, etc.) and provides IP masking through Cloudflare's global network. 100k requests per day are free!

๐Ÿ˜˜https://github.com/MrTurvey/flareprox
Please open Telegram to view this post
VIEW IN TELEGRAM
โค15๐Ÿ‘1
๐ŸŒธ Happy Bijaya Dashami ๐ŸŒธ

From the Brut Security family, wishing you all joy, peace, and success on this special day of Bijaya Dashami.
As Maa Durga returns to her divine abode, may her blessings bring strength, wisdom, and prosperity into your life.

๐Ÿ†˜November Batch Enrollment is Now Open!

For all beginners and wanna-learners, weโ€™re starting fresh batches for:
โ€ขbPEH (Brut Practical Ethical Hacking)
โ€ขbPWA / bPBB (Brut Practical Web Pentesting & Bug Bounty)

๐ŸŽ“ Special student discounts are available.
๐Ÿ‘‰ Seats are limited, so do enroll early!
โ™พwa.link/brutsecurity or +918945971332
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10๐Ÿ˜2๐Ÿ˜ข1
๐Ÿ”ฅLEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services.

๐Ÿซกhttps://github.com/rohsec/LEAKEY
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10๐Ÿ‘4โค3
This media is not supported in your browser
VIEW IN TELEGRAM
Binary or web?
๐Ÿ˜22๐Ÿ—ฟ13๐Ÿ‘3โค1๐Ÿ˜ข1
domains.txt
836.9 KB
๐ŸŒ€Download all bug bounty programs domains in scope items ๐ŸŽฏ

๐Ÿ˜‰Get a full list of domains from active bug bounty programs across platforms like HackerOne, Bugcrowd, Intigriti, and more โ€“ all in one place!๐Ÿ’ฅ

๐Ÿ‘‡๐ŸผStep 1: Download the domains.txt file

๐Ÿ“‚step 2: Extract only main/root domains

`cat domains.txt | awk -F '.' '{print $(NF-1)"."$NF}' | grep -Eo '([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,}' | sort -u > main_domains`

๐Ÿ“‚Step 3: Extract all IP addresses:

`grep -Eo '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' domains.txt > ips.txt`

Don't forget to give reactionsโค๏ธ
โค34๐Ÿ”ฅ8๐Ÿ‘6
Hey hunters,
DarkShadow here back again!

๐Ÿ”ฅSSTI to RCE in URL ๐Ÿ’€

POC:
target.com/docs/1.0/123 = not found.

so i tried:
target.com/docs/1.0/?123 = now itโ€™s reflecting in source code like /docs/1.0/?123#

so i tried again:
target.com/docs/1.0/?{{7*7}} = /docs/1.0/?49#

and itโ€™s worked! SSTI payload it executed here๐Ÿ˜

after researching a while, code injection done by /docs/1.0/?{{phpinfo()}}


so guyโ€™s always try be uniq and different. and if guyโ€™s really love to read my buybounty methodologies then follow me in x x.com/darkshadow2bd

#ssti #bugbountytips
๐Ÿ”ฅ30โค5๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:

1๏ธโƒฃ See if a GET request accepts POST
2๏ธโƒฃ See if it accepts HTTP/1
3๏ธโƒฃ Disable "Update Content-Length"
4๏ธโƒฃ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked

0

G

5๏ธโƒฃ Send request twice.

If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!

Try this out for yourself in our CL.TE lab:
https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
โค30๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ˜˜dON'T fORGET tO gIVE rEACTIONS๐Ÿซก
Please open Telegram to view this post
VIEW IN TELEGRAM
โค24
๐ŸšจBB Tip โ€” WAF evasion with weird chars

Hereโ€™s the thing: attackers hide simple payloads (eg. cat /etc/passwd) by stuffing params with backslashes, \x.. hex, IFS, and odd punctuation (|/???/\b**\h). Donโ€™t match raw strings โ€” normalize first, then detect.

๐Ÿ‘‰Quick checks:
Decode repeatedly until stable, then run signatures.
Flag mixed-encoding or repeated escape sequences.
Use allowlists for expected param formats.


๐Ÿ“ŽReference- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection#filter-bypassesAC
Please open Telegram to view this post
VIEW IN TELEGRAM
โค15๐Ÿ”ฅ6๐Ÿ‘1๐Ÿ˜1
๐Ÿšจ Find Low Hanging Fruits Using Nuclei AI ๐Ÿšจ

nuclei -list targets.txt -ai "Find exposed AI/ML model files (.pkl, .h5, .pt) that may leak proprietary algorithms or sensitive training data"

nuclei -list targets.txt -ai "Find exposed automation scripts (.sh, .ps1, .bat) revealing internal tooling or credentials"

nuclei -list targets.txt -ai "Identify misconfigured CSP headers allowing 'unsafe-inline' or wildcard sources"

nuclei -list targets.txt -ai "Detect pages leaking JWT tokens in URLs or cookies"

nuclei -list targets.txt -ai "Identify overly verbose error messages revealing framework or library details"

nuclei -list targets.txt -ai "Find application endpoints with verbose stack traces or source code exposure"

nuclei -list targets.txt -ai "Find sensitive information in HTML comments (debug notes, API keys, credentials)"

nuclei -list targets.txt -ai "Find exposed .env files leaking credentials, API keys, and database passwords"

nuclei -list targets.txt -ai "Find exposed configuration files such as config.json, config.yaml, config.php, application.properties containing API keys and database credentials."

