Brut Security – Telegram
Brut Security
14.6K subscribers
907 photos
73 videos
287 files
962 links
Queries: @wtf_brut
🛃WhatsApp: wa.link/brutsecurity
🈴Training: brutsec.com
📨E-mail: info@brutsec.com
Download Telegram
13🗿4
New Beast Added 😮‍💨
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍3🗿31
PHP have released new sunglasses 😎

php.net/sunglasses
👍7
👍9🔥6🗿2
🗿9👍5🐳2
Forwarded from Netlas.io
🔥 Improved Interaction with Private Scanner 🔥

Netlas 0.25.1 Update was published. IP/Domain information is now sourced from private scans if they are more relevant than general results. Check out the example in the picture! 👾

👉 Read about other changes: https://docs.netlas.io/changelog/
👍2
10👍1
Worlds fastest unlimited single and bulk subdomain finder! Use desktop!

https://cyfare.net/apps/subfind/
🔥9
https://cspbypass.com

A site where you can search for known CSP bypass gadgets to gain XSS.
4
Top Hacking / Cyber Security Related Posts
🪪By Daniel Kelley

🔗https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3
5👍3
CVE-2024-31449 and other: Multiple vulnerabilities in Redis, 4.5 - 8.8 rating❗️

Three fresh vulnerabilities allow an attacker to perform RCE due to errors in the Lua noscripting engine or DoS via malformed Access Control List selectors.

Search at Netlas.io:
👉 Link: https://nt.ls/1G7ul
👉 Dork: protocol:redis

Vendor's advisory: https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
👍61
🌐 Google Dorking Made Easy

Link : https://dorksearch.com/

This Website help you with Google Dorking Try it Now and Give Reactions 🤟

#bugbounty #bugbountytips
👍1🐳1
☄️TechDefence is Hiring☄️

📌Share Your Resume- +91 78618 86497
(No Calls)
Please open Telegram to view this post
VIEW IN TELEGRAM
SubOwner - This tool is designed to check for subdomain takeovers by resolving the CNAME records and verifying them against known vulnerable services.

🔗 https://github.com/ifconfig-me/subowner
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥75
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
4👍2🔥1
*CVE-2024-45409 | Ruby-SAML Auth Bypass In GitLab*
_*What You’ll Learn💡*_
1️⃣ *Overview | Dinoscription of CVE-2024-45409*
2️⃣ *Reconnaissance For CVE-2024-45409*
*Shodan.io*
*Censys.io*
*Fofa.info*
*Hunter.how*
*ZoomEYE.HK*
_<======================>_
3️⃣ *E͢x͢p͢l͢o͢i͢t͢ ☣️ CVE-2024-45409 | GiveWP WordPress Plugin Exploit*

4️⃣ *E͢x͢p͢l͢o͢i͢t͢ Installation📥*
5️⃣ *E͢x͢p͢l͢o͢i͢t͢ Tool Guide🧭*
6️⃣ *Impact_💥*
7️⃣ *Severity_⚠️*
8️⃣ *Remediation_♻️*
_https://yashsec.com/bug-bounty/cve-2024-45409-auth-bypass-in-gitlab/
👍3
CVE-2024-43582: RCE in RDP Servers, 8.1 rating❗️

A use after free vulnerability in some RDP servers could allow an attacker to carry out remote code execution. The patch is already available.

Search at Netlas.io:
👉 Link: https://nt.ls/Jyn4r
👉 Dork: protocol:rdp

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582
👍6
https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments/

how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
🔥61