Brut Security
14.6K subscribers
909 photos
73 videos
287 files
966 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: [email protected]
Download Telegram
ffufai is an AI-powered wrapper for the popular web fuzzer ffuf. It automatically suggests file extensions for fuzzing based on the target URL and its headers, using either OpenAI's GPT or Claude AI models.

🔗
https://github.com/jthack/ffufai
👍9
13🗿4
New Beast Added 😮‍💨
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3🗿31
PHP have released new sunglasses 😎

php.net/sunglasses
👍7
👍9🔥6🗿2
🗿9👍5🐳2
Forwarded from Netlas.io
🔥 Improved Interaction with Private Scanner 🔥

Netlas 0.25.1 Update was published. IP/Domain information is now sourced from private scans if they are more relevant than general results. Check out the example in the picture! 👾

👉 Read about other changes: https://docs.netlas.io/changelog/
👍2
10👍1
Worlds fastest unlimited single and bulk subdomain finder! Use desktop!

https://cyfare.net/apps/subfind/
🔥9
https://cspbypass.com

A site where you can search for known CSP bypass gadgets to gain XSS.
4
Top Hacking / Cyber Security Related Posts
🪪By Daniel Kelley

🔗https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3
5👍3
CVE-2024-31449 and other: Multiple vulnerabilities in Redis, 4.5 - 8.8 rating❗️

Three fresh vulnerabilities allow an attacker to perform RCE due to errors in the Lua scripting engine or DoS via malformed Access Control List selectors.

Search at Netlas.io:
👉 Link: https://nt.ls/1G7ul
👉 Dork: protocol:redis

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
👍61
🌐 Google Dorking Made Easy

Link : https://dorksearch.com/

This Website help you with Google Dorking Try it Now and Give Reactions 🤟

#bugbounty #bugbountytips
👍1🐳1
☄️TechDefence is Hiring☄️

📌Share Your Resume- +91 78618 86497
(No Calls)
Please open Telegram to view this post
VIEW IN TELEGRAM
SubOwner - This tool is designed to check for subdomain takeovers by resolving the CNAME records and verifying them against known vulnerable services.

🔗 https://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥75
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
4👍2🔥1
*CVE-2024-45409 | Ruby-SAML Auth Bypass In GitLab*
_*What You’ll Learn💡*_
1️⃣ *Overview | Discription of CVE-2024-45409*
2️⃣ *Reconnaissance For CVE-2024-45409*
*Shodan.io*
*Censys.io*
*Fofa.info*
*Hunter.how*
*ZoomEYE.HK*
_<======================>_
3️⃣ *E͢x͢p͢l͢o͢i͢t͢ ☣️ CVE-2024-45409 | GiveWP WordPress Plugin Exploit*

4️⃣ *E͢x͢p͢l͢o͢i͢t͢ Installation📥*
5️⃣ *E͢x͢p͢l͢o͢i͢t͢ Tool Guide🧭*
6️⃣ *Impact_💥*
7️⃣ *Severity_⚠️*
8️⃣ *Remediation_♻️*
_https://yashsec.com/bug-bounty/cve-2024-45409-auth-bypass-in-gitlab/
👍3
CVE-2024-43582: RCE in RDP Servers, 8.1 rating❗️

A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution. The patch is already available.

Search at Netlas.io:
👉 Link: https://nt.ls/Jyn4r
👉 Dork: protocol:rdp

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582
👍6