Brut Security – Telegram
Brut Security
14.7K subscribers
916 photos
73 videos
287 files
970 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Media is too big
VIEW IN TELEGRAM
🚨Android SSL Pinning Bypass using Noxer🚨

👉Automate your Android penetration testing lab setup using Nox Emulator. Noxer is a powerful Python noscript designed for automating Android penetration testing tasks within the Nox Player emulator. It simplifies setup, enhances stability, manages Frida Server, removes unwanted bloatware, integrates BurpSuite certificates, and much more!

🔗Noxer: https://buff.ly/4b0gxM4
🔥4
cve_2024_4577.py
828 B
🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
🚨CVE-2024-4577: PHP CGI Argument Injection Vulnerability🚨

Dorks:
🔸Hunter: header.server="PHP"
🔸FOFA: server="PHP"
🔸SHODAN: server: PHP
🤯5👍2🔥2
Last Call! Hurry Up
🤣21🤓3😐2
TestCases.pdf
711.3 KB
👍2🐳1
Which of the following is used for banner grabbing?
Anonymous Quiz
49%
Telnet
12%
FTP
19%
SSH
21%
Wireshark
👍1
Brut Security pinned Deleted message
Complete_Shodan_Guide.pdf
4.3 MB
🔥4👍2
🚨OneDorkForAll🚨

👉An insane list of all dorks taken from everywhere from various different sources. Google, Shodan, Github. Bug bounty dorks (includes private programs), shodan, github, CCTV, CMS dorks, lfi, sqli, xss, more vulns + an extra 1Mil+ dorks.

🔗https://github.com/HackShiv/OneDorkForAll
🔥7🫡21🤝1
🚨X-Recon: A utility for detecting webpage inputs and conducting XSS scans.🚨

Features:
1. Subdomain Discovery
2. Site-wide Link Discovery
3. Form and Input Extraction
4. XSS Scanning

🔗Link: https://lnkd.in/gfAeBPz7
💯4👍2🔥1
Have Tryhackme vouchers in stock
1 Month Voucher = 500 Rupees
Dm @wtf_yodhha
This media is not supported in your browser
VIEW IN TELEGRAM
🚨noWAFpls🚨
👉Burp Plugin to Bypass WAFs through the insertion of Junk Data

🔗 https://github.com/assetnote/nowafpls
👍3🔥1🤯1
🚨CVE-2024-23692: Unauthenticated RCE Flaw in Rejetto HTTP File Server

👉It allows remote attackers to execute arbitrary code on affected servers without authentication, potentially leading to data breaches, ransomware attacks, and complete system compromise.

💥PoC: https://github.com/rapid7/metasploit-framework/pull/19240

💥Dorks:
Hunter: /product.name="HTTP File Server" and web.body="Rejetto"
FOFA: product="HFS"
SHODAN: product:"HttpFileServer httpd"

#Rejetto #HFS #bugbounty #bugbountytips #cybersecurity #pentesting
🔥2
How are you guys? and how is everything in life?
👍4🤝2🐳1
This media is not supported in your browser
VIEW IN TELEGRAM
Found this on twitter. The POC is very informative. What you think?
🔥11👍2🤯2
Good Morning Everyone!
What topic should I post today. Let me know on discussion:) Thanks!
🤡2🐳2
Surprisingly Havij - SQL injection tool helped me to achieve a error based sqli on ferrari 😳
🐳4