Forwarded from .: PR1V8 :.
#Nmap #Proxychains
https://www.shellhacks.com/anonymous-port-scanning-nmap-tor-proxychains/
🕴 Créditos: @unnamed5
🕴 @Phantasm_Lab
https://www.shellhacks.com/anonymous-port-scanning-nmap-tor-proxychains/
🕴 Créditos: @unnamed5
🕴 @Phantasm_Lab
ShellHacks
Anonymous Port Scanning: Nmap + Tor + ProxyChains - ShellHacks
In this article i will explain how to stay anonymous during port scanning with Nmap (utility for network discovery and security auditing). I’ll show how to perform an anonymous port scanning through the Tor network, using ProxyChains utility. I’ll also show…
Forwarded from @Phantasm_Lab
#Azure #OpenSource #Nuvem
https://drive.google.com/drive/folders/0B8OKJk3z6_iVV3hqdmJoa0FFMXM?usp=sharing
🕴🏾 @Phantasm_Lab
Especialista Open Source e Azure para Infraestrutura de Nuvemhttps://drive.google.com/drive/folders/0B8OKJk3z6_iVV3hqdmJoa0FFMXM?usp=sharing
🕴🏾 @Phantasm_Lab
Google
Especialista Open Source e Infraestrutura + Azure - Google Drive
Material para Estudo da Maratona Azure da Microsoft.
Forwarded from Python Brasil
PacktPub está com algumas categorias com 4 e-books grátis em cada. Conteúdo com Python na maioria https://www.packtpub.com/packt/offers/free-learning
Categorias:
- Dev Tools
- Application Development
- Big Data
- Web Development
Categorias:
- Dev Tools
- Application Development
- Big Data
- Web Development
Vem falar sobre #Python aqui em São Paulo no TDC com a gente!
Corra e mande sua palestra ate dia 30/05!
http://bit.ly/MandeSuaPalestraPythonTDC2017 #TheDevConf
🕴 @samukasmk
🕴 @Phantasm_Lab
Corra e mande sua palestra ate dia 30/05!
http://bit.ly/MandeSuaPalestraPythonTDC2017 #TheDevConf
🕴 @samukasmk
🕴 @Phantasm_Lab
The Developer's Conference
TDC 2017 SP - Call4Papers
Quer palestrar numa Trilha do evento The Developer's Conference? Então vem! Aqui você pode brilhar e compartilhar seus cases! Está aberta a chamada de trabalhos para o TDC 2017 São Paulo. Se você deseja contribuir…
Forwarded from .: PR1V8 :.
Forwarded from Information Security
Jury Out on North Korea Link to Ransomware Attack
http://feedproxy.google.com/~r/Securityweek/~3/4RRjBwIOIwk/jury-out-north-korea-link-ransomware-attack
Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?
read more (http://www.securityweek.com/jury-out-north-korea-link-ransomware-attack)
http://feedproxy.google.com/~r/Securityweek/~3/4RRjBwIOIwk/jury-out-north-korea-link-ransomware-attack
Was North Korea behind the ransomware epidemic that hit global computer networks earlier this month?
read more (http://www.securityweek.com/jury-out-north-korea-link-ransomware-attack)
Forwarded from Information Security
Split Tunnel SMTP Exploit Bypasses Email Security Gateways
https://www.darkreading.com/attacks-breaches/split-tunnel-smtp-exploit-bypasses-email-security-gateways/d/d-id/1328963?_mc=RSS_DR_EDT
Attackers can inject malicious payloads directly to email server via email encryption appliances, Securolytics says.
https://www.darkreading.com/attacks-breaches/split-tunnel-smtp-exploit-bypasses-email-security-gateways/d/d-id/1328963?_mc=RSS_DR_EDT
Attackers can inject malicious payloads directly to email server via email encryption appliances, Securolytics says.
Forwarded from .: PR1V8 :.
