Brut Security
15.1K subscribers
965 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
๐ŸฅณAdvanced Web Pentesting โ€“ March Batch
๐Ÿ˜ฎEnrollment is now open. Only 10 seats available.
๐ŸšจWhatsapp: http://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
โš ๏ธAutoPentestX โ€“ Linux Automated Pentesting & Vulnerability Reporting Tool

โšก๏ธhttps://github.com/Gowtham-Darkseid/AutoPentestX
Please open Telegram to view this post
VIEW IN TELEGRAM
โค8๐Ÿ‘3
โš ๏ธClawdbot/Moltbot/OpenClaw One-click RCE PoC
โญ๏ธhttps://github.com/ethiack/moltbot-1click-rce
Please open Telegram to view this post
VIEW IN TELEGRAM
โค6๐Ÿ˜3๐Ÿณ1
Good Morning Hackers ๐Ÿ˜
1๐Ÿค12๐Ÿ‘5๐Ÿ”ฅ5
Hey Hunter's,
DarkShadow here back again, dropping a RCE in mail input field!

Listen, this is very important.
1. When a sign-in/sign-up page comes, use a normal email using your burp collaborator.
2. If you got any HTTP hit back in your burp, then don't stop thinking by SSRF.
3. Now test command injection payload on the mail input field.
4. Don't use URL encoding in space like %20 always use ${IFS} to replace spaces.
5. It's essential when you try here RCE also try blind OS injection payloads.


I Hope this method also help you to improve your bug hunting. Now guys show your love โค๏ธ

#bugbountytip #rce
โค7๐Ÿ”ฅ7
โšกFlowsint - Flowsint is an open-source OSINT graph exploration tool designed for ethical investigation, transparency, and verification.

โœ…https://github.com/reconurge/flowsint
โค7๐Ÿ”ฅ4
#AD
๐Ÿ›ก Private Exploit Subscription
๐Ÿ’œ VIP Nxploited Access ๐Ÿ’œ

๐Ÿ“Œ Whatโ€™s Included:

๐Ÿ’™ All vulnerabilities are critical (high-severity CVEs only)

๐Ÿ’™ Every CVE is published immediately upon release along with a dedicated exploit

๐Ÿ’™ All vulnerabilities include a working Proof of Concept (POC) or ready-to-use script

๐Ÿ’™ Clear documentation is provided, along with private support for target verification

๐Ÿ’™ No public or outdated exploits โ€” all content is exclusive and up to date

๐Ÿง  Subscription Plans:
- โœ…Weekly: $150
- โœ… Monthly: $300
- โœ… 4 Months: $600

๐Ÿ“œ Terms of Subscription:
- Access is personal and non-transferable
- Sharing or leaking any materials is strictly prohibited
- Any violation results in permanent removal without refund
- All content is for educational and research purposes only
- Each member is fully responsible for how the material is used

๐Ÿ“ž Contact to Join:
Telegram: @Kxploit ๐Ÿถ

Channel โœ… https://t.me/KNxploited

#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
1โค6๐Ÿ”ฅ1๐Ÿ‘จโ€๐Ÿ’ป1
โšก๏ธWPair: app for testing Bluetooth WhisperPair vulnerability (CVE-2025-36911)

๐Ÿš€WhisperPair vulnerability allows to hijacking Bluetooth headsets that use Google Fast Pair to spy on microphone and track their location

๐Ÿ’™https://github.com/zalexdev/wpair-app
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘2
๐Ÿ”ฅ Bug Bounty Recon Tip: Find forgotten / hidden APIs & endpoints devs left behind! ๐Ÿ”ฅ

Chain these 2 awesome free tools by @xnl-h4ck3r:

1๏ธโƒฃ waymore โ†’ pulls massive archived URLs + responses from Wayback, Common Crawl, VirusTotal, URLScan, OTX & more

Basic command:
waymore -i target.com -oU waymore-urls.txt

2๏ธโƒฃ xnLinkFinder โ†’ parses those responses / JS / pages and extracts juicy endpoints, parameters, secrets & even generates a target-specific wordlist

Chain it like this:
xnLinkFinder -i waymore-urls.txt -sf target.com -o results/


๐Ÿ’ก Pro combo (most people run):
waymore -i example.com -oU urls.txt && xnLinkFinder -i urls.txt -sf example.com -o cli -sp

Youโ€™ll often discover undocumented /admin-api/v2, debug endpoints, old GraphQL paths, forgotten params with IDORs, leaked keys etc. โ†’ pure passive recon gold!

Install both via pip:
pip install waymore
pip install git+https://github.com/xnl-h4ck3r/xnLinkFinder.git

Repos:
โ†’ https://github.com/xnl-h4ck3r/waymore
โ†’ https://github.com/xnl-h4ck3r/xnLinkFinder

Happy hunting & donโ€™t forget to chain โ†’ gau + katana + waymore + xnLinkFinder = monster recon list ๐Ÿ˜ˆ

#BugBounty #Recon #WebHacking #APIHunting #CyberSecurity
โค13๐Ÿ‘6๐Ÿ”ฅ2
๐Ÿ‘€Please donโ€™t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the โญ๏ธ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘8๐Ÿ‘1
IP Adressing Basics
โค8๐Ÿ‘3