Brut Security – Telegram
Brut Security
14.6K subscribers
901 photos
72 videos
287 files
956 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
New Business Logic POC Video Shared -https://news.1rj.ru/str/brutsecurity_poc/9
🔥41
CVE-2025-0314 and other: Multiple vulnerabilities in GitLab, 4.3 - 8.7 rating❗️

In a recent advisory, GitLab writed about three vulnerabilities, including stored XSS, resource exhaustion, and protected CI/CD variables exfiltration.

Search at Netlas.io:
👉 Link: https://nt.ls/BNKS8
👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef OR http.headers.set_cookie:"gitlab" OR http.headers.location:"gitlab"

Vendor's advisory: https://about.gitlab.com/releases/2025/01/22/patch-release-gitlab-17-8-1-released/
🤝4
☄️Information Disclosure Dork☄️

site:*.example.com (ext:doc OR ext:docx OR ext:odt OR ext:pdf OR ext:rtf OR ext:ppt OR ext:pptx OR ext:csv OR ext:xls OR ext:xlsx OR ext:txt OR ext:xml OR ext:json OR ext:zip OR ext:rar OR ext:md OR ext:log OR ext:bak OR ext:conf OR ext:sql)
Please open Telegram to view this post
VIEW IN TELEGRAM
👍16🔥131
▶️Automated JS Endpoint Extraction and Verification with HTTPX and GAU
echo "target.com" | gau --blacklist jpg,jpeg,gif,css,tif,tiff,png,ttf,woff,woff2,ico,pdf,noscript \| grep -E "\.js($|\?.*)" \
| httpx -er "(?:(https?|ftp|git|ssh|telnet|smtp|imap|pop3|ldap|sftp|smb|nfs|rtmp|rtsp|ws|wss|irc|news|gopher|rsync|data):\/\/|\/)[^\s\"'\*\(\){};\\\^\$\&<>/\\?#]+(?:\?[^\s\"'<>/\\?#]+)?(?:\/[^\s\"'<>/\\?#]+)*" \-json -mr "application/javanoscript|text/javanoscript" \
| jq -r '.extracts[]' | tr -d '[],'
Please open Telegram to view this post
VIEW IN TELEGRAM
20🔥16🐳1
Where is the reaction guys? It's a good way to support the channel, so please do leave your reaction to grow this community. Thanks!

⚠️Join Our Discussion Group - https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
16🐳10🔥5
This media is not supported in your browser
VIEW IN TELEGRAM
Top 10 OffSec Certifications - Salary Wise😱
Please open Telegram to view this post
VIEW IN TELEGRAM
11
Testing Account Takeover Vulnerabilities.⚔️
👍62
⚠️Zomato IDOR leakage of Lakhs People Data - Video POC
🔖https://news.1rj.ru/str/brutsecurity_poc/10
Please open Telegram to view this post
VIEW IN TELEGRAM
👍9🔥5
⚠️A neat trick for bypassing WAF/filters while testing for OS command injection vulnerabilities.


Use shell globbing / wildcard expansion. Here is an example

cat /e*c/p*s*d
is equivalent to cat /etc/passwd. But how?

Before cat runs, the shell expands the glob pattern /e*c/p*s*d to match actual files and directories in the filesystem.

/e*c:
The shell interprets this as "any path starting with /e, followed by zero or more characters (*), ending with c."


/p*s*d:
This matches a path or file name starting with p, followed by zero or more characters (*), then s, then zero or more characters (*), then d

Credit- Devansh Batham
Please open Telegram to view this post
VIEW IN TELEGRAM
👍19🫡7
API Bug Bounty.pdf
4.1 MB
API Bug Bounty
32🔥10🫡6👍2
Reactions Please 🫠
🔥43👍8🐳65🗿2🤝1
CVE-2025-23006: Deserialization of Untrusted Data in SonicWall SMA1000, 9.8 rating 🔥

A pre-authentication deserialization of untrusted data vulnerability was detected in SMA1000 components, which could allow an attacker to execute OS commands.

Search at Netlas.io:
👉 Link: https://nt.ls/FLFJT
👉 Dork: http.headers.server:"SMA"

Vendor's advisory: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002
🔥53👍3
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6
🔖always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints.
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥12👍85
🔖Submaker - Subdomain Wordlist Generator

⬇️https://github.com/llMNMll/Submaker
Please open Telegram to view this post
VIEW IN TELEGRAM
8👍3
⚠️If your target uses Rails, look for Action View CVE-2019-5418 - File Content Disclosure vuln. Although this is an old bug, it can still be found.

Intercept the request in Burp and replace the Accept header with: Accept: ../../../../../../../../../../etc/passwd{{

🛍If the server is deemed to be vulnerable, but a WAF is present:

../../../../../../e*c/p*s*d{{

✔️Credit- nav1n0x
Please open Telegram to view this post
VIEW IN TELEGRAM
143👍15🔥8🫡4🗿2
⚡️Standoff BB Platform- https://dopescope.standoff365.com/
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4🗿3