#CTF #wargame #tradução
Mais recursos para melhorar suas skills em diversos assuntos relacionados ao hacking
Desafios online em tempo real
[Esses contém desafios atualizados e de ótima qualidade]
http://pwnable.kr/ (É bastante popular, e consiste em uma série de desafios de exploitation)
https://picoctf.com/ (Criada para estudantes de ensino médio. O evento ocorre todo ano, e o site possui desafios com uma boa progressão de dificuldade)
https://microcorruption.com/login (Interface interativa muito boa, introduz engenharia reversa de baixo nível, em um MSP430)
https://learn.abctf.xyz (Nova plataforma para aprender CTF, com desafios criados pelos próprios usuários)
http://reversing.kr/
http://hax.tor.hu/
https://w3challs.com/
https://pwn0.com/
https://io.netgarage.org/
http://ringzer0team.com/
http://www.hellboundhackers.org/
http://www.overthewire.org/wargames/
http://counterhack.net/Counter_Hack/Challenges.html
http://www.hackthissite.org/
http://vulnhub.com/
Outros
https://backdoor.sdslabs.co/
http://smashthestack.org/wargames.html
http://hackthecause.info/
http://bright-shadows.net/
http://www.mod-x.co.uk/main.php
http://scanme.nmap.org/
http://www.hackertest.net/
http://net-force.nl/
http://securityoverride.org/ Ensina bons conceitos, mas algumas coisas não são realistas (como strings armazenadas idênticas ao input)
Recursos e listas de desafios
http://www.wechall.net/sites.php (ótima lista de desafios)
http://ctf.forgottensec.com/wiki/ (Boa Wiki sobre CTFs)
http://repo.shell-storm.org/CTF/ (Ótimo arquivo de CTFs)
CTFs específicos relacionados à aplicações web
http://demo.testfire.net/
http://wocares.com/xsstester.php
http://crackme.cenzic.com/
http://test.acunetix.com/
http://zero.webappsecurity.com/
Desafios específicos de forense
http://computer-forensics.sans.org/community/challenges
http://computer-forensics.sans.org/community/challenges
http://forensicscontest.com/
Recruiting
https://www.praetorian.com/challenges/pwnable/
http://rtncyberjobs.com/
http://0x41414141.com/
Treinamento pago
http://heorot.net/
Desafios offline para download
http://www.badstore.net/
http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
http://www.owasp.org/index.php/Owasp_SiteGenerator
Damn Vulnerable Web App
Stanford SecureBench Micro
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10
Máquinas virtuais vulneráveis
https://pentesterlab.com/exercises/
http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
Damn Vulnerable Linux (Mirror)
Créditos: Streaak
@PR1V8
Mais recursos para melhorar suas skills em diversos assuntos relacionados ao hacking
Desafios online em tempo real
[Esses contém desafios atualizados e de ótima qualidade]
http://pwnable.kr/ (É bastante popular, e consiste em uma série de desafios de exploitation)
https://picoctf.com/ (Criada para estudantes de ensino médio. O evento ocorre todo ano, e o site possui desafios com uma boa progressão de dificuldade)
https://microcorruption.com/login (Interface interativa muito boa, introduz engenharia reversa de baixo nível, em um MSP430)
https://learn.abctf.xyz (Nova plataforma para aprender CTF, com desafios criados pelos próprios usuários)
http://reversing.kr/
http://hax.tor.hu/
https://w3challs.com/
https://pwn0.com/
https://io.netgarage.org/
http://ringzer0team.com/
http://www.hellboundhackers.org/
http://www.overthewire.org/wargames/
http://counterhack.net/Counter_Hack/Challenges.html
http://www.hackthissite.org/
http://vulnhub.com/
Outros
https://backdoor.sdslabs.co/
http://smashthestack.org/wargames.html
http://hackthecause.info/
http://bright-shadows.net/
http://www.mod-x.co.uk/main.php
http://scanme.nmap.org/
http://www.hackertest.net/
http://net-force.nl/
http://securityoverride.org/ Ensina bons conceitos, mas algumas coisas não são realistas (como strings armazenadas idênticas ao input)
Recursos e listas de desafios
http://www.wechall.net/sites.php (ótima lista de desafios)
http://ctf.forgottensec.com/wiki/ (Boa Wiki sobre CTFs)
http://repo.shell-storm.org/CTF/ (Ótimo arquivo de CTFs)
CTFs específicos relacionados à aplicações web
http://demo.testfire.net/
http://wocares.com/xsstester.php
http://crackme.cenzic.com/
http://test.acunetix.com/
http://zero.webappsecurity.com/
Desafios específicos de forense
http://computer-forensics.sans.org/community/challenges
http://computer-forensics.sans.org/community/challenges
http://forensicscontest.com/
Recruiting
https://www.praetorian.com/challenges/pwnable/
http://rtncyberjobs.com/
http://0x41414141.com/
Treinamento pago
http://heorot.net/
Desafios offline para download
http://www.badstore.net/
http://www.owasp.org/index.php/Category:OWASP_WebGoat_Project
http://www.owasp.org/index.php/Owasp_SiteGenerator
Damn Vulnerable Web App
Stanford SecureBench Micro
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10
Máquinas virtuais vulneráveis
https://pentesterlab.com/exercises/
http://sourceforge.net/projects/metasploitable/files/Metasploitable2/
Damn Vulnerable Linux (Mirror)
Créditos: Streaak
@PR1V8
Declaramos nossa união a Vault Corporation! 🏴
O que é a Vault Corporation? https://news.1rj.ru/str/vaultcorp/34
🕴🏼 @Phantasm_Lab
O que é a Vault Corporation? https://news.1rj.ru/str/vaultcorp/34
🕴🏼 @Phantasm_Lab
Telegram
Vault Corporation
A Vcorp é uma holding com o intuito de unir organizações que compartilham arquivos livremente, em uma só. Mas ao mesmo tempo mantendo a independência das mesmas. Portanto, o intuito da Vcorp não é ganhar controle sobre as mesmas, ao contrário, as organizações…
