Brut Security
14.6K subscribers
909 photos
73 videos
287 files
966 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Happy Kali Puja πŸͺ”
❀9😁6πŸ™1
πŸ‘¨β€πŸ³ Damn-Vulnerable-RESTaurant πŸ‘¨β€πŸ³

⚑️An intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethical hackers and security engineers.

βœ…Get:
https://github.com/theowni/Damn-Vulnerable-RESTaurant-API-Game
❀10πŸ”₯3
Need to quickly check for exposed backup files? Check out fuzzuli, a simple tool by @musana to quickly check for sensitive files! 🀠

πŸ”— github.com/musana/fuzzuli
❀10πŸ”₯3πŸ—Ώ1
🚨New Batch Starting in November! Few seats are left. Hurry Up!
DM to Enroll
+918945971332 or wa.link/brutsecurity
❀12πŸ”₯7πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
2 step verification πŸ˜‚
😁25😒5
One of my student in very 1st day of the Advanced Web Pentesing session, just performed a basic automation scan and got sensitive information disclosure.

βœ…If you want to enroll and learn from very beginner level then DM us on https://wa.link/brutsecurity
❀7πŸ‘5πŸ™1
πŸ”₯Top 25 Bug Bounty Platform πŸ’°

01. Bugcrowd
02. HackerOne
03. Intigriti
04. YesWeHack
05. Synack, Inc.
06. HackenProof | Web3 bug bounty platform
07. Open Bug Bounty
08. Immunefi
09. Cobalt
10. Zerocopter
11. Yogosha
12. SafeHats
13. Vulnerability Research Labs, LLC
14. AntiHACKme Pte Ltd
15. RedStorm Information Security
16. Cyber Army Indonesia
17. Hacktrophy
18. Nordic Defender
19. Capture The Bug
20. Bugbounter
21. Detectify
22. BugBase
23. huntr
24. Pentabug
25. SecureBug

Happy Hunt ❀️
Please open Telegram to view this post
VIEW IN TELEGRAM
❀26🀨2πŸ—Ώ2
πŸ•΅οΈβ€β™‚οΈ Hunting for Business Logic Bugs? Try this:

⚑Exploit Flow:
1.Sign up with a new username
2.Activate the account
3.Delete the account
4.Try creating a new account using that same username

πŸ‘€ If it stops you β€” that’s a Business Logic flaw!

πŸ’‘ Usernames from deleted accounts shouldn't stay reserved unless there's a valid reason.
❀12🐳6πŸ”₯4
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Are you using a VPS for bug bounty or cybersecurity stuff?
Tired of all the hassle when moving small files around? πŸ‘»

Try this absolute gem πŸ”₯

cat filename.txt | nc termbin.com 9999


πŸ–₯Boom! You get a link like https://termbin.com/abcd β€” share it, save it, or just keep it for later. No login, no setup. Just pure terminal magic. ✨

Perfect for notes, PoCs, or scripts when you're working remotely on a VPS. πŸ’»πŸ”’

#bugbounty #cybersecurity #linuxTips #vps #infosec #hacking #brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❀18
Tired of switching tabs for OSINT and recon? Just join our Discord and type sudo help to unlock powerful tools in seconds!

βœ… IP & Domain Lookup
βœ… Email & Phone OSINT
βœ… Subdomain Enumeration
βœ… Reverse Image Search
βœ… URL & Virus Scanners
βœ… Temp Email, QR Tools, and more

🌟 You can create and play your own CTF in a minute , right inside Discord!

Try it out now β€” it’s fast, simple, and all in one chat.
πŸ”— https://discord.gg/u7uMFV833h

#ctf #bugbounty #osint #cybersecurity #discordtools #infosec
❀12
JSMap Inspector - A powerful, offline, single-file HTML tool designed for developers and security researchers to inspect and analyze JavaScript Source Map (.js.map) files.

https://github.com/ynsmroztas/JSMap-Inspector
❀16πŸ‘4πŸ”₯2
This media is not supported in your browser
VIEW IN TELEGRAM
🫩
😒21😁10❀2
Brut Security pinned Deleted message
Who is your favorite hacker? πŸ‘€
❀13🐳2
β˜„οΈJSRecon-Buddy - A simple browser extension to quickly find interesting security-related information on a webpage.

πŸ”΄https://github.com/TheArqsz/JSRecon-Buddy
Please open Telegram to view this post
VIEW IN TELEGRAM
❀20
🚨 CVE-2025-61481 (CVSS 10.0) : Critical MikroTik Flaw Exposes Router Admin Credentials Over Unencrypted HTTP WebFig. It affects RouterOS v.7.14.2 and SwitchOS v.2.18.

πŸ‘‡Dork:
HUNTER : https://product.name="MikroTik RouterOS"||https://product.name="MikroTik SwOS"
❀7πŸ”₯2
CVE-2025-54236: Improper Input Validation in Magento (Adobe Commerce), 9.1 rating πŸ”₯

A critical vulnerability disclosed in a recent advisory allows attackers to perform RCE. Exploitation attempts have already been recorded!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/Edck5
πŸ‘‰ Dork: tag.name:"magento" AND http.headers.server:"Apache"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb25-88.html
❀3πŸ‘2πŸ—Ώ2
Hey Hunters,
DarkShadow here back again, dropping an

interesting XSS input sanitization bypass method.

You might have noticed that most websites currently use input sanitization by blocking certain tags and events, right!? Not really πŸ˜…

Okay, so first, have a look at some example tags that could trigger XSS:

script, img, a, iframe, object, video, audio, form, meta

The website blocks these keywords if they appear inside tags like < > or </ > and replaces them with nothing β€” basically, null or an empty string "".

So, if you try a payload like:

<script>alert(1)</script>


It will be replaced with:

alert(1)


Now, think a bit more deeply β€” what if you write a payload like this:

<script <img>> alert(1) </script </img>>

In this payload, look at the first part:
<script <img>>


Here, <img> is a full image tag, and it will definitely be removed by the sanitization filter. But what about <script<?

You can see the <script> tag isn’t written properly yet β€” it’s <script followed by <, so it doesn’t match the sanitization logic exactly.

Now, the interesting part is when the <img> tag gets removed from <script <img>>. After that, we’re left with <script>!

That means the transformation is like this:

<script <img>> β†’ remove <img> β†’ <script>

</script </img>> β†’ remove </img> β†’ </script>

And finally, we get a valid payload:

<script>alert(1)</script>


So guys, if you really like reading DarkShadow’s methodologies, show your LOVE.

And don’t forget to follow me πŸ‘‰πŸΌ x.com/darkshadow2bd

#bugbountytips #xss
πŸ‘16πŸ”₯6❀4πŸ—Ώ4
Brut Security pinned Deleted message