cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

Brut Security

🔐Enhance your cybersecurity skills with our expert services and training programs. ✅For queries: 📮Telegram: @wtf_brut 📨E-mail: [email protected] 🛃WhatsApp: https://wa.link/7j7p6g

Mostrar más
Publicaciones publicitarias
4 010
Suscriptores
+1324 horas
+1697 días
+59730 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

⚠️CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow ▶️Video POC - Click Here ⚠️Nuclei Template - Click Here
Mostrar todo...
CVE-2024-4879 | Template Injection Vulnerability in ServiceNow | Bug Bounty POC | Brut Security

🚨CVE-2024-4879 & CVE-2024-5217: ServiceNow Security Vulnerabilities Expose Businesses to RCE and Data Breaches ⚖These vulnerabilities enable unauthenticated remote attackers to execute arbitrary code within the Now Platform, potentially leading to complete system compromise, data theft, and disruption of critical business operations. 👇Search Query Hunter:/product.name="ServiceNow" FOFA: app="servicenow-Products" SHODAN: Server: ServiceNow ㊙For Nuclei Template Join Telegram:

https://t.me/brutsecurity

🤡 1
Photo unavailableShow in Telegram
CVE-2024-6385: Improper Access Control in GitLab, 9.6 rating 🔥 The new vulnerability allows an attacker to run pipeline jobs with the rights of any other user. Search at Netlas.io: 👉 Link: https://nt.ls/HvsUY 👉 Dork: http.favicon.hash_sha256:72a2cad5025aa931d6ea56c3201d1f18e68a8cd39788c7c80d5b2b82aa5143ef Read more: https://www.bleepingcomputer.com/news/security/gitlab-warns-of-critical-bug-that-lets-attackers-run-pipelines-as-an-arbitrary-user/
Mostrar todo...
Photo unavailableShow in Telegram
🔥 1
Shodan_for_Pentesting_1718863899.pdf13.13 MB
👍 4
00:12
Video unavailableShow in Telegram
🥲
Mostrar todo...
IMG_3037.MP42.36 MB
157 Methods for Privilege Escalation (WindowsLinuxMacos) PDF.pdf84.93 MB
☄️Sensitive Information Disclosure Through Config File☄️ ⚠️Steps To Reproduce:
ffuf -c -ac -r -u https://target[.]com/FUZZ -w wordlist.txt
⚠️Wordlists: 🔗https://github.com/six2dez/OneListForAll 🔗https://wordlists.assetnote.io/ 🔗https://github.com/danielmiessler/SecLists
Mostrar todo...
GitHub - six2dez/OneListForAll: Rockyou for web fuzzing

Rockyou for web fuzzing. Contribute to six2dez/OneListForAll development by creating an account on GitHub.

🔥 2
Mostrar todo...
🔥 2
Mostrar todo...
Photo unavailableShow in Telegram
🤣🤣
Mostrar todo...
🐳 4🔥 1
Elige un Plan Diferente

Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.