nuclei -list targets.txt -ai "Find exposed configuration files containing sensitive information such as credentials, API keys, database passwords, and cloud service secrets."

nuclei -list targets.txt -ai "Find database configuration files such as database.yml, db_config.php, .pgpass, .my.cnf leaking credentials."

nuclei -list targets.txt -ai "Find exposed Docker and Kubernetes configuration files such as docker-compose.yml, kubeconfig, .dockercfg, .docker/config.json containing cloud credentials and secrets."

nuclei -list targets.txt -ai "Find exposed SSH keys and configuration files such as id_rsa, authorized_keys, and ssh_config."

nuclei -list targets.txt -ai "Find exposed WordPress configuration files (wp-config.php) containing database credentials and authentication secrets."

nuclei -list targets.txt -ai "Identify exposed .npmrc and .yarnrc files leaking NPM authentication tokens"

nuclei -list targets.txt -ai "Identify open directory listings exposing sensitive files"

nuclei -list targets.txt -ai "Find exposed .git directories allowing full repo download"

nuclei -list targets.txt -ai "Find exposed .svn and .hg repositories leaking source code"

nuclei -list targets.txt -ai "Identify open FTP servers allowing anonymous access"

nuclei -list targets.txt -ai "Find GraphQL endpoints with introspection enabled"

nuclei -list targets.txt -ai "Identify exposed .well-known directories revealing sensitive data"

nuclei -list targets.txt -ai "Find publicly accessible phpinfo() pages leaking environment details"

nuclei -list targets.txt -ai "Find exposed Swagger, Redocly, GraphiQL, and API Blueprint documentation"

nuclei -list targets.txt -ai "Identify exposed .vscode and .idea directories leaking developer configs"

nuclei -list targets.txt -ai "Detect internal IP addresses (10.x.x.x, 192.168.x.x, etc.) in HTTP responses"

nuclei -list targets.txt -ai "Find exposed WordPress debug.log files leaking credentials and error messages"

nuclei -list targets.txt -ai "Detect misconfigured CORS allowing wildcard origins ('*')"

nuclei -list targets.txt -ai "Find publicly accessible backup and log files (.log, .bak, .sql, .zip, .dump)"

nuclei -list targets.txt -ai "Find exposed admin panels with default credentials"

nuclei -list targets.txt -ai "Identify commonly used API endpoints that expose sensitive user data, returning HTTP status 200 OK."

nuclei -list targets.txt -ai "Detect web applications running in debug mode, potentially exposing sensitive system information."
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8๐Ÿ”ฅ6
๐Ÿ‘‰Check Well Known Files/Paths - A JS console script to paste into console
It will attempt to identify and uncover potentially useful files for enumeration


โžก๏ธScript: https://hackertips.today/cmd/CheckWellKnown.js

๐ŸฅณHow to use:
โ€ข Open the script URL and copy it to clipboard.
โ€ข Open the target site, Inspect โ†’ Console.
โ€ข Paste the script and run.
โ€ข Look for any requests returning HTTP 200, visit those URLs and validate exposure.

๐Ÿ˜ฎWhat to watch for:
โ€ข /.git, /.env, backup files, robots.txt revealing sensitive paths, config files, or public storage with credentials.
โ€ข Any unexpected 200 on predictable filenames.

๐ŸŸขQuick mitigation:
โ€ข Remove or restrict public access to sensitive files.
โ€ข Block common sensitive filenames at the webserver/WAF.
โ€ข Return 403/404 for those paths and avoid leaking contents in error pages.

----------------------------------------------------------------------------
๐Ÿ“– Your Ethical Hacking Journey Starts Here โ†’ topmate.io/saumadip/1391531
๐ŸŽ“ Ready to Skill Up? Enroll Now โ†’ wa.link/brutsecurity
๐Ÿ“ข Join the Community: discord.gg/u7uMFV833h
Please open Telegram to view this post
VIEW IN TELEGRAM
โค18๐Ÿ‘5๐Ÿ”ฅ2
If you liked the posts, tap the heart. That tiny click means a lot. โค๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค49๐Ÿ”ฅ5
๐ŸฅณDiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

๐ŸŸข https://github.com/pwnfuzz/diffrays
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10