Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
BB Tip: Finding Potential SSRF Endpoints During Recon

SSRF often hides in plain sight. Many applications accept URLs or file paths as parameters, and those become prime targets.

A simple trick during recon is mining historical URLs and filtering parameters that typically fetch remote resources.

Example workflow:

echo "target.com" | waybackurls | grep -E "url=|uri=|path=|dest=|redirect=|window=|next=|target=|file=|html=|data=|reference="



What this does:

β€’ Pulls archived endpoints from Wayback Machine
β€’ Filters parameters commonly used for external requests
β€’ Helps you quickly identify SSRF-like parameters

You will often find endpoints like:

/showimage.php?file=
/redirect?url=
/api/fetch?uri=
/download?path=


Once you find them, start testing with payloads such as:

http://127.0.0.1
http://169.254.169.254
http://burp-collaborator


If the server makes the request on your behalf, you might have an SSRF.

Small recon tricks like this save hours of manual hunting.

#bugbounty #bugbountytips #ssrf #recon #pentesting #cybersecurity
❀13πŸ”₯4πŸ‘1
Claude Bug Bounty Hunter - Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation

https://github.com/shuvonsec/claude-bug-bounty
πŸ”₯15❀6😱3πŸ—Ώ3
πŸ”₯Fresh BB Target - https://t.me/brutsecurity_poc/291
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2
πŸ”₯ FREE for the first 20 people β€” no catch.

I just launched the Bug Bounty Masterclass PDF on Topmate.

Built for absolute beginners. No fluff. No theory for the sake of theory. Just the exact process real hunters use.

━━━━━━━━━━━━━━━
🎁 FIRST 20 GET IT FREE
━━━━━━━━━━━━━━━

Use coupon code: 1awe
πŸ‘‡
https://topmate.io/saumadip/2009859?coupon_code=1awe

Share with anyone learning cybersecurity πŸ™

β€” Saumadip | Brut Security
@brutsecurity
❀9😒3
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2026-25769 - Remote Code Execution via Insecure Deserialization in Wazuh Cluster

https://github.com/hakaioffsec/CVE-2026-25769
πŸ”₯7πŸ‘1
Advanced SQL Injection Techniques by nav1n0x.pdf
1 MB
Advanced SQL Injection Techniques
πŸ—Ώ6πŸ‘4
πŸŒ™ Eid Mubarak! ✨
May this Eid bring peace, happiness, and endless blessings to you and your loved ones 🀍
~DarkShadow
❀13
⚠️Web-Fuzzing-Box by @VulkeyChen is a massive collection of pre-built wordlists and payloads covering everything from content discovery to XSS, SQL injection, 403 bypasses, and brute force attacks! πŸ™‚

Check it out! πŸ‘‡
https://github.com/gh0stkey/Web-Fuzzing-Box
Please open Telegram to view this post
VIEW IN TELEGRAM
❀5πŸ‘1
Hey Hunter's,
DarkShadow is here back again!

πŸ’€LFI via misconfigured image parameter☠

> In most of cases hackers only test blind SSRF in image handler parameter.

But if you test the right payload it can disclose many hidden bugs!

So guys if you enjoy to read such methods, show your love ❀️

#bugbountytips #lfi
πŸ”₯10❀4πŸ‘1
The terminal doesn't lie. Neither does this guide. πŸ” Bug Bounty Masterclass is live β€” 11 chapters, real HackerOne PoCs, step-by-step recon workflow. First 20 get it FREE. Code: 1awe πŸ‘‡ https://topmate.io/saumadip/2009859?coupon_code=1awe
1πŸ”₯5πŸ—Ώ2❀1
🚨XPFarm - An open-source vulnerability scanner that wraps well-known open-source security tools behind a single web UI.

βœ… Download: https://github.com/canuk40/xpfarm/

#CyberSecurity #BugBounty #EthicalHacking #Infosec #BrutSecurity
πŸ‘8❀2
πŸ”₯ Phantom β€” Autonomous AI Red Team Agent
βš”οΈ LLM-Powered Offensive Security Automation Framework

πŸ‘‰ https://github.com/kmdn-ch/phantom-ethical-redteam
❀7
πŸ”₯ XSS Tip: Unicode Normalization

Don't give up if <, >, " or ' are filtered ! Many apps normalize Unicode after the WAF/security layer.

Some bypass variants (URL-encoded):
πŸ”Ή < βž” %EF%BC%9C
πŸ”Ή > βž” %EF%BC%9E
πŸ”Ή " βž” %EF%BC%A2
πŸ”Ή ' βž” %EF%BC%87
πŸ”Ή ` βž” %EF%BD%80

For example, inject %EF%BC%9Cscript%EF%BC%9E and check if it reflects as <script> in the DOM.

Automate these quirks with recollapse : https://github.com/0xacb/recollapse

#BugBounty #BugBountyTips #XSS #Pentest #Infosec #CyberSecurity
❀12πŸ‘1
Hey Hunter’s,
DarkShadow is here back again!

"Sensitive Information Leak & Missing Authorization via API Endpoint"

- to find info leak bugs in wordpress use my this quick wordlist:
/api/v1/export/data
/api/v1/config
/api/debug/env
/api/v2/auth/sessions
/api/v1/admin/users
/wp-json/wordfence/v1/config
/api/v1/billing/details
/api/v1/db/stats
/api/v1/logs
/api/v1/health
/api/v1/status
/api/v1/internal/settings
/api/v1/cloud/credentials
/api/v1/user/profile
/api/v1/system/info
/api/v1/backup/list
/wp-json/wp/v2/users
/wp-json/wp/v2/settings
/wp-json/wp/v2/media
/wp-json/wp/v2/posts?status=any
/wp-json/wp/v2/pages?status=private
/wp-json/elementor/v1/system-info


So guys if you really enjoy to read such methods shows your loveπŸ”₯

#bugbountytips #info_leak
❀11πŸ”₯5
Hey Hunter’s,
DarkShadow is here back again!

πŸ”₯Private Messages Leaks via api endpointπŸ’€

tip:
> if your target using any open source projects, then collect all /api routes from github.

> use ffuf, burp, gf (do recon as much possible) it can uncovered information leak bugs.


if you guy’s want to know more info leak bugs methods, let me know…

#bugbountytips #info_leak
❀9πŸ‘1
AI-Powered Autonomous Penetration Testing Agent
https://github.com/pikpikcu/airecon
πŸ—Ώ5
Brut Security pinned Deleted message
πŸ”₯ffufai is an AI-powered wrapper for the popular web fuzzer ffuf. It automatically suggests file extensions for fuzzing based on the target URL and its headers, using either OpenAI's GPT or Anthropic's Claude AI models.

🚨https://github.com/jthack/ffufai
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11