Brut Security – Telegram
Brut Security
14.6K subscribers
904 photos
72 videos
287 files
958 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🚨 Find Low Hanging Fruits Using Nuclei AI 🚨

nuclei -list targets.txt -ai "Find exposed AI/ML model files (.pkl, .h5, .pt) that may leak proprietary algorithms or sensitive training data"

nuclei -list targets.txt -ai "Find exposed automation noscripts (.sh, .ps1, .bat) revealing internal tooling or credentials"

nuclei -list targets.txt -ai "Identify misconfigured CSP headers allowing 'unsafe-inline' or wildcard sources"

nuclei -list targets.txt -ai "Detect pages leaking JWT tokens in URLs or cookies"

nuclei -list targets.txt -ai "Identify overly verbose error messages revealing framework or library details"

nuclei -list targets.txt -ai "Find application endpoints with verbose stack traces or source code exposure"

nuclei -list targets.txt -ai "Find sensitive information in HTML comments (debug notes, API keys, credentials)"

nuclei -list targets.txt -ai "Find exposed .env files leaking credentials, API keys, and database passwords"

nuclei -list targets.txt -ai "Find exposed configuration files such as config.json, config.yaml, config.php, application.properties containing API keys and database credentials."

nuclei -list targets.txt -ai "Find exposed configuration files containing sensitive information such as credentials, API keys, database passwords, and cloud service secrets."

nuclei -list targets.txt -ai "Find database configuration files such as database.yml, db_config.php, .pgpass, .my.cnf leaking credentials."

nuclei -list targets.txt -ai "Find exposed Docker and Kubernetes configuration files such as docker-compose.yml, kubeconfig, .dockercfg, .docker/config.json containing cloud credentials and secrets."

nuclei -list targets.txt -ai "Find exposed SSH keys and configuration files such as id_rsa, authorized_keys, and ssh_config."

nuclei -list targets.txt -ai "Find exposed WordPress configuration files (wp-config.php) containing database credentials and authentication secrets."

nuclei -list targets.txt -ai "Identify exposed .npmrc and .yarnrc files leaking NPM authentication tokens"

nuclei -list targets.txt -ai "Identify open directory listings exposing sensitive files"

nuclei -list targets.txt -ai "Find exposed .git directories allowing full repo download"

nuclei -list targets.txt -ai "Find exposed .svn and .hg repositories leaking source code"

nuclei -list targets.txt -ai "Identify open FTP servers allowing anonymous access"

nuclei -list targets.txt -ai "Find GraphQL endpoints with introspection enabled"

nuclei -list targets.txt -ai "Identify exposed .well-known directories revealing sensitive data"

nuclei -list targets.txt -ai "Find publicly accessible phpinfo() pages leaking environment details"

nuclei -list targets.txt -ai "Find exposed Swagger, Redocly, GraphiQL, and API Blueprint documentation"

nuclei -list targets.txt -ai "Identify exposed .vscode and .idea directories leaking developer configs"

nuclei -list targets.txt -ai "Detect internal IP addresses (10.x.x.x, 192.168.x.x, etc.) in HTTP responses"

nuclei -list targets.txt -ai "Find exposed WordPress debug.log files leaking credentials and error messages"

nuclei -list targets.txt -ai "Detect misconfigured CORS allowing wildcard origins ('*')"

nuclei -list targets.txt -ai "Find publicly accessible backup and log files (.log, .bak, .sql, .zip, .dump)"

nuclei -list targets.txt -ai "Find exposed admin panels with default credentials"

nuclei -list targets.txt -ai "Identify commonly used API endpoints that expose sensitive user data, returning HTTP status 200 OK."

nuclei -list targets.txt -ai "Detect web applications running in debug mode, potentially exposing sensitive system information."
Please open Telegram to view this post
VIEW IN TELEGRAM
8🔥6
👉Check Well Known Files/Paths - A JS console noscript to paste into console
It will attempt to identify and uncover potentially useful files for enumeration


➡️Script: https://hackertips.today/cmd/CheckWellKnown.js

🥳How to use:
• Open the noscript URL and copy it to clipboard.
• Open the target site, Inspect → Console.
• Paste the noscript and run.
• Look for any requests returning HTTP 200, visit those URLs and validate exposure.

