Brut Security – Telegram
Brut Security
14.6K subscribers
901 photos
72 videos
287 files
956 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
CVE-2024-11667: Directory Traversal in Zyxel Firewalls, 7.3 rating❗️

A vulnerability in the web interface of some firewalls allows an attacker to download or upload files using a special URL.

Search at Netlas.io:
👉 Link: https://nt.ls/agozE
👉 Dork: http.favicon.hash_sha256:9a02f3cf948f9409c25070f2f057b69dda5d0aaf7fa8d056552e8bda8295ca1f

Vendor's advisory: https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-27-2024
👍91🗿1
☄️URL scrapper from AlienVault

⚡️The noscript utilizes the AlienVault OTX API to query URLs linked to the specified domain and saves the results in a structured format for further analysis.

🔗 https://github.com/Suryesh/OTX_AlienVault_URL
Please open Telegram to view this post
VIEW IN TELEGRAM
1👍3🔥21
This media is not supported in your browser
VIEW IN TELEGRAM
“It’s the 1st of December Again!”

Another year is slipping by, but guess what? There’s still a whole month left to make it count. For all the bug hunters out there, this is your sign to look back and appreciate how far you’ve come—and to push even harder.

Remember that first bounty? That late-night rush when you cracked a tough challenge? The time you got that “Valid Vulnerability” email that made the sleepless nights worth it?

Bug bounty is a journey. It’s a grind, a game of patience, persistence, and passion. It’s about falling in love with the process—of learning, breaking, fixing, and growing.

If you’re stuck or frustrated, don’t let it define you. Learn from your misses, keep reading, practicing, and hunting. The next breakthrough might be just a scan, payload, or overlooked endpoint away.

December is the perfect month to reflect and refocus. Write those reports, finish that pending recon, or master a new skill. Close the year knowing you gave it your all.

Let’s finish this year strong, hunters. The world’s full of bugs waiting to be squashed—and the next one could be yours.

✈️BrutSecurity
#KeepHunting #BugBountyLife #1stDecemberMomentum
2👍145🗿3
Exploit AWS metadata & user data access in Bug Bounty & CTF challenges!

🔗 https://github.com/Lu3ky13/Unauthorized-Access-to-Metadata-and-User-Data-like-CTF

#BugBounty #bugbountytip
👍9
🔖Ex-param - an automated tool designed for finding reflected parameters for XSS vulnerabilities

https://github.com/rootDR/ex-param
7👍3🗿1
JavaScript for Hackers.pdf
987.7 KB
JavaScript for Hackers by JOAS ANTONIO
👍62
This media is not supported in your browser
VIEW IN TELEGRAM
☄️ParamScan is a simple Chrome extension for web security enthusiasts and pen testers. It helps you find URL parameters in a webpage's source code and check if any of them are reflected on the page. This is super useful for spotting potential XSS vulnerabilities and other security issues.

🔖https://github.com/ch1y0w0/ParamScan
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥14👍65🤨1
☄️URLFinder is a high-speed, passive URL discovery tool designed to simplify and accelerate web asset discovery, ideal for penetration testers, security researchers, and developers looking to gather URLs without active scanning.

⚡️https://github.com/projectdiscovery/urlfinder
Please open Telegram to view this post
VIEW IN TELEGRAM
👍12🔥4🐳2
☄️ TLDFinder - A focused tool designed for discovering private TLDs, making it an essential resource for security researchers. Simplify your exploration with precision and efficiency!

⚠️https://github.com/projectdiscovery/tldfinder
Please open Telegram to view this post
VIEW IN TELEGRAM
6🔥4👍1
🔍Morpheus IOC Scanner - A powerful tool for detecting and analyzing suspicious files, including ransomware and Indicators of Compromise (IOCs). With custom-built rules and advanced integrations, it offers detailed insights to identify sophisticated threats and bolster your defense against cyber risks.

🔗https://github.com/phantom0004/morpheus_IOC_scanner
👍20🔥5
Do give reaction on the post guys, it helped me to stay motivated and to post content like this.🥸
Please open Telegram to view this post
VIEW IN TELEGRAM
👍415🔥2
CVE-2024-8672: Code Injection in Widget Options WordPress Plugin, 9.9 rating 🔥

The vulnerability allows an attacker to enter data that is transmitted without proper filtering. This could potentially lead to remote code execution.

Search at Netlas.io:
👉 Link: https://nt.ls/xOEZp
👉 Dork: http.body:"plugins/widget-options"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/widget-options/widget-options-the-1-wordpress-widget-block-control-plugin-407-authenticated-contributor-remote-code-execution
5👍5
💖🦄 FAVICORN - A versatile tool to search websites using favicons!

🔍How it works:
Simply input a favicon, and Favicorn fetches search result links across 10+ platforms, making it a handy tool for researchers and testers alike.

🔗
https://github.com/sharsil/favicorn
👍141
https://x.com/wtf_brut/status/1863893133379150234
Do Follow Me On
🐣
Have Shared Almost 2000+ Bug Bounty Tips.
😱🇷🇺🇺🇸
Please open Telegram to view this post
VIEW IN TELEGRAM
👍72
🎉 Unlock That 20% Pro Labs Discount! 🎉

Alright, hackers, here’s the deal: Hack The Box Pro Labs just got REAL! 💥 If you’re ready to leave the beginner stuff in the dust and dive into legit red team missions, I’ve got an exclusive 20% off waiting for you. But here’s the catch – only 100 of you can snag this deal. 👀

💥 Use code:
brutsecurityprolabs20

at checkout for 20% off the annual Pro Labs subnoscription! It’s high-level hacking in real enterprise environments. Ready to go pro? 🕶️

🔗Checkout Here - https://hackthebox.com/hacker/pro-labs

Jump on this quick – or you might miss the boat. 🚤💨 #HackTheBox #LevelUp #ProLabs
👍51
Get HoF & Thanks by reporting issues: https://cyfare.net/apps/vdp/
1
This media is not supported in your browser
VIEW IN TELEGRAM
🔍 gitlab-subdomains - A Go-based tool to uncover subdomains via GitLab searches.

🔗https://github.com/gwen001/gitlab-subdomains
7👍2