Brut Security – Telegram
Brut Security
14.6K subscribers
902 photos
72 videos
287 files
956 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Hey Hunter's,
DarkShadow here back again!

Check your burp isn't this feature is enable?

Most of hackers miss this thing. So, this is a great opportunity to make bounty using this burp feature.

#bugbountytips #burp
18👏7👍4🔥2
🪲 Bug Bounty Pro Tip: #H2C Upgrade Bypass

Target: Applications using HTTP/2 Cleartext (h2c) upgrades.

The Core Idea: Many Web Application Firewalls (WAFs) and reverse proxies process HTTP/1.1 but fail to correctly inspect traffic after it's upgraded to HTTP/2.

How to Test:

1. Find a target that accepts an Upgrade: h2c header (common in Java, gRPC, and some reverse proxies like Nginx).

2. Send an initial HTTP/1.1 request with the upgrade header:

GET / HTTP/1.1
Host: example.com
Upgrade: h2c
Connection: Upgrade

3. If the server agrees (responds with HTTP/1.1 101 Switching Protocols), the connection is now HTTP/2.

4. The Bypass: Craft and send malformed or smuggled HTTP/2 frames (e.g., with the :method header set to GET or POST). The downstream WAF may not parse this, allowing you to access internal endpoints or bypass security controls.

Why it works: The security boundary often only exists at the HTTP/1.1 layer. Once upgraded, your HTTP/2 traffic might be forwarded directly to the backend without inspection.

#BugBounty #Hacking #WebSecurity #WAFBypass #HTTP2
1🔥2914👍5
dON'T fORGET tO gIVE rEACTIONS
26🔥6😁4🗿1
Sn1per - Automate your recon like never before!

https://github.com/1N3/Sn1per
🔥189😱2
S3Scan - A powerful S3 bucket security scanner designed for penetration testing and bug bounty hunting. This tool automatically detects misconfigurations and security vulnerabilities in AWS S3 buckets.

https://github.com/KingOfBugbounty/s3tk
👍206👨‍💻2
Mobile Hacking Bug Bounty.pdf
4.4 MB
Mobile Hacking Bug Bounty: The Practical Checklist
1👍17🔥102👏2🐳1
Bug Bounty Reports Extractor - CLI tool that fetches resolved & disclosed HackerOne reports by vulnerability and exports them to CSV.

https://github.com/newstartlikenoneanthor-pixel/report-extractor
17🔥6😱2
😁56👍5🗿2👨‍💻1🫡1
⚡️Recently updated Proof-of-Concepts

✔️Link to Download - https://github.com/0xMarcio/cve
Please open Telegram to view this post
VIEW IN TELEGRAM
17🔥5👍4👏1
This media is not supported in your browser
VIEW IN TELEGRAM
☄️Find new associated domains with this simple Google dork:

"© <COMPANY>. all rights reserved." -".<COMPANY>.com"
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥177👍4😱1
dON'T fORGET tO gIVE rEACTIONS
22🗿8🔥2🤨2
Hey Hunter's,
DarkShadow here back again!

A hidden backdoor was in PHP version which allow remote code execution In user-agent header.

Guess Guy's which version it is?

#backdoor
19😁2👨‍💻1
🔥Google Dork - Exposed Configs 🔍

site:example[.]com ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess | ext:json

©TakSec
Please open Telegram to view this post
VIEW IN TELEGRAM
30👍13🔥6
☄️JSRecon-Buddy - A simple browser extension to quickly find interesting security-related information on a webpage.

🔴https://github.com/TheArqsz/JSRecon-Buddy
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥248👍4👏4🤝1
dON'T fORGET tO gIVE rEACTIONS
🔥15
☄️ Malicious PDF Generator - Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh

https://github.com/jonaslejon/malicious-pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
14👍9👏2