😮What to watch for:
• /.git, /.env, backup files, robots.txt revealing sensitive paths, config files, or public storage with credentials.
• Any unexpected 200 on predictable filenames.

🟢Quick mitigation:
• Remove or restrict public access to sensitive files.
• Block common sensitive filenames at the webserver/WAF.
• Return 403/404 for those paths and avoid leaking contents in error pages.

----------------------------------------------------------------------------
📖 Your Ethical Hacking Journey Starts Here → topmate.io/saumadip/1391531
🎓 Ready to Skill Up? Enroll Now → wa.link/brutsecurity
📢 Join the Community: discord.gg/u7uMFV833h
Please open Telegram to view this post
VIEW IN TELEGRAM
18👍5🔥2
If you liked the posts, tap the heart. That tiny click means a lot. ❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
49🔥5
🥳DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

🟢 https://github.com/pwnfuzz/diffrays
Please open Telegram to view this post
VIEW IN TELEGRAM
10
Hey Hunter's,
Darkshadow here back again!

☠️Non-parameter LFI🔥

if you try: target.com/../../../../../../etc/passwd
browser redirect to = target.com/etc/passwd

try url encoding:
target.com/..%2F..%2F..%2F..%2Fetc%2Fpasswd
now browser not redirect you to back directory.

#bugbountytips #fli
22👍5🗿5
Forwarded from Bug Bounty POC's
A quick way to find "all" paths for Next.js websites:

console.log(__BUILD_MANIFEST.sortedPages)
javanoscript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));
🔥198
If you liked the posts, tap the heart. That tiny click means a lot. ❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
30
Forwarded from Brut Security
Common Security Issues in FinanciallyOriented Web Applications
🔥63
Brut Security pinned Deleted message
Bug Bounty Tip 🚀

Level up your recon with GitHub's new regex search on cs.github.com! Hunt for hardcoded credentials like SSH & FTP connection strings.

🚨Example Dorks:
/ssh:\/\/.*:.*@.*target\.com/
/ftp:\/\/.*:.*@.*target\.com/
21👍1
If you liked the posts, tap the heart. That tiny click means a lot. ❤️
Please open Telegram to view this post
VIEW IN TELEGRAM
15
CVE-2025-42944, -42937, -42910, and other: Multiple vulnerabilities in SAP NetWeaver, 5.3 - 10.0 🔥🔥🔥

In its October bulletin, SAP published a list of 13 new vulnerabilities affecting NetWeaver, NetWeaver AS Java, and other products. These vulnerabilities include Insecure Deserialization, Information Disclosure, etc.

Search at Netlas.io:
👉 Link: https://nt.ls/aBHGg
👉 Dork: http.headers.server:"NetWeaver"

Vendor's advisory: https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html
8👍2
🚨 Critical zero-day tagged as CVE-2025-61882 (CVSS 9.8) affecting Oracle E-Business Suite

🥳Nuclei Vulnerability Detection Script:
https://github.com/rxerium/CVE-2025-61882

🟢This vulnerability is remotely exploitable without authentication.
Please open Telegram to view this post
VIEW IN TELEGRAM
13🔥3
🥳Oracle just disclosed a new vulnerability tagged CVE-2025-61884 - remotely exploitable vuln without requiring authentication

👉Nuclei detection for CVE-2025-61884 -https://gist.github.com/rxerium/6c70bc6b72fc0d1365c85937d35d9550
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥103
😘dON'T fORGET tO gIVE rEACTIONS🫡
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥12
🟢Awesome MLSecOps - A curated list of MLSecOps tools, articles and other resources on security applied to Machine Learning and MLOps systems.

🚨https://github.com/RiccardoBiosas/awesome-MLSecOps
Please open Telegram to view this post
VIEW IN TELEGRAM
9🔥4