Brut Security
15.1K subscribers
964 photos
76 videos
292 files
1.01K links
โœ…DM: @wtf_brut
๐Ÿ›ƒWhatsApp: https://wa.link/brutsecurity
๐ŸˆดTraining: https://brutsecurity.com
๐Ÿ“จMail: info@brutsec.com
Download Telegram
Brut Security pinned ยซ๐Ÿ‘‰๐Ÿ‘‰๐Ÿ‘‰๐Ÿ‘‰Please donโ€™t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the โญ๏ธ to show your support. Thanks!๐Ÿ˜‹๐Ÿ˜‹๐Ÿ˜‹ยป
Hey Hunter's,
DarkShadow is here back again!

๐Ÿ’€Blind Remote Code Execution in Cookiesโ˜ 

NOTE:
โ€“in some servers use sh as default not bash, so in your payload sh payloads are perfect.

โ€“don't forget to check the cookies while you tested any webapp, because in some cases Cookies are intersect with bash process.

โ€“Last but seriously important, Always use burp collab for blind testing...

So guy's if you really Enjoy to read my such methods then show your love โ™ฅ๏ธ

#bugbountytips #rce #darkshadow
โค8๐Ÿ”ฅ3๐Ÿ‘1
๐Ÿšจ CVE-2026-25253: OpenClaw Logical Flaw

Critical Token Leakage via Unsanitized WebSocket Redirect!
An attacker crafts a malicious URL containing a controlled gatewayUrl query parameter and embedded token, causing OpenClaw to silently establish a WebSocket connection to the attacker-controlled endpoint and exfiltrate the sensitive token without user interaction or consent.

Full Vulnerability Details & Analysis at DarkEye:
๐Ÿ”— https://darkeye.org/vuln/cve/CVE-2026-25253

๐Ÿ” Identify Targets via ZoomEye:

Filter: vul.cve="CVE-2026-25253"
Search Dork: app="OpenClaw"
Exposure: 33k+ instances identified globally.

ZoomEye Search Link:
๐Ÿ‘‰ https://www.zoomeye.ai/searchResult?q=YXBwPSJPcGVuQ2xhdyI=&utm_source=twitter&utm_medium=social&utm_campaign=cve_ops_20260213
โค2๐Ÿ”ฅ2
๐Ÿ˜ฎ๐Ÿ˜ฎ๐Ÿ˜ฎ Fresh BB Target - https://t.me/brutsecurity_poc/269
Please open Telegram to view this post
VIEW IN TELEGRAM
โค3
Hey Hunterโ€™s,
DarkShadow is here back again, dropping a another RCE methd!

Remote Code Execution - js framework

process.mainModule.require('child_process').execSync('id').toString()

THIS IS A VERY EFFECTIVE PAYLOAD FOR RCE IN JS FRAMEWORK, so when you test any js based webapp don't forget to apply it

#bugbountytips #rce
๐Ÿ”ฅ4
๐Ÿ–ค Hackersโ€™ Valentineโ€™s Day be likeโ€ฆ ๐Ÿ’ป

Love is temporary,
But bug bounty is permanent.

๐Ÿ”ฅ !SO STAY HACKED! ๐Ÿ”ฅ
โค8
โค๏ธ This Valentineโ€™s Day, We Hit 100,000 Views

On February 14, we crossed 100,000 total views on the Brut Security YouTube channel.

๐Ÿš€While the world celebrates love, we celebrate commitment. Commitment to learning. Commitment to discipline. Commitment to mastering cybersecurity the right way.

๐Ÿ˜ˆThank you to everyone who watched, supported, and grew with us.
If you are new here, welcome to a community built on real skills and real mindset.

๐Ÿ“นVisit the channel. Start learning. Keep building.
Please open Telegram to view this post
VIEW IN TELEGRAM
2โค9๐Ÿ”ฅ1๐Ÿ‘1
๐Ÿšจ403 Bypass Payloads โš™๏ธ
โœ…https://github.com/nazmul-ethi/Bypass-Four03
๐Ÿ”ฅ9โค2๐Ÿค2
Forwarded from โธ™๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹๊ ‹ Moonfoxes ๐Ÿ’€
โšก๏ธ Using the best brute-force script of 2026 โšก๏ธ
The results come very quickly! ๐Ÿ”ฅ

DM @Mm_fit

Channel https://t.me/cve0day
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ”ฅ4โค1๐Ÿ‘1
๐Ÿ”ฅURILoot is a browser extension designed for Bug Bounty Hunters and Pentesters. Makes fetching uris easy from various sources.

โš ๏ธhttps://github.com/rsingh0x/URILoot
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘3
๐Ÿ”ฅ BB TIP: Automate Secret Hunting Like a Pro
Manual hunting is slow. Automation scales.

Instead of randomly browsing subdomains, pipe your recon properly:

subfinder -d target.com -silent | httpx -silent | gau | grep -Ei "\.env|config|backup"


What this really means is:

โ€ข subfinder โ†’ enumerate subdomains
โ€ข httpx โ†’ filter alive hosts
โ€ข gau โ†’ pull historical URLs
โ€ข grep โ†’ hunt for juicy patterns like .env, config, backup

Youโ€™re basically combining live assets + historical endpoints + pattern filtering in one clean chain.

This approach often reveals:

Exposed environment files
Backup endpoints
Forgotten config files
Hidden OpenID configurations
JS config leaks

Most hunters stop at subdomain enumeration. Smart hunters pivot into URL discovery and pattern extraction.

Automation doesnโ€™t replace thinking. It multiplies it.

Test responsibly. Stay within scope. Move fast, think slow.
โค14๐Ÿ‘1
๐Ÿš€ SILENTCHAIN Pro v1.1.0 Powered by deepseek-v3.1:671b (via Ollama cloud)

Target scanned: http://aspnet.testinvicti.com

Results:
โ€ข Total findings: 151
โ€ข Verified: 20
โ€ข Breakdown: 16 High / 37 Medium / 63 Low / 35 Info

Scan time: 19 minutes
AI requests: 137
Tokens used: 138K

OWASP Top 10 coverage + passive LLM-powered analysis for Burp Suite

๐Ÿ‘‰ https://silentchain.ai
๐Ÿ‘7โค4
Brut Security pinned Deleted message
๐ŸšจGrafana scanner with all public CVEs that collected in one script to make grafana testing easier.

๐Ÿซกhttps://github.com/Zierax/Grafana-Final-Scanner
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿซก4
Don't forget to drop likes, it keeps motivate us to put such contents. Thanks Everyone ๐Ÿ˜ฎ
Please open Telegram to view this post
VIEW IN TELEGRAM
๐Ÿ‘14โค4
Autonomous Multi-Agent Based Red Team Testing Service, AI hacker.

- http://github.com/PurpleAILAB/Decepticon
โค7๐Ÿ˜4๐Ÿ‘1