Brut Security – Telegram
Brut Security
14.7K subscribers
914 photos
73 videos
287 files
970 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Nahamsec Reconnaissance Guide
🔥11
🌐🕵️‍♂️Ominis: OSINT: Web Hunter 🌐🕵️‍♂️

👉It gathers online information by querying Google with a user-inputted query. The tool then extracts relevant details like noscripts, URLs, and mentions of the query from the search results.

Targetable and Actionable Results 🎯
1. Identifying Potential Threats 🚨
2. Monitoring Competitors 🕵️‍♂️
3. Gathering Human Intelligence 👥
4. Detecting Brand Mentions 📣
5. Investigating Individuals 🔍
6. Uncovering Financial Insights 💰
7. Mapping Digital Footprints 🗺️
8. Tracking Online Campaigns 📊
9. Monitoring Regulatory Compliance 📝
10. Forecasting Emerging Risks 📈
11. Google Search Filtering 🖇

🔗Download: https://github.com/AnonCatalyst/Ominis-OSINT
👍6
OS Command Injection.pdf
131.8 KB
🔥8🫡2👍1
For Tryhackme and Hackthebox Vip+ Vouchers DM me.
Available For India Only. Dm @wtf_yodhha
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥21
⚠️Recon Tools For Web Pentesting⚠️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍5
⚡️Top 15 Scanners⚡️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
📱Join Our Discussion Channel📱
https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Hey everyone📣,

⚠️Can you believe it's already June? We've covered six months, but have we really dived into cybersecurity or web penetration testing yet? Have any of us snagged our first bug bounty or made it into a Hall of Fame?

📌Let's use the next six months to change that. Dedicate yourself fully to learning and practicing. Imagine where you could be by the end of the year—skilled, confident, and maybe even recognized in the cybersecurity world.

🔥Let’s go all in and fight for our freedom through knowledge and skills. Who’s ready to take on this challenge?

Cheers,
The Brut Security Team
☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥10👍1💯1🗿1
2FA Security Issues.pdf
1.5 MB
👍3
RSEScan

📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization.📣

🌐POC VIDEO🌐
🔗Download🔗
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥1
Brut Security pinned «RSEScan 📣A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains and IPs from certificates for a given domain or organization. A command-line utility for interacting with the RSECloud. It allows you to fetch subdomains…»
Reconnaissance- Phase1.pdf
1.5 MB
☄️Bug Bounty Reconnaissance-Phase 1☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥1
☄️Bug-Bounty-Wordlists☄️

📣A repository that includes all the important wordlists used while bug hunting.

🔗Link: https://github.com/YaS5in3/Bug-Bounty-Wordlists


#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6
Top Useful Extension For Pentesting and Bug hunting
👍31
💥Bug Bounty Tip: Don't Overlook Image Endpoints!💥

👉Did you know 95% of hunters remove image files from their endpoint scans? Here's how Orwa found sensitive information by focusing on them:

1. Gather All Target Endpoints: Collect endpoints from your target.

2. Filter for Image Extensions: Use a simple command to isolate image URLs.

cat endpoints.txt | egrep 'jpg|jpeg|png' > results.txt

3. Check for Live URLs: Ensure the filtered image URLs are active.

4. Use a Screenshot Tool: Automate the process of taking screenshots of these URLs to quickly spot sensitive information.

ℹ️ Success Story by GodfatherOrwa:
-He found a passport image at app[.]com/xxxx/cdn/file/xxx.jpg.
- Visiting app[.]com/xxxx/cdn/ revealed an open directory listing.
- The result? Tons of exposed PII!

👌Always check image file endpoints (.jpg, .jpeg, .png, etc.). You might find more than you expect!

Happy hunting, everyone!

Credit: @godfatherorwa

#bugbountytips #bugbountytip #bugbounty
👍5