Brut Security
15.6K subscribers
1.01K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Please don’t forget to react to the post and share it. Your reactions motivate us to post more content like this. You can also tap the ⭐️ to show your support. Thanks!πŸ˜‹πŸ˜‹πŸ˜‹
Please open Telegram to view this post
VIEW IN TELEGRAM
❀4
Please open Telegram to view this post
VIEW IN TELEGRAM
Nahamsec Reconnaissance Guide
❀9πŸ”₯4πŸ‘3πŸ‘2😁2
Launching Soon :)
❀16πŸ”₯9
⚠️Just dropped something I've been building for a while

🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

🟒Giving away 5 free coupons to the first 5 people who drop a comment. No catch.

▢️ https://topmate.io/saumadip/2054509
πŸ”₯ Coupon Code= awxe

β€” Brut Security
Please open Telegram to view this post
VIEW IN TELEGRAM
5❀4πŸ”₯3πŸ‘1πŸ‘1
Brut Security pinned «⚠️Just dropped something I've been building for a while 🌐A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting…»
Sneak Peak of the Contents
❀3πŸ‘1🫑1πŸ—Ώ1
Hey Hunter’s,
DarkShadow is here back again!

Ranking Most common /api vulnerable endpoints:

/api/v1/users
/api/v1/users/{userId}
/api/v1/oauth/token
/api/v1/forgot-password
/api/v1/debug or /api/v1/status


(not only /api/v1 also test for /api/v2)

🀫if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!

#bugbountytips #info_leak
πŸ”₯8❀1
πŸ”₯ AutoAR = Full Bug Bounty Automation

Recon β†’ Scan β†’ Exploit β†’ Report (automated)

β€’ Subdomains (15+ sources)
β€’ Nuclei + CVE scan
β€’ JS secrets + GitHub leaks
β€’ DNS takeover + misconfigs
β€’ AI agent (FREE)
β€’ Results β†’ Cloudflare R2

Stop manual recon.

https://github.com/h0tak88r/AutoAR
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯9❀7πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
❀3
Web-Check - πŸ•΅οΈβ€β™‚οΈ All-in-one OSINT tool for analysing any website

https://web-check.xyz/
πŸ‘9❀4
πŸ”₯A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

10 Free Coupons for New Learners--->
▢️ https://topmate.io/saumadip/2054509?coupon_code=awxe
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2❀1
Hey Hunter's,
DarkShadow is here back again!

🚨 Import schema from H2 Database β†’ RCE via EXEC Alias ⚑

Creating an alias to execute system commands via Java Runtime

πŸ” Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS β†’ leads to RCE
- No proper input validation or restriction on JDBC params


ο»Ώ
🧠 Bug Bounty Tips:


- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage β†’ often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Don’t ignore default tokens or exposed headers
- Think beyond SQLi β†’ DB features themselves can be weaponize
d



So guys if you really enjoy to read such methods show your love ❀️

#bugbountytips #rce
❀7😱5
πŸ”₯ Ultimate Bug Bounty Goldmine β€” 1000+ Real Writeups

XSS, CSRF, SSRF, IDOR, SQLi, RCE… everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.

Perfect for learning real-world exploitation, not just theory.

GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
❀5πŸ”₯4
Please open Telegram to view this post
VIEW IN TELEGRAM
❀6πŸ‘3