Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨 Brut Security | March 2026 – Enrollments Open 🚨

Ready to step into cybersecurity the right way?

πŸ”₯ Courses Available
β€’ Ethical Hacking
β€’ Web Penetration Testing
β€’ Bug Bounty Hunting
β€’ SOC / SIEM (Blue Team)

πŸ’» Live training + practical labs
🧠 Real-world attack & defense mindset
🎯 Limited seats only

πŸ“… Batch Starts: February 2026

If you’re serious about skills, not certificates β€” this is for you.

πŸ“© DM Brut Security to enroll
❀8
Hey Hunter,
DarkShadow here back again!

Sensitive Information Leak via api call
Severity: 9.1

From /api/contact an unauthenticated user can view all the private messages which only can show from Admin Panel.

tip:
always collect /api/ endpoints and try GET, POST etc methods.

if you guy’s really enjoy to read such methods, react ❀️
❀28πŸ”₯8🀨3πŸ‘2
πŸ‘€Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!
Please open Telegram to view this post
VIEW IN TELEGRAM
❀24πŸ”₯13πŸ‘4😒4
WEB APPLICATION VULNERABILITY GUIDE.pdf
37.4 KB
πŸ”₯TOP 10 Bugs That PayπŸ”₯
Please open Telegram to view this post
VIEW IN TELEGRAM
❀16πŸ‘1
BB Tip: Finding Potential SSRF Endpoints During Recon

SSRF often hides in plain sight. Many applications accept URLs or file paths as parameters, and those become prime targets.

A simple trick during recon is mining historical URLs and filtering parameters that typically fetch remote resources.

Example workflow:

echo "target.com" | waybackurls | grep -E "url=|uri=|path=|dest=|redirect=|window=|next=|target=|file=|html=|data=|reference="



What this does:

β€’ Pulls archived endpoints from Wayback Machine
β€’ Filters parameters commonly used for external requests
β€’ Helps you quickly identify SSRF-like parameters

You will often find endpoints like:

/showimage.php?file=
/redirect?url=
/api/fetch?uri=
/download?path=


Once you find them, start testing with payloads such as:

http://127.0.0.1
http://169.254.169.254
http://burp-collaborator


If the server makes the request on your behalf, you might have an SSRF.

Small recon tricks like this save hours of manual hunting.

#bugbounty #bugbountytips #ssrf #recon #pentesting #cybersecurity
❀13πŸ”₯4πŸ‘1
Claude Bug Bounty Hunter - Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation

https://github.com/shuvonsec/claude-bug-bounty
πŸ”₯15❀6😱3πŸ—Ώ3
πŸ”₯Fresh BB Target - https://t.me/brutsecurity_poc/291
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2
πŸ”₯ FREE for the first 20 people β€” no catch.

I just launched the Bug Bounty Masterclass PDF on Topmate.

Built for absolute beginners. No fluff. No theory for the sake of theory. Just the exact process real hunters use.

━━━━━━━━━━━━━━━
🎁 FIRST 20 GET IT FREE
━━━━━━━━━━━━━━━

Use coupon code: 1awe
πŸ‘‡
https://topmate.io/saumadip/2009859?coupon_code=1awe

Share with anyone learning cybersecurity πŸ™

β€” Saumadip | Brut Security
@brutsecurity
❀9😒3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2026-25769 - Remote Code Execution via Insecure Deserialization in Wazuh Cluster

https://github.com/hakaioffsec/CVE-2026-25769
πŸ”₯7πŸ‘1
Advanced SQL Injection Techniques by nav1n0x.pdf
1 MB
Advanced SQL Injection Techniques
πŸ—Ώ6πŸ‘4
πŸŒ™ Eid Mubarak! ✨
May this Eid bring peace, happiness, and endless blessings to you and your loved ones 🀍
~DarkShadow
❀13
⚠️Web-Fuzzing-Box by @VulkeyChen is a massive collection of pre-built wordlists and payloads covering everything from content discovery to XSS, SQL injection, 403 bypasses, and brute force attacks! πŸ™‚

Check it out! πŸ‘‡
https://github.com/gh0stkey/Web-Fuzzing-Box
Please open Telegram to view this post
VIEW IN TELEGRAM
❀5πŸ‘1
Hey Hunter's,
DarkShadow is here back again!

πŸ’€LFI via misconfigured image parameter☠

> In most of cases hackers only test blind SSRF in image handler parameter.

But if you test the right payload it can disclose many hidden bugs!

So guys if you enjoy to read such methods, show your love ❀️

#bugbountytips #lfi
πŸ”₯10❀4πŸ‘1
The terminal doesn't lie. Neither does this guide. πŸ” Bug Bounty Masterclass is live β€” 11 chapters, real HackerOne PoCs, step-by-step recon workflow. First 20 get it FREE. Code: 1awe πŸ‘‡ https://topmate.io/saumadip/2009859?coupon_code=1awe
1πŸ”₯5πŸ—Ώ2❀1
🚨XPFarm - An open-source vulnerability scanner that wraps well-known open-source security tools behind a single web UI.

βœ… Download: https://github.com/canuk40/xpfarm/

#CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity
πŸ‘8❀2
πŸ”₯ Phantom β€” Autonomous AI Red Team Agent
βš”οΈ LLM-Powered Offensive Security Automation Framework

πŸ‘‰ https://github.com/kmdn-ch/phantom-ethical-redteam
❀7