Brut Security
15.1K subscribers
965 photos
76 videos
292 files
1.01K links
DM: @wtf_brut
🛃WhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
📨Mail: info@brutsec.com
Download Telegram
Free T-shirts Forever 😂
Please open Telegram to view this post
VIEW IN TELEGRAM
1🔥9😁61👏1
➡️Roadmap for Android security guides, roadmap, docs, courses, write-ups.

⚠️ http://github.com/Ralireza/Android-Security-Teryaagh
Please open Telegram to view this post
VIEW IN TELEGRAM
18
⚡️Dracnmap: An open-source tool designed for network reconnaissance and information gathering using Nmap.

⚠️GitHub: https://github.com/screetsec/Dracnmap
Please open Telegram to view this post
VIEW IN TELEGRAM
5🤝4
Guys, this is DarkShadow.
This is absolutely crazy—you won’t believe this!

A researcher recently discovered a vulnerability where anyone can view posts from a private Instagram account. The most shocking part? It’s super simple.
When you visit a private Instagram profile, the account still appears private to normal users. However, if you inspect the response/source code, all the posts are actually visible there😳

I highly recommend everyone check out the YouTube POC video explaining this issue in detail:
https://youtu.be/VTVdrvAJ28E?si=7Eu1h1iHioGyYOlC
3🤝1
⚠️CVE-2026-24061- telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

😈https://github.com/SafeBreach-Labs/CVE-2026-24061
Please open Telegram to view this post
VIEW IN TELEGRAM
👍121
👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
1👏13🔥93
Brut Security pinned «👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!»
| ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄ ̄|
You don't need certs
to be successful in
bug bounty
|___________|
\ (•◡•) /
\ /
---
| |
🗿199👍5
🥳Advanced Web Pentesting – March Batch
😮Enrollment is now open. Only 10 seats available.
🚨Whatsapp: http://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
⚠️AutoPentestX – Linux Automated Pentesting & Vulnerability Reporting Tool

⚡️https://github.com/Gowtham-Darkseid/AutoPentestX
Please open Telegram to view this post
VIEW IN TELEGRAM
8👍3
⚠️Clawdbot/Moltbot/OpenClaw One-click RCE PoC
⭐️https://github.com/ethiack/moltbot-1click-rce
Please open Telegram to view this post
VIEW IN TELEGRAM
6😁3🐳1
Good Morning Hackers 😁
1🤝12👍5🔥5
Hey Hunter's,
DarkShadow here back again, dropping a RCE in mail input field!

Listen, this is very important.
1. When a sign-in/sign-up page comes, use a normal email using your burp collaborator.
2. If you got any HTTP hit back in your burp, then don't stop thinking by SSRF.
3. Now test command injection payload on the mail input field.
4. Don't use URL encoding in space like %20 always use ${IFS} to replace spaces.
5. It's essential when you try here RCE also try blind OS injection payloads.


I Hope this method also help you to improve your bug hunting. Now guys show your love ❤️

#bugbountytip #rce
7🔥7
Flowsint - Flowsint is an open-source OSINT graph exploration tool designed for ethical investigation, transparency, and verification.

https://github.com/reconurge/flowsint
7🔥4
#AD
🛡 Private Exploit Subscription
💜 VIP Nxploited Access 💜

📌 What’s Included:

💙 All vulnerabilities are critical (high-severity CVEs only)

💙 Every CVE is published immediately upon release along with a dedicated exploit

💙 All vulnerabilities include a working Proof of Concept (POC) or ready-to-use script

💙 Clear documentation is provided, along with private support for target verification

💙 No public or outdated exploits — all content is exclusive and up to date

🧠 Subscription Plans:
- Weekly: $150
- Monthly: $300
- 4 Months: $600

📜 Terms of Subscription:
- Access is personal and non-transferable
- Sharing or leaking any materials is strictly prohibited
- Any violation results in permanent removal without refund
- All content is for educational and research purposes only
- Each member is fully responsible for how the material is used

📞 Contact to Join:
Telegram: @Kxploit 🐶

Channel https://t.me/KNxploited

#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
16🔥1👨‍💻1
⚡️WPair: app for testing Bluetooth WhisperPair vulnerability (CVE-2025-36911)

🚀WhisperPair vulnerability allows to hijacking Bluetooth headsets that use Google Fast Pair to spy on microphone and track their location

💙https://github.com/zalexdev/wpair-app
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
🔥 Bug Bounty Recon Tip: Find forgotten / hidden APIs & endpoints devs left behind! 🔥

Chain these 2 awesome free tools by @xnl-h4ck3r:

1️⃣ waymore → pulls massive archived URLs + responses from Wayback, Common Crawl, VirusTotal, URLScan, OTX & more

Basic command:
waymore -i target.com -oU waymore-urls.txt

2️⃣ xnLinkFinder → parses those responses / JS / pages and extracts juicy endpoints, parameters, secrets & even generates a target-specific wordlist

Chain it like this:
xnLinkFinder -i waymore-urls.txt -sf target.com -o results/


💡 Pro combo (most people run):
waymore -i example.com -oU urls.txt && xnLinkFinder -i urls.txt -sf example.com -o cli -sp

You’ll often discover undocumented /admin-api/v2, debug endpoints, old GraphQL paths, forgotten params with IDORs, leaked keys etc. → pure passive recon gold!

Install both via pip:
pip install waymore
pip install git+https://github.com/xnl-h4ck3r/xnLinkFinder.git

Repos:
https://github.com/xnl-h4ck3r/waymore
https://github.com/xnl-h4ck3r/xnLinkFinder

Happy hunting & don’t forget to chain → gau + katana + waymore + xnLinkFinder = monster recon list 😈

#BugBounty #Recon #WebHacking #APIHunting #CyberSecurity
13👍6🔥2
👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
👍8👏1
IP Adressing Basics
8👏3