Brut Security – Telegram
Brut Security
14.6K subscribers
905 photos
72 videos
287 files
959 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
🔍List of GitHub Dorks for bug bounties.

📋Finding
target Files, Languages, API Keys,
Tokens, Usernames, Passwords, Information using
Dates, Extension 📓

🔖#infosec #cybersecurity #hacking #pentesting #security
🔥7👍1
Who is a good speaker? 🔊 @Mebledy do you want to live podcast with everyone?
🌐 Advanced Web Application Penetration Testing Course - Elevate Your Cybersecurity Skills! 🌐

🔗 Full Course Curriculum: https://brutsec.com/WebPentesting.pdf

🗓️ Course Details:
Starting: July 16th, 4PM IST
Duration: 2 Months
Schedule: 3 Days a Week

Format: Online Classes
Languages: Hindi, English, Bengali

🌟 Why Enroll?
Gain practical, hands-on experience with a curriculum that covers a wide range of advanced web security topics. Here’s what you’ll learn:
- 🔍 Reconnaissance Techniques
- 🌐 Subdomain Enumeration
- 💻 Port Scanning
- 🛠️ HTML Injection
- 🛡️ XSS (Cross-Site Scripting)
- 🔒 SQL Injection
- 📂 File Uploading
- 🧩 CORS Exploitation
- 🕵️‍♂️ Command Injection

📞 Enroll Now:
Feel free to DM your queries on our WhatsApp: https://wa.me/918945971332

#bugbounty #bugbountytips #cybersecurity
👍2🔥1
Getting good feedbacks helps you to improve more 🤭
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2
Brut Security pinned «🌐 Advanced Web Application Penetration Testing Course - Elevate Your Cybersecurity Skills! 🌐 🔗 Full Course Curriculum: https://brutsec.com/WebPentesting.pdf 🗓️ Course Details: Starting: July 16th, 4PM IST Duration: 2 Months Schedule: 3 Days a Week Format:…»
📣Google Dork - RCE Prone Parameters

inurl:cmd | inurl:exec= | inurl:query= | inurl:code= | inurl:do= | inurl:run= | inurl:read= | inurl:ping= inurl:& site:example[.]com
Please open Telegram to view this post
VIEW IN TELEGRAM
👍31
⚡️ SQLi One Liner ⚡️


subfinder -dL subdomain.txt | grep -Eo 'https?://[^ ]+\?[a-zA-Z0-9_-]+=\d+['"'"'"]?' wayback_urls.txt > potential_sqli.txt && while read url; do sqlmap -u "$url" --batch --level 5 --risk 3 --all --random-agent --time-sec 10 ; done < potential_sqli.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥62
CVE-2024-6387 (and probably CVE-2006-5051): Unauthenticated RCE in OpenSSH 🔥

The vulnerability, discovered by Qualys researchers, allows an attacker to perform RCE on any OpenSSH server, provided that the operating system contains the glibc library.

Versions 8.5p1 to 9.8p1 ​​are affected, and versions <4.4p are also potentially vulnerable.

Search at Netlas.io:
👉🏻 Link: https://nt.ls/ySN3C
👉🏻 Dork: tag.openssh.version:(>=8.5 AND <9.8) OR tag.openssh.version:(<4.4)

Read more: https://www.qualys.com/regresshion-cve-2024-6387/
👍5
🔥3
OSCP_PDF.pdf
2.3 MB
⚠️Join Our Discussion Group ⚠️
🔥 https://news.1rj.ru/str/brutsec 🔥
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Brut Security pinned «⚠️Join Our Discussion Group ⚠️ 🔥 https://news.1rj.ru/str/brutsec 🔥»
This media is not supported in your browser
VIEW IN TELEGRAM
⚠️Subprober - An essential HTTP multi-purpose Probing Tool for Penetration Testers and Security Researchers with Asynchronous httpx client support.

🔥Download: https://github.com/RevoltSecurities/Subprober
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥3
Please open Telegram to view this post
VIEW IN TELEGRAM
👍31