Brut Security – Telegram
Brut Security
14.6K subscribers
904 photos
72 videos
287 files
958 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
A fresh Web Pentesting batch with a Bug Bounty approach is starting January Mid 2026.

📱 If you're interested DM on whatsapp- wa.link/brutsecurity
2😁1
H 01001000
a 01100001
p 01110000
p 01110000
y 01111001

N 01001110
e 01100101
w 01110111

Y 01011001
e 01100101
a 01100001
r 01110010
1022🔥3👍1
Hey Hunter's,
DarkShadow is here back again!

I’m really curious to hear how you all generate revenue in this field. Whether you're earning through bug bounties, consulting, or other methods, I’d love to hear about your experiences.

Feel free to drop a comment and share your journey! Let’s learn from each other.

Drop your comments in this group: @brutsec

#discussion
8👍2
🚨 HackWithIndia 2026 🚨

🇮🇳 India’s Biggest LIVE Web Hacking Event
📅 17 January 2026 | 🌐 Online
💯 FREE ENTRY | Legal | Authorized

Here’s the thing: this is not theory, not CTF guesswork.
You get real web targets, real vulnerabilities, and live scoring.

🔥 Why you should care
• Live web app hacking
• Real-world vulnerabilities
• Compete with 10,000+ hackers
• Network with top security folks
• Certificate for all participants

🏆 Prizes worth ₹17L+
🥇 OSCP Voucher ($1749)
🥈 CEH Voucher
🥉 ASCP, CRTP, CASA, ACP vouchers
🎽 Exclusive hoodies for Top 10
🎁 VIP access, credits & more till Top 100+

📌 Who can join?
Students | Bug bounty hunters | Pentesters | Devs | Security researchers
No fees. No tricks. Just skills.

👉 Register FREE now:
🌐 https://hackwithindia.com/

If you’re serious about web hacking in 2026, you shouldn’t miss this.
8
Forwarded from Bug Bounty POC's
➡️JS Analyzer - It helps to find endpoints, files, internal emails, and some secrets from minified JS.

⚠️https://github.com/jenish-sojitra/JSAnalyzer
Please open Telegram to view this post
VIEW IN TELEGRAM
13
😁224🗿1
CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit

Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root

CVSS 10.0

https://github.com/Chocapikk/CVE-2026-21858
🔥7👍2
Hello everyone, DarkShadow is back.

I want to clarify one important thing:

Quality or Quantity?

In my opinion, quality always matters more than quantity.

I focus on sharing content that actually matters, even if it takes time.
Your understanding and support are always appreciated.❤️
8🗿2
Guy's check out my new post on our BugBounty POC channel 👇🏼

Bug: passive vertical privilege escalation
Severity: 9.8 (critical)

https://news.1rj.ru/str/brutsecurity_poc/220
6