Brut Security
15.2K subscribers
965 photos
76 videos
292 files
1.01K links
DM: @wtf_brut
🛃WhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
📨Mail: info@brutsec.com
Download Telegram
100+ N8N Security workflow & automation

For Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.

https://github.com/0xSojalSec/n8n-Red-Blue-AppSec-workflows

#infosec #cybersec #bugbounty
🔥92
Automates enumeration and recon scans in the background

https://github.com/21y4d/nmapAutomator
14👍1
😁30😢85🫡5🙏1
Hey everyone! We’ve officially updated the Brut Security branding. We wanted something more minimal, eye-catching, and "cyber."

Check out the new orange-red glow. Does it hit the mark for you?

Drop a 🔥 if you love it, or let us know your thoughts in the comments!
1🔥214🤔4
🔓 Google released Net-NTLMv1 rainbow tables that enable cracking password hashes in under 12 hours using consumer hardware.

🔗 Learn more here
🔥3👏2
➡️A new Web Penetration Testing batch is starting next Tuesday at 4 PM IST.

🌟If you’re interested, please DM me. Special discounts are available, including a student discount.

💎The class language will be Bengali.

🟢DM on WhatsApp- +918945971332
Please open Telegram to view this post
VIEW IN TELEGRAM
Brut Security pinned «➡️A new Web Penetration Testing batch is starting next Tuesday at 4 PM IST. 🌟If you’re interested, please DM me. Special discounts are available, including a student discount. 💎The class language will be Bengali. 🟢DM on WhatsApp- +918945971332»
😔Recon is where most bounties are won.

🌟Argus is a Python-powered toolkit built for serious hunters:
• Faster intel
• Cleaner signals
• Better targets

🇺🇿Stop guessing. Start seeing. 🦅

🤔https://github.com/jasonxtn/argus
Please open Telegram to view this post
VIEW IN TELEGRAM
6👍1
Hey Hunter's,
DarkShadow is here back again!

🔥SQL injection in json endpoint💀

Always be check json, js endpoints for SQLi. Make sure you check blind base injections. Cause here only possible blind base injections.

#sqli #bugbountytips
🗿5👍21🔥1
To the Brut Security Community: Saraswati Puja is a celebration of learning, and in our field, learning never stops. May your curiosity be endless, your logic be sharp, and your thirst for knowledge lead you to mastery.

Wishing you a powerful and blessed Saraswati Puja. Let’s keep building, keep breaking, and keep learning.
11🔥1
Bug Bounty Tip: Bypassing WAFs for Stored XSS via ASCII-Hex Encoded PDF Payloads

➡️Many platforms allow users to upload PDFs that get previewed/rendered directly in the browser (often using libraries like PDF.js in Firefox, Chrome extensions, embedded viewers, or custom implementations).

A clever trick for Stored XSS (or Blind XSS variants):

1. Craft a classic XSS payload (e.g., one that executes alert(document.domain) or exfiltrates cookies/tokens).

2. Encode the entire malicious JavaScript as ASCII hex (each character → \xHH format).

3. Embed it inside a tiny/valid PDF structure that triggers execution during font/glyph rendering or object parsing in vulnerable PDF renderers.

4. Upload the PDF to a target feature that stores and previews user-uploaded documents (profile, reports, tickets, resumes, invoices, shared files, etc.).

5. When a victim (admin, user, or support) previews/opens the PDF in a vulnerable renderer → XSS fires in the context of the PDF viewer.

⚡️Key advantages:
- Many WAFs / upload filters / content scanners completely miss it because it's not a classic <script> or HTML — it's binary-ish PDF content with hex-encoded JS.

- Can be tuned for Stored → persistent until deleted.

- Can be adapted for Blind XSS → exfiltrate to your server instead of alert().

💬Real-world notes from hunters:
- Works especially well against PDF.js-based previews (Firefox default, many web apps embed it).

- Reference: Similar to behavior seen in CVE-2024-4367 (arbitrary JS exec in PDF.js via font handling path).

- Impact varies:

- Self-XSS / low-priv user alert → usually P4–P5 or Informational.

- Admin views it → potential session theft / higher severity (P2–P3 possible if you can prove escalation).

- Some programs reject pure alert() PoCs in sandboxed viewers (no cookie access in most cases) → demonstrate real impact (e.g., redirect, keylogger, token exfil) or target-specific quirks.

- Pro tip: Test on your primary programs that have PDF preview/generation features — many still do!

⚡️Resources to start:
- Repo with example payloads: https://github.com/orwagodfather/XSS-Payloads
- Edit payloads easily in Notepad++ (hex view or find/replace).

Happy hunting — stay ethical & report responsibly! 🏆

Photo Credit- Orwa

#bugbountytip #bugbounty #xss #websecurity #pdfxss
🫡7🔥52
Tips for Testing Account Takeover Vulnerabilities.
🔥53
Free T-shirts Forever 😂
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥9😁61👏1
➡️Roadmap for Android security guides, roadmap, docs, courses, write-ups.

⚠️ http://github.com/Ralireza/Android-Security-Teryaagh
Please open Telegram to view this post
VIEW IN TELEGRAM
18
⚡️Dracnmap: An open-source tool designed for network reconnaissance and information gathering using Nmap.

⚠️GitHub: https://github.com/screetsec/Dracnmap
Please open Telegram to view this post
VIEW IN TELEGRAM
5🤝4
Guys, this is DarkShadow.
This is absolutely crazy—you won’t believe this!

A researcher recently discovered a vulnerability where anyone can view posts from a private Instagram account. The most shocking part? It’s super simple.
When you visit a private Instagram profile, the account still appears private to normal users. However, if you inspect the response/source code, all the posts are actually visible there😳

I highly recommend everyone check out the YouTube POC video explaining this issue in detail:
https://youtu.be/VTVdrvAJ28E?si=7Eu1h1iHioGyYOlC
3🤝1
⚠️CVE-2026-24061- telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

😈https://github.com/SafeBreach-Labs/CVE-2026-24061
Please open Telegram to view this post
VIEW IN TELEGRAM
👍121
👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
1👏13🔥93
Brut Security pinned «👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!»
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄|
You don't need certs
to be successful in
bug bounty
|___________|
\ (•◡•) /
\ /
---
| |
🗿199👍5