Brut Security – Telegram
Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
🗿4🔥2
☄️SpideyX a multipurpose Web Penetration Testing tool with asynchronous concurrent performance with multiple mode and configurations.

📌https://github.com/RevoltSecurities/Spideyx

🎤@mrz_0047
Please open Telegram to view this post
VIEW IN TELEGRAM
🗿54🔥3
https://github.com/pdelteil/scammy-bbp This repository contains a list of all the bug bounty programs that do not value the time and effort of hackers correctly. (Before you hunt on any target it's better to have reviews from other hackers)
10👍1
Brut Security pinned «https://github.com/pdelteil/scammy-bbp This repository contains a list of all the bug bounty programs that do not value the time and effort of hackers correctly. (Before you hunt on any target it's better to have reviews from other hackers)»
⚠️Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulation techniques. It also includes fuzzing for HTTP methods and protocol versions, making it a versatile addition to any web security researcher's toolkit.

🖥 https://github.com/nazmul-ethi/Bypass-Four03
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥81👍1
Brut Security pinned «🚨If you're looking for accurate IoT results, then Sign Up On @Netlas 😮‍💨https://app.netlas.io/ref/9cc61538/»
👍6🔥3🗿1
☄️Subowner - A Simple python based tool to check for subdomain takeovers in mass scanning. Supports, AWS, Fastly, Shopify, Azure etc.

🚨https://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6
Finding Hidden Parameter & Potential XSS with Arjun + KXSS

arjun -q -u target -oT arjun && cat arjun | awk -F'[?&]' '{baseUrl=$1; for(i=2; i<=NF; i++) {split($i, param, "="); print baseUrl "?" param[1] "="}}' | kxss
13
JS Recon : WaybackURLs & HTTPX

waybackurls url | grep '\.js$' | awk -F '?' '{print $1}' | sort -u | xargs -I{} python lazyegg[.]py "{}" --js_urls --domains --ips > urls && cat urls | grep '\.' | sort -u | xargs -I{} httpx -silent -u {} -sc -noscript -td
👍63
PRO TIP TO DETECT CSTI

- in your proxy add a match and replace rule for some keywords to make changes in the response

eg : TESTCSTI = {{7*9}}
CVE-2024-8698: Privelege Escalation in Keycloak, 7.7 rating❗️

Improper SAML signature verification allows an attacker to create a document that is only partially signed. Due to the vulnerability, the entire document will be considered signed, which may lead to privelege escalation.

Search at Netlas.io:
👉 Link: https://nt.ls/LJfRK
👉 Dork: http.favicon.hash_sha256:47dcf1f1a8f1afd68297a294a263849069a7a62b2e86550241416c2cc56c5676

Read more: https://access.redhat.com/security/cve/CVE-2024-8698
1
🔥4🗿21