Brut Security – Telegram
Brut Security
14.7K subscribers
919 photos
73 videos
287 files
974 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
Please open Telegram to view this post
VIEW IN TELEGRAM
😍21🔥1
Brut Security pinned «💥A collection of awesome one-liner noscripts especially for bug bounty💥 🔗https://github.com/dwisiswant0/awesome-oneliner-bugbounty»
Please open Telegram to view this post
VIEW IN TELEGRAM
2
Brut Security pinned «🔈Exposed Pinata API Key Nuclei Template 📎https://raw.githubusercontent.com/karkis3c/bugbounty/main/nuclei-templates/info-disclosure/pinata-keys-exposed.yaml»
☄️Collection of Links, Write-ups, Blog posts and Papers related to Cybersecurity, Reverse engineering and Exploitation☄️

🔖https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md
Please open Telegram to view this post
VIEW IN TELEGRAM
3🗿2😱1
👍61
What makes you hacker?🤨
Please open Telegram to view this post
VIEW IN TELEGRAM
Add the folder 'home/000~ROOT~000/' to your wordlist, and you might discover some juicy data. Enjoy!"
😭7👍5🔥5🤣21
👍3👏1
☄️If you have access to jenkins dashboard, use below Script Console cmd for poc☄️
def passwdFile = new File("/etc/passwd")
println passwdFile.text
Please open Telegram to view this post
VIEW IN TELEGRAM
96🔥2👍1
prv8_nuclei_templates.zip
3.9 MB
6000+ Private Nuclei Templates
❤‍🔥28🤣5👌211🔥1🤝1
CVE-2024-8073: Command Injection in Hillstone Networks Firewalls, 9.8 rating 🔥

The freshest vulnerability in Hillstone WAFs allows an attacker to perform RCE due to incorrect input validation.

Search at Netlas.io:
👉 Link: https://nt.ls/YZWqU
👉 Dork: http.noscript:"Hillstone Networks"

Vendor's advisory: https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/
🔥5👍2🤣1
Telegram CEO is arrested, so there is a probability that telegram will end the services or it's services will be blocked on different countries. So as a backup you can join our discord channel. Thanks!
https://discord.gg/NTU2q8gU5K
🤣1
This media is not supported in your browser
VIEW IN TELEGRAM
Wake Up! Your Mom and Dad are waiting for your success 🤩 They're both running out of time.
Please open Telegram to view this post
VIEW IN TELEGRAM
18😢4❤‍🔥2👍2🤣1
5🤣2
Reset Password Feature Security Testing.pdf
72.4 KB
Reset Password Bug Bounty Guide
🤣1
CVE-2024-6386: RCE in WPML WordPress Plugin, 9.9 rating 🔥

Due to the lack of input validation, an attacker can execute code on the affected server.

Search at Netlas.io:
👉 Link: https://nt.ls/caxUk
👉 Dork: http.body:"plugins/wpml"

Read more: https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/
👍6🤣1
Useful Google Dorks that bug bounty hunters can leverage to find sensitive information: 👇🏻

1. Discovering Exposed Files:
   - innoscript:"index of" "site:target.com"
   - filetype:log inurl:log site:target.com
   - filetype:sql inurl:sql site:target.com
   - filetype:env inurl:.env site:target.com

2. Finding Sensitive Directories:
   - inurl:/phpinfo.php site:target.com
   - inurl:/admin site:target.com
   - inurl:/backup site:target.com
   - inurl:wp- site:target.com

3. Exposed Configuration Files:
   - filetype:config inurl:config site:target.com
   - filetype:ini inurl:wp-config.php site:target.com
   - filetype:json inurl:credentials site:target.com

4. Discovering Usernames and Passwords:
   - intext:"password" filetype:log site:target.com
   - intext:"username" filetype:log site:target.com
   - filetype:sql "password" site:target.com

5. Finding Database Files:
   - filetype:sql inurl:db site:target.com
   - filetype:sql inurl:dump site:target.com
   - filetype:bak inurl:db site:target.com

6. Exposed Git Repositories:
   - inurl:".git" site:target.com
   - inurl:"/.git/config" site:target.com
   - innoscript:"index of" ".git" site:target.com

7. Finding Publicly Exposed Emails:
   - intext:"email" site:target.com
   - inurl:"contact" intext:"@target.com" -www.target.com
   - filetype:xls inurl:"email" site:target.com

8. Discovering Vulnerable Web Servers:
   - innoscript:"Apache2 Ubuntu Default Page: It works" site:target.com
   - innoscript:"Index of /" "Apache Server" site:target.com
   - innoscript:"Welcome to nginx" site:target.com

9. Finding API Keys:
   - filetype:env "DB_PASSWORD" site:target.com
   - intext:"api_key" filetype:env site:target.com
   - intext:"AWS_ACCESS_KEY_ID" filetype:env site:target.com

10. Exposed Backup Files:
    - filetype:bak inurl:backup site:target.com
    - filetype:bak inurl:backup site:target.com
    - filetype:zip inurl:backup site:target.com
    - filetype:tgz inurl:backup site:target.com

Replace target.com with the domain or target you are focusing on.

#GoogleDorks
#BugHunting
#OSINT
13👍8🔥5🤣1
priv8-Nuclei-.zip
845.8 KB
9🤣3🔥2