Forwarded from Brut Security (Mr Brut)
Bug Bounty Beginner's.pdf
187.9 KB
Roadmap for Bug Bounty
❤5👍1🔥1
Hey Hunter’s,
DarkShadow is here back again, just look at this…
Authenticated RCE in Ai code editor!
- some times Some bugs are hidden, so to uncover these are bugs always make account.
- if you find any endpoint which works to validate any code its a gold mine, try RCE payloads.
if you guys need to learn DarkShadows methods to find more bug and pro recon method then let me know.
#bugbountytpis #rce
DarkShadow is here back again, just look at this…
Authenticated RCE in Ai code editor!
- some times Some bugs are hidden, so to uncover these are bugs always make account.
- if you find any endpoint which works to validate any code its a gold mine, try RCE payloads.
if you guys need to learn DarkShadows methods to find more bug and pro recon method then let me know.
#bugbountytpis #rce
🔥11❤3👍3👏2🤝1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5🗿2
Hey Hunter’s,
DarkShadow is here back again!
What do you think, xss chouldn’t trigger in .html endpoint?
is absolutely possible!
check out the image, and let me know in the comment section who can explain it perfectly…
#bugbountytips #xss
DarkShadow is here back again!
What do you think, xss chouldn’t trigger in .html endpoint?
is absolutely possible!
check out the image, and let me know in the comment section who can explain it perfectly…
#bugbountytips #xss
❤4👍3
Final Call – March Batch
Only 2 seats left. Batch starts next week.
Learn Ethical Hacking, Advanced Web Pentesting, and Bug Bounty Hunting with practical training.
🎓 Students get 10% off
Limited seats. Enrollment closing soon.
DM - wa.link/brutsecurity
Web - brutsecurity.com
Only 2 seats left. Batch starts next week.
Learn Ethical Hacking, Advanced Web Pentesting, and Bug Bounty Hunting with practical training.
🎓 Students get 10% off
Limited seats. Enrollment closing soon.
DM - wa.link/brutsecurity
Web - brutsecurity.com
❤2
Hey Hunter’s,
DarkShadow is here back again!
most of hackers here try to exploit IDOR, but before testing the idor try XSS!
so guys if you enjoy to read such methods, show your love 🔥
#bugbountytips #xss
DarkShadow is here back again!
/api/v1/db/auth/password/reset:USER_TOKEN_ID
most of hackers here try to exploit IDOR, but before testing the idor try XSS!
so guys if you enjoy to read such methods, show your love 🔥
#bugbountytips #xss
🔥11❤7👍1
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
https://www.codeant.ai/security-research/pac4j-jwt-authentication-bypass-public-keywww.codeant.ai
CVE-2026-29000: Critical Auth Bypass in pac4j-jwt: Full PoC Using Only a Public Key
CodeAnt AI found a critical authentication bypass in pac4j-jwt where an attacker can impersonate any user using only the RSA public key. Full PoC and disclosure.
❤5🔥3
🚨 Brut Security | March 2026 – Enrollments Open 🚨
Ready to step into cybersecurity the right way?
🔥 Courses Available
• Ethical Hacking
• Web Penetration Testing
• Bug Bounty Hunting
• SOC / SIEM (Blue Team)
💻 Live training + practical labs
🧠 Real-world attack & defense mindset
🎯 Limited seats only
📅 Batch Starts: February 2026
If you’re serious about skills, not certificates — this is for you.
📩 DM Brut Security to enroll
Ready to step into cybersecurity the right way?
🔥 Courses Available
• Ethical Hacking
• Web Penetration Testing
• Bug Bounty Hunting
• SOC / SIEM (Blue Team)
💻 Live training + practical labs
🧠 Real-world attack & defense mindset
🎯 Limited seats only
📅 Batch Starts: February 2026
If you’re serious about skills, not certificates — this is for you.
📩 DM Brut Security to enroll
❤8
Hey Hunter,
DarkShadow here back again!
Sensitive Information Leak via api call
Severity: 9.1
From /api/contact an unauthenticated user can view all the private messages which only can show from Admin Panel.
tip:
always collect /api/ endpoints and try GET, POST etc methods.
if you guy’s really enjoy to read such methods, react ❤️
DarkShadow here back again!
Sensitive Information Leak via api call
Severity: 9.1
From /api/contact an unauthenticated user can view all the private messages which only can show from Admin Panel.
tip:
always collect /api/ endpoints and try GET, POST etc methods.
if you guy’s really enjoy to read such methods, react ❤️
❤28🔥8🤨3👍2
Please open Telegram to view this post
VIEW IN TELEGRAM
❤24🔥13👍4😢4
WEB APPLICATION VULNERABILITY GUIDE.pdf
37.4 KB
Please open Telegram to view this post
VIEW IN TELEGRAM
❤16👍1
BB Tip: Finding Potential SSRF Endpoints During Recon
SSRF often hides in plain sight. Many applications accept URLs or file paths as parameters, and those become prime targets.
A simple trick during recon is mining historical URLs and filtering parameters that typically fetch remote resources.
Example workflow:
What this does:
• Pulls archived endpoints from Wayback Machine
• Filters parameters commonly used for external requests
• Helps you quickly identify SSRF-like parameters
You will often find endpoints like:
Once you find them, start testing with payloads such as:
If the server makes the request on your behalf, you might have an SSRF.
Small recon tricks like this save hours of manual hunting.
#bugbounty #bugbountytips #ssrf #recon #pentesting #cybersecurity
SSRF often hides in plain sight. Many applications accept URLs or file paths as parameters, and those become prime targets.
A simple trick during recon is mining historical URLs and filtering parameters that typically fetch remote resources.
Example workflow:
echo "target.com" | waybackurls | grep -E "url=|uri=|path=|dest=|redirect=|window=|next=|target=|file=|html=|data=|reference="
What this does:
• Pulls archived endpoints from Wayback Machine
• Filters parameters commonly used for external requests
• Helps you quickly identify SSRF-like parameters
You will often find endpoints like:
/showimage.php?file=
/redirect?url=
/api/fetch?uri=
/download?path=
Once you find them, start testing with payloads such as:
http://127.0.0.1
http://169.254.169.254
http://burp-collaborator
If the server makes the request on your behalf, you might have an SSRF.
Small recon tricks like this save hours of manual hunting.
#bugbounty #bugbountytips #ssrf #recon #pentesting #cybersecurity
❤13🔥4👍1
Claude Bug Bounty Hunter - Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation
https://github.com/shuvonsec/claude-bug-bounty
https://github.com/shuvonsec/claude-bug-bounty
🔥15❤6😱3🗿3