Brut Security
15.3K subscribers
968 photos
76 videos
292 files
1.01K links
βœ…DM: @wtf_brut
πŸ›ƒWhatsApp: https://wa.link/brutsecurity
🈴Training: https://brutsecurity.com
πŸ“¨Mail: info@brutsec.com
Download Telegram
Brut Security pinned Β«πŸ’₯A collection of awesome one-liner scripts especially for bug bountyπŸ’₯ πŸ”—https://github.com/dwisiswant0/awesome-oneliner-bugbountyΒ»
Please open Telegram to view this post
VIEW IN TELEGRAM
⚑2
Brut Security pinned Β«πŸ”ˆExposed Pinata API Key Nuclei Template πŸ“Žhttps://raw.githubusercontent.com/karkis3c/bugbounty/main/nuclei-templates/info-disclosure/pinata-keys-exposed.yamlΒ»
β˜„οΈCollection of Links, Write-ups, Blog posts and Papers related to Cybersecurity, Reverse engineering and Exploitationβ˜„οΈ

πŸ”–https://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md
Please open Telegram to view this post
VIEW IN TELEGRAM
❀3πŸ—Ώ2😱1
πŸ‘6❀1
What makes you hacker?🀨
Please open Telegram to view this post
VIEW IN TELEGRAM
Add the folder 'home/000~ROOT~000/' to your wordlist, and you might discover some juicy data. Enjoy!"
😭7πŸ‘5πŸ”₯5🀣2❀1
πŸ”Top 10 Shodan Dorks

πŸ”–#infosec #cybersecurity #hacking #pentesting #security
πŸ‘3πŸ‘1
β˜„οΈIf you have access to jenkins dashboard, use below Script Console cmd for pocβ˜„οΈ
def passwdFile = new File("/etc/passwd")
println passwdFile.text
Please open Telegram to view this post
VIEW IN TELEGRAM
❀9⚑6πŸ”₯2πŸ‘1
prv8_nuclei_templates.zip
3.9 MB
⚑ 6000+ Private Nuclei Templates ⚑
❀‍πŸ”₯28🀣5πŸ‘Œ2❀1⚑1πŸ”₯1🀝1
CVE-2024-8073: Command Injection in Hillstone Networks Firewalls, 9.8 rating πŸ”₯

The freshest vulnerability in Hillstone WAFs allows an attacker to perform RCE due to incorrect input validation.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/YZWqU
πŸ‘‰ Dork: http.title:"Hillstone Networks"

Vendor's advisory: https://www.hillstonenet.com.cn/security-notification/2024/08/21/mlzrld-2/
πŸ”₯5πŸ‘2🀣1
Telegram CEO is arrested, so there is a probability that telegram will end the services or it's services will be blocked on different countries. So as a backup you can join our discord channel. Thanks!
https://discord.gg/NTU2q8gU5K
🀣1
This media is not supported in your browser
VIEW IN TELEGRAM
Wake Up! Your Mom and Dad are waiting for your success 🀩 They're both running out of time.
Please open Telegram to view this post
VIEW IN TELEGRAM
❀19😒4❀‍πŸ”₯2πŸ‘2🀣1
❀5🀣2
Reset Password Feature Security Testing.pdf
72.4 KB
Reset Password Bug Bounty Guide
🀣1
CVE-2024-6386: RCE in WPML WordPress Plugin, 9.9 rating πŸ”₯

Due to the lack of input validation, an attacker can execute code on the affected server.

Search at Netlas.io:
πŸ‘‰ Link: https://nt.ls/caxUk
πŸ‘‰ Dork: http.body:"plugins/wpml"

Read more: https://sec.stealthcopter.com/wpml-rce-via-twig-ssti/
πŸ‘6🀣1
Useful Google Dorks that bug bounty hunters can leverage to find sensitive information: πŸ‘‡πŸ»

1. Discovering Exposed Files:
   - intitle:"index of" "site:target.com"
   - filetype:log inurl:log site:target.com
   - filetype:sql inurl:sql site:target.com
   - filetype:env inurl:.env site:target.com

2. Finding Sensitive Directories:
   - inurl:/phpinfo.php site:target.com
   - inurl:/admin site:target.com
   - inurl:/backup site:target.com
   - inurl:wp- site:target.com

3. Exposed Configuration Files:
   - filetype:config inurl:config site:target.com
   - filetype:ini inurl:wp-config.php site:target.com
   - filetype:json inurl:credentials site:target.com

4. Discovering Usernames and Passwords:
   - intext:"password" filetype:log site:target.com
   - intext:"username" filetype:log site:target.com
   - filetype:sql "password" site:target.com

5. Finding Database Files:
   - filetype:sql inurl:db site:target.com
   - filetype:sql inurl:dump site:target.com
   - filetype:bak inurl:db site:target.com

6. Exposed Git Repositories:
   - inurl:".git" site:target.com
   - inurl:"/.git/config" site:target.com
   - intitle:"index of" ".git" site:target.com

7. Finding Publicly Exposed Emails:
   - intext:"email" site:target.com
   - inurl:"contact" intext:"@target.com" -www.target.com
   - filetype:xls inurl:"email" site:target.com

8. Discovering Vulnerable Web Servers:
   - intitle:"Apache2 Ubuntu Default Page: It works" site:target.com
   - intitle:"Index of /" "Apache Server" site:target.com
   - intitle:"Welcome to nginx" site:target.com

9. Finding API Keys:
   - filetype:env "DB_PASSWORD" site:target.com
   - intext:"api_key" filetype:env site:target.com
   - intext:"AWS_ACCESS_KEY_ID" filetype:env site:target.com

10. Exposed Backup Files:
    - filetype:bak inurl:backup site:target.com
    - filetype:bak inurl:backup site:target.com
    - filetype:zip inurl:backup site:target.com
    - filetype:tgz inurl:backup site:target.com

Replace target.com with the domain or target you are focusing on.

#GoogleDorks
#BugHunting
#OSINT
❀13πŸ‘8πŸ”₯5🀣1
priv8-Nuclei-.zip
845.8 KB
❀10🀣3πŸ”₯2
Brut Security pinned Deleted message
πŸ’‘ Bug Bounty Tip:
Sometimes you can easily find IDOR vulnerabilities simply by changing the request method! πŸ€‘
Quick example πŸ‘‡
❀6πŸ‘3🀣3