CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit
Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
CVSS 10.0
https://github.com/Chocapikk/CVE-2026-21858
Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root
CVSS 10.0
https://github.com/Chocapikk/CVE-2026-21858
π₯11π2β€1
Hello everyone, DarkShadow is back.
I want to clarify one important thing:
Quality or Quantity?
In my opinion, quality always matters more than quantity.
I focus on sharing content that actually matters, even if it takes time.
Your understanding and support are always appreciated.β€οΈ
I want to clarify one important thing:
Quality or Quantity?
In my opinion, quality always matters more than quantity.
I focus on sharing content that actually matters, even if it takes time.
Your understanding and support are always appreciated.β€οΈ
β€12πΏ6
Guy's check out my new post on our BugBounty POC channel ππΌ
Bug: passive vertical privilege escalation
Severity: 9.8 (critical)
https://t.me/brutsecurity_poc/220
Bug: passive vertical privilege escalation
Severity: 9.8 (critical)
https://t.me/brutsecurity_poc/220
β€10
Please open Telegram to view this post
VIEW IN TELEGRAM
π5π₯3β€1
Hey Hunter's,
Do you guys want to learn about how "Google Authenticator" actually works? And how we can bypass it...
If you guys are interested I'll share a detail write-up about the work flow and the bypass method of Google Authenticator 2FA.
Share Your opinion here @brutsec
~DarkShadow
Do you guys want to learn about how "Google Authenticator" actually works? And how we can bypass it...
If you guys are interested I'll share a detail write-up about the work flow and the bypass method of Google Authenticator 2FA.
Share Your opinion here @brutsec
~DarkShadow
π35π₯12πΏ7
π¨ Brut Security | Feb 2026 β Enrollments Open π¨
Ready to step into cybersecurity the right way?
π₯ Courses Available
β’ Ethical Hacking
β’ Web Penetration Testing
β’ Bug Bounty Hunting
β’ SOC / SIEM (Blue Team)
π» Live training + practical labs
π§ Real-world attack & defense mindset
π― Limited seats only
π Batch Starts: February 2026
If youβre serious about skills, not certificates β this is for you.
π© DM Brut Security to enroll
Ready to step into cybersecurity the right way?
π₯ Courses Available
β’ Ethical Hacking
β’ Web Penetration Testing
β’ Bug Bounty Hunting
β’ SOC / SIEM (Blue Team)
π» Live training + practical labs
π§ Real-world attack & defense mindset
π― Limited seats only
π Batch Starts: February 2026
If youβre serious about skills, not certificates β this is for you.
π© DM Brut Security to enroll
WhatsApp.com
Brut Security
Business Account
Brut Security pinned Β«π¨ Brut Security | Feb 2026 β Enrollments Open π¨ Ready to step into cybersecurity the right way? π₯ Courses Available β’ Ethical Hacking β’ Web Penetration Testing β’ Bug Bounty Hunting β’ SOC / SIEM (Blue Team) π» Live training + practical labs π§ Real-world attackβ¦Β»
Argus: A Python-based toolkit for Information Gathering & Reconnaissance #OSINT
GitHub: github.com/jasonxtn/Argus
GitHub: github.com/jasonxtn/Argus
β€7π2
This media is not supported in your browser
VIEW IN TELEGRAM
π¨ CVE-2026-22794: Critical Appsmith Flaw Allows Account Takeover.
π₯PoC -https://github.com/appsmithorg/appsmith/security/advisories/GHSA-7hf5-mc28-xmcv
π₯PoC -https://github.com/appsmithorg/appsmith/security/advisories/GHSA-7hf5-mc28-xmcv
β€5
Hey Hunter's,
DarkShadow is here back again!
hunting backup is a underestimate vulnerability which missed by many bug bounty hunters.
Find API endpoints via reading js or api documentation (if available). Then play with various request methods (e g. GET, POST)
also you might use my this provided simple and effective Wordlist:
ο»Ώ
Guys I'll soon upload a detailed write-up about "Google Authenticator" workflow fundamentals and chain reaction for bypass it. Until show your love β€οΈ
#bugbountytips #missconfig
DarkShadow is here back again!
hunting backup is a underestimate vulnerability which missed by many bug bounty hunters.
Find API endpoints via reading js or api documentation (if available). Then play with various request methods (e g. GET, POST)
also you might use my this provided simple and effective Wordlist:
/api/v1/backup/create
/api/v1/backup/export
/api/v1/backup/download/{id}
/api/v1/backup/restore
/api/v1/backup/schedule
/api/v1/backup/config
/api/setup/backup
/api/admin/system/backup/run
/api/manage/backup/snapshot
/api/settings/maintenance/backup
/api/system/export-data
/api/db/backup/start
/api/db/dump
/api/v1/database/snapshot
/api/v1/sql/backup
/api/v1/storage/archive
/api/v1/sync/backup
/api/v1/volumes/{id}/snapshot
/api/v1/backups/checkpoints
ο»Ώ
Guys I'll soon upload a detailed write-up about "Google Authenticator" workflow fundamentals and chain reaction for bypass it. Until show your love β€οΈ
#bugbountytips #missconfig
π₯11β€3π3
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - Jvr2022/CVE-2026-23745: Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versionsβ¦
Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3). - Jvr2022/CVE-2026-23745
Please open Telegram to view this post
VIEW IN TELEGRAM
π₯5
100+ N8N Security workflow & automationβ¨
For Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
https://github.com/0xSojalSec/n8n-Red-Blue-AppSec-workflows
#infosec #cybersec #bugbounty
For Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.
https://github.com/0xSojalSec/n8n-Red-Blue-AppSec-workflows
#infosec #cybersec #bugbounty
π₯9β€2
Hey everyone! Weβve officially updated the Brut Security branding. We wanted something more minimal, eye-catching, and "cyber."
Check out the new orange-red glow. Does it hit the mark for you?
Drop a π₯ if you love it, or let us know your thoughts in the comments!
Check out the new orange-red glow. Does it hit the mark for you?
Drop a π₯ if you love it, or let us know your thoughts in the comments!
1π₯21β€4π€4
π Google released Net-NTLMv1 rainbow tables that enable cracking password hashes in under 12 hours using consumer hardware.
π Learn more here
π Learn more here
π₯3π2
Please open Telegram to view this post
VIEW IN TELEGRAM
Discord
Join the Brut Security Discord Server!
Check out the Brut Security community on Discord - hang out with 971 other members and enjoy free voice and text chat.
Please open Telegram to view this post
VIEW IN TELEGRAM
WhatsApp.com
Brut Security
Business Account