Brut Security
15.6K subscribers
1.01K photos
82 videos
295 files
1.08K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
🚨 cPanelSniper β€” CVE-2026-41940

cPanel & WHM'de CVSS 10.0 kritik auth bypass.

CRLF injection β†’ session file poisoning β†’ root WHM access.

https://github.com/ynsmroztas/cPanelSniper
❀16πŸ™3
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”₯ JOOMLA PRO EXPLOIT v2026 πŸ”₯

The best private Joomla exploit injects an immediate reverse shell on all versions.

βœ… SVG upload + rename to .php (total bypass)
βœ… Automatic bypass of WAF and Cloudflare
βœ… Automatic fallback via installTemplate (remote ZIP)
βœ… 50 threads – scans 5+ directories and subpaths in seconds
βœ… Updated with newly discovered CVE-2026

πŸ“Œ Unique Feature:

Automatically detects CSRF token
Tests 15 upload directories (webroot, admin, images, tmp, etc.)

DM πŸ‘‰ @Mm_fit 🦊

πŸš€ LAST 3 SPOTS AVAILABLE!

Channel: https://t.me/cve0day

#AD
Please open Telegram to view this post
VIEW IN TELEGRAM
❀7
⚠️403 bypass tools for bug bounty hunters:

bypass-403 β†’ https://github.com/iamj0ker/bypass-403
nomore403 β†’ https://github.com/devploit/nomore403
4-ZERO-3 β†’ https://github.com/Dheerajmadhukar/4-ZERO-3
byp4xx β†’ https://github.com/lobuhi/byp4xx
dontgo403 β†’ https://github.com/mbrg/dontgo403
Please open Telegram to view this post
VIEW IN TELEGRAM
❀15πŸ‘2πŸ‘¨β€πŸ’»2
1600+ tested regex patterns for detecting secrets, API keys, passwords, and tokens

β€’ Works with TruffleHog and Gitleaks
β€’ ReDoS-safe patterns
β€’ Confidence-based categorization

Limited regex coverage = missed secrets

https://github.com/mazen160/secrets-patterns-db

#AppSec #DevSecOps #BugBounty
πŸ‘9πŸ‘2πŸ—Ώ1
⚠️A web pentesting batch started this weekend.

β˜„οΈ50% discount for this batch only!

πŸ””Starting from Saturday 1.30 PM IST

DM on WhatsApp - wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
😁2❀1
πŸ”” A PoC/exploit has been discovered for vulnerability CVE-2026-35616

PT ID: PT-2026-30288

Vendor: Fortinet
Product: FortiClientEMS
Description: A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Link: https://github.com/Alaatk/CVE-2026-35616
❀5
πŸ”₯πŸ‘‰Get Web Application Bug Bounty Methodology + Bug Bounty Masterclass + Ethical Hacking Study Guide at 50% Discount
https://topmate.io/saumadip/2054509?coupon_code=awxe
Please open Telegram to view this post
VIEW IN TELEGRAM
❀1
⚑️PoC collection of Atlassian(Jira, Confluence, Bitbucket) products and Jenkins, Solr, Nexus,etc

βœ…http://github.com/shadowsock5/Poc
πŸ”₯8❀6🐳2πŸ‘1
🦊 BRUT SECURITY – NEW BATCH STARTING FROM JUNE

πŸ‘ΎMaster Practical Web Pentesting & Bug Bounty Hunting from scratch to advanced level.

βœ… Real-world web attacks
βœ… Live practical sessions
βœ… Bug bounty methodology
βœ… Recon to exploitation
βœ… Report writing & workflow
βœ… Beginner friendly + advanced concepts

πŸ“… Batch Starts: June 2026
πŸ“ Online Live Classes, Weekend Batch
πŸ“© Limited seats available

πŸ”™πŸ”œDM http://wa.link/brutsecurity
Please open Telegram to view this post
VIEW IN TELEGRAM
❀4
Hey Hunter’s,
DarkShadow is here back again!

if you got any api endpoint and showing you unauthorized then use fake perameter like:

/api/public = unauthorized
/api/public/latest?anything=/api/public


you can FUZZ like:
?admin=true,
?bypass=1,
debug=true,
OR try to add header β€œX-Custom-IP-Authorization: 127.0.0.1”

these are some underrated but very effective method which i use to check api endpoints.


if you guy’s really enjoy to read such method then show your love to react here πŸ”₯❀️
πŸ”₯6❀4πŸ‘2