Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
DM: @wtf_brut
🛃WhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
📨Mail: info@brutsec.com
Download Telegram
Autonomous Multi-Agent Based Red Team Testing Service, AI hacker.

- http://github.com/PurpleAILAB/Decepticon
8😁4👍2
Brut Security pinned Deleted message
🤩Bug Bounty Recon Methodology
🫡Link: https://github.com/Maniesh-Neupane/BugBounty-Recon-Methodology
Please open Telegram to view this post
VIEW IN TELEGRAM
118
Forwarded from Brut Security (Mr Brut)
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
5👍1🔥1
Bug Bounty Beginner's
Roadmap
7🔥4👍3
Forwarded from Brut Security (Mr Brut)
2FA Bypass Techniques.pdf
103.9 KB
👍10🗿2
Hey Hunter’s,
DarkShadow is here back again, just look at this…

Authenticated RCE in Ai code editor!

- some times Some bugs are hidden, so to uncover these are bugs always make account.
- if you find any endpoint which works to validate any code its a gold mine, try RCE payloads.

if you guys need to learn DarkShadows methods to find more bug and pro recon method then let me know.

#bugbountytpis #rce
🔥113👍3👏2🤝1
🔥Advanced Web Pentesting – March Batch

🚨Enrollment is now open. Only 1 seats available.
▶️Course Module: https://brutsecurity.com/bPWP
🫡Whatsapp: http://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
5🗿2
Hey Hunter’s,
DarkShadow is here back again!

What do you think, xss chouldn’t trigger in .html endpoint?

is absolutely possible!
check out the image, and let me know in the comment section who can explain it perfectly…


#bugbountytips #xss
4👍3
Final Call – March Batch

Only 2 seats left. Batch starts next week.

Learn Ethical Hacking, Advanced Web Pentesting, and Bug Bounty Hunting with practical training.

🎓 Students get 10% off

Limited seats. Enrollment closing soon.

DM - wa.link/brutsecurity
Web - brutsecurity.com
2
Hey Hunter’s,
DarkShadow is here back again!

/api/v1/db/auth/password/reset:USER_TOKEN_ID


most of hackers here try to exploit IDOR, but before testing the idor try XSS!

so guys if you enjoy to read such methods, show your love 🔥

#bugbountytips #xss
🔥117👍1
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key

https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-key
5🔥3
🚨 Brut Security | March 2026 – Enrollments Open 🚨

Ready to step into cybersecurity the right way?

🔥 Courses Available
• Ethical Hacking
• Web Penetration Testing
• Bug Bounty Hunting
• SOC / SIEM (Blue Team)

💻 Live training + practical labs
🧠 Real-world attack & defense mindset
🎯 Limited seats only

📅 Batch Starts: February 2026

If you’re serious about skills, not certificates — this is for you.

📩 DM Brut Security to enroll
8
Hey Hunter,
DarkShadow here back again!

Sensitive Information Leak via api call
Severity: 9.1

From /api/contact an unauthenticated user can view all the private messages which only can show from Admin Panel.

tip:
always collect /api/ endpoints and try GET, POST etc methods.

if you guy’s really enjoy to read such methods, react ❤️
28🔥8🤨3👍2
👀Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
24🔥13👍4😢4
Please open Telegram to view this post
VIEW IN TELEGRAM
16👍1
BB Tip: Finding Potential SSRF Endpoints During Recon

SSRF often hides in plain sight. Many applications accept URLs or file paths as parameters, and those become prime targets.

A simple trick during recon is mining historical URLs and filtering parameters that typically fetch remote resources.

Example workflow:

echo "target.com" | waybackurls | grep -E "url=|uri=|path=|dest=|redirect=|window=|next=|target=|file=|html=|data=|reference="



What this does:

• Pulls archived endpoints from Wayback Machine
• Filters parameters commonly used for external requests
• Helps you quickly identify SSRF-like parameters

You will often find endpoints like:

/showimage.php?file=
/redirect?url=
/api/fetch?uri=
/download?path=


Once you find them, start testing with payloads such as:

http://127.0.0.1
http://169.254.169.254
http://burp-collaborator


If the server makes the request on your behalf, you might have an SSRF.

Small recon tricks like this save hours of manual hunting.

#bugbounty #bugbountytips #ssrf #recon #pentesting #cybersecurity
13🔥4👍1