🚨Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers PHP webshells across large target sets.
✅https://github.com/ill-deed/CVE-2025-34085-Multi-target
✅https://github.com/ill-deed/CVE-2025-34085-Multi-target
👍6❤4
🚨 CVE-2025-47812: Wing FTP Server Remote Code Execution (RCE) vulnerability
🔥PoC : https://github.com/4m3rr0r/CVE-2025-47812-poc
👉Dorks:
HUNTER: http://product.name="Wing FTP Server"
🔥PoC : https://github.com/4m3rr0r/CVE-2025-47812-poc
👉Dorks:
HUNTER: http://product.name="Wing FTP Server"
🔥11❤4👍4
🚨 New Batch Starting – August 2025 🚨
Brut Practical Web Penetration Testing (bPWP)
We’re back with a fresh batch of our most in-demand training – Brut Practical Web Penetration Testing – starting this August!
🔍 Learn the art of Web Hacking with:
✅ 100% Practical Sessions
✅ Bug Bounty Approach
✅ Real-World Lab Scenarios
✅ Lifetime Community Access
✅ Beginner-Friendly with Advanced Techniques
💻 Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.
📆 Limited Seats – Enroll Now
🌐 https://brutsec.com/bPWP
📩 For Queries:
Telegram: @wtf_brut
WhatsApp: https://wa.link/brutsecurity |
Email: info@brutsec.com
Brut Practical Web Penetration Testing (bPWP)
We’re back with a fresh batch of our most in-demand training – Brut Practical Web Penetration Testing – starting this August!
🔍 Learn the art of Web Hacking with:
✅ 100% Practical Sessions
✅ Bug Bounty Approach
✅ Real-World Lab Scenarios
✅ Lifetime Community Access
✅ Beginner-Friendly with Advanced Techniques
💻 Ideal for aspiring bug bounty hunters, cybersecurity students, and VAPT professionals.
📆 Limited Seats – Enroll Now
🌐 https://brutsec.com/bPWP
📩 For Queries:
Telegram: @wtf_brut
WhatsApp: https://wa.link/brutsecurity |
+918945971332Email: info@brutsec.com
❤9😢2👍1
⚡AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories.
🚨https://github.com/AggressiveUser/AllForOne
🚨https://github.com/AggressiveUser/AllForOne
🔥19❤4👍3
👻SpoofProof helps security professionals detect email domain spoofing vulnerabilities and validate DMARC, SPF, and DKIM configurations, making email security assessments seamless and efficient.
⭐Extension Name: SpoofProof - Domain Spoofing Validation
🔗 BApp Store: https://portswigger.net/bappstore/a321360c6e114b3dab6f2c67d68c241a
💻 Source Code: https://github.com/portswigger/spoofproof
⭐Extension Name: SpoofProof - Domain Spoofing Validation
🔗 BApp Store: https://portswigger.net/bappstore/a321360c6e114b3dab6f2c67d68c241a
💻 Source Code: https://github.com/portswigger/spoofproof
❤12🔥5
⚡BrutDroid 2.0 is a powerful, Windows-optimized toolkit designed specifically for Android Studio, streamlining the setup of a mobile penetration testing lab. Built to make Android pentesting effortless, it automates emulator creation, rooting, Frida server setup, and Burp Suite certificate installation. With a vibrant new UI and support for custom Frida noscripts, BrutDroid empowers security researchers to focus on testing, not setup. Linux support is coming soon!
✅https://github.com/Brut-Security/BrutDroid
⭐Don't forget to leave a star :)
✅https://github.com/Brut-Security/BrutDroid
⭐Don't forget to leave a star :)
❤31🔥2
Full Walkthrough - https://youtu.be/bDxgilaYcE8
YouTube
BrutDroid 2.0 - Automate Android Studio Pentesting with Frida & Burp Suite
🚀 Unleash the power of BrutDroid 2.0, the ultimate Android Studio Pentest Automator! Built for Windows and optimized for Android Studio, this tool automates emulator rooting, Frida server setup, and Burp Suite certificate installation, making mobile pentesting…
❤16🔥1
We are on headlines. Thanks Everyone!
https://esgeeks.com/brutdroid-kit-automatizacion-emuladores-android/
https://esgeeks.com/brutdroid-kit-automatizacion-emuladores-android/
EsGeeks
BrutDroid: Kit de Automatización para Emuladores Android » EsGeeks
Automatiza pruebas de seguridad en emuladores Android con BrutDroid. Rootea, configura Frida y Burp. Ideal para pentesters y red teamers.
🫡7❤6
Forwarded from Bug Bounty POC's
Asset inventory of over 800 public bug bounty programs.
https://github.com/trickest/inventory
❤8👍6
CVE-2025-53770: Deserialization of Untrusted Data in Microsoft SharePoint, 9.8 rating 🔥
The most high-profile recent vulnerability allows an attacker to perform RCE on a Microsoft SharePoint server. Hackers are already exploiting it, so be careful!
Search at Netlas.io:
👉 Link: https://nt.ls/Ix8gb
👉 Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
The most high-profile recent vulnerability allows an attacker to perform RCE on a Microsoft SharePoint server. Hackers are already exploiting it, so be careful!
Search at Netlas.io:
👉 Link: https://nt.ls/Ix8gb
👉 Dork: http.headers.microsoftsharepointteamservices:*
Vendor's advisory: https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
🔥11❤3
Mapperplus is an advanced tool by @silentgh00st that helps find and extract JavaScript sourcemap files from JS files using a headless browser!🤠
https://github.com/midoxnet/mapperplus
https://github.com/midoxnet/mapperplus
GitHub
GitHub - midoxnet/mapperplus: MapperPlus facilitates the extraction of source code from a collection of targets that have publicly…
MapperPlus facilitates the extraction of source code from a collection of targets that have publicly exposed .js.map files. - midoxnet/mapperplus
❤10