Brut Security – Telegram
Brut Security
14.6K subscribers
902 photos
72 videos
287 files
956 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
☄️HExHTTP - HExHTTP is a tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors.

⚠️https://github.com/c0dejump/HExHTTP
Please open Telegram to view this post
VIEW IN TELEGRAM
👍11🔥53
▶️Explore Bug Bounty POC Videos: https://news.1rj.ru/str/brutsecurity_poc
Please open Telegram to view this post
VIEW IN TELEGRAM
Brut Security pinned «▶️Explore Bug Bounty POC Videos: https://news.1rj.ru/str/brutsecurity_poc»
👍82
New Business Logic POC Video Shared -https://news.1rj.ru/str/brutsecurity_poc/9
🔥41
CVE-2025-0314 and other: Multiple vulnerabilities in GitLab, 4.3 - 8.7 rating❗️

In a recent advisory, GitLab writed about three vulnerabilities, including stored XSS, resource exhaustion, and protected CI/CD variables exfiltration.

Search at Netlas.io:
👉 Link: https://nt.ls/BNKS8
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/01/22/patch-release-gitlab-17-8-1-released/
🤝4
☄️Information Disclosure Dork☄️

site:*.example.com (ext:doc OR ext:docx OR ext:odt OR ext:pdf OR ext:rtf OR ext:ppt OR ext:pptx OR ext:csv OR ext:xls OR ext:xlsx OR ext:txt OR ext:xml OR ext:json OR ext:zip OR ext:rar OR ext:md OR ext:log OR ext:bak OR ext:conf OR ext:sql)
Please open Telegram to view this post
VIEW IN TELEGRAM
👍16🔥131
▶️Automated JS Endpoint Extraction and Verification with HTTPX and GAU
echo "target.com" | gau --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,noscript \| grep -E "\.js($|\?.*)" \
| httpx -er "(?:(https?|ftp|git|ssh|telnet|smtp|imap|pop3|ldap|sftp|smb|nfs|rtmp|rtsp|ws|wss|irc|news|gopher|rsync|data):\/\/|\/)[^\s\"'\*\(\){};\\\^\$\&<>/\\?#]+(?:\?[^\s\"'<>/\\?#]+)?(?:\/[^\s\"'<>/\\?#]+)*" \-json -mr "application/javanoscript|text/javanoscript" \
| jq -r '.extracts[]' | tr -d '[],'
Please open Telegram to view this post
VIEW IN TELEGRAM
20🔥16🐳1
Where is the reaction guys? It's a good way to support the channel, so please do leave your reaction to grow this community. Thanks!

⚠️Join Our Discussion Group - https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
16🐳10🔥5
This media is not supported in your browser
VIEW IN TELEGRAM
Top 10 OffSec Certifications - Salary Wise😱
Please open Telegram to view this post
VIEW IN TELEGRAM
11
Testing Account Takeover Vulnerabilities.⚔️
👍62
⚠️Zomato IDOR leakage of Lakhs People Data - Video POC
🔖https://news.1rj.ru/str/brutsecurity_poc/10
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9🔥5
⚠️A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities.


Use shell globbing / wildcard expansion. Here is an example

cat /e*c/p*s*d
is equivalent to cat /etc/passwd. But how?

Before cat runs, the shell expands the glob pattern /e*c/p*s*d to match actual files and directories in the filesystem.

/e*c:
The shell interprets this as "any path starting with /e, followed by zero or more characters (*), ending with c."


/p*s*d:
This matches a path or file name starting with p, followed by zero or more characters (*), then s, then zero or more characters (*), then d

Credit- Devansh Batham
Please open Telegram to view this post
VIEW IN TELEGRAM
👍19🫡7
API Bug Bounty.pdf
4.1 MB
API Bug Bounty
32🔥10🫡6👍2
Reactions Please 🫠
🔥43👍8🐳65🗿2🤝1
CVE-2025-23006: Deserialization of Untrusted Data in SonicWall SMA1000, 9.8 rating 🔥

A pre-authentication deserialization of untrusted data vulnerability was detected in SMA1000 components, which could allow an attacker to execute OS commands.

Search at Netlas.io:
👉 Link: https://nt.ls/FLFJT
👉 Dork: http.headers.server:"SMA"

Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
🔥53👍3