@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from @Phantasm_Lab
#Scanner #SQLi #Python

- Português

Este é um scanner de vulnerabilidade SQL, destinado a uma lista de URLs. Google Hacking usando Bing + Crawler de urls. + Suporte Para Rodar no Android através do GNURoot. Versão Mobile...

- English

This is a SQL vulnerability scanner, intended for a list of URLs. Google Hacking using Bing + Crawler for urls. + Support To Run on Android through GNURoot. Mobile Version

- Spanish

Este es un escáner de vulnerabilidad SQL, destinado a una lista de URLs. Google Hacking usando Bing + Crawler de urls. + Soporte para Girar en Android a través de GNU. Versión móvil ...

https://youtu.be/5rqbWHwePCg

🕴🏽 @Phantasm_Lab
🐍 @FullPythonAlchemist
---------- Redes de Computadores (Básico) —-------

| 2013
✒️ | e-tec
📂 | PDF
📦 | 8.84 MB

⬆️ @phantasm_lab
Udemy Course-Build An Advanced Keylogger Using C++ For Ethical Hacking
#Biblioteca #Drive

Conteúdo: São mais de 100 livros dos mais variados tipos, contendo coleções de vários autores, incluindo vários filósofos. Todos em português.
Venha conferir!!

Idioma:PT-BR
Formato do arquivo: PDF
Site: Google drive
Tema: Diversos

Link do download: https://drive.google.com/drive/folders/0BwRy6q6MoGTpV2VhQUNtb3ItVGs

👨🏽‍💻Créditos: BruceWayne
🗣 Créditos: @CR4CKK3S1
🕴 @Phantasm_Lab
Hackersh (Hacker Shell) - Un Shell Open Source línea de comandos para Pruebas de seguridad

Hackersh (Hacker Shell) es una cáscara libre y de código abierto (intérprete de comandos) escrito en Python con una sintaxis similar a Pythonect, una función de comandos de seguridad, y fuera de las envolturas de la caja para diversas herramientas de seguridad. Es como tuberías de Unix, pero para el procesamiento de la información de seguridad y los metadatos en lugar de bytes. En resumen, se trata básicamente de una consola interactiva para la investigación y pruebas de seguridad.

requisitos:

Python 2.7
Pythonect 0.4.2. o mas alto

COMO INSTALAR HACKERSH

Instalación automática:
Hackersh aparece en PyPI y se puede instalar con pip o easy_install: .

easy_install hackersh
o
PIP install hackersh

Instalación manual:

En primer lugar, descargar Hackersh-0.2.0.tar.gz .

tar xvzf Hackersh-0.2.0.tar.gz
cd Hackersh-0.2.0
sudo python setup.py install

Descargar:https://pypi.python.org/packages/source/H/Hackersh/Hackersh-0.2.0.tar.gz#md5=6343e39b48980ee224ba0f8dd55678e0

GitHub:https://github.com/ikotler/hackersh/releases
Forwarded from .: PR1V8 :.
#Ilusionismo #LeituraFria #Hipnose

Sexto show de palco de Derren Brown, apresentado entre 2013 e 2014. Combinando ilusionismo tradicional com técnicas legítimas de leitura fria, hipnose e memória, Derren constrói um show em que conversa com o público sobre suas obsessões, interesses e vida pessoal.

[LEMBREM-SE DE ATIVAR AS LEGENDAS EM PORTUGUÊS, NAS CONFIGURAÇÕES DO VIDEO]

Parte 1: https://www.youtube.com/watch?v=qKTE8_SuQAQ
Parte 2: https://www.youtube.com/watch?v=E82xSJowCaI
Parte 3: https://www.youtube.com/watch?v=qaqt4gF9OyY

🕴🏼 @Phantasm_Lab
------------------— The IT Crowd (Série de comédia e TI) —---------------

| 2006/07/08/10/13
🎥 | Graham Linehan
📂 | MP4 e MKV
📦 | 5.75 GB (Dividido em episódios)

⬆️ @phantasm_lab
EnigmaGroup
http://www.enigmagroup.org/
Exploit Exercises
http://exploit-exercises.com/
Google Gruyere
http://google-gruyere.appspot.com/
Gh0st Lab
http://www.gh0st.net/
Hack This Site
http://www.hackthissite.org/
HackThis
http://www.hackthis.co.uk/
HackQuest
http://www.hackquest.com/
Hack.me
https://hack.me
Hacking-Lab
https://www.hacking-lab.com
Hacker Challenge
http://www.dareyourmind.net/
Hacker Test
http://www.hackertest.net/
hACME Game
http://www.hacmegame.org/
Hax.Tor
http://hax.tor.hu/
OverTheWire
http://www.overthewire.org/wargames/
pwn0
https://pwn0.com/home.php
RootContest
http://rootcontest.com/
Root Me
http://www.root-me.org/?lang=en
Security Treasure Hunt
http://www.securitytreasurehunt.com/
Smash The Stack
http://www.smashthestack.org/
TheBlackSheep and Erik
http://www.bright-shadows.net/
ThisIsLegal
http://thisislegal.com/
Try2Hack
http://www.try2hack.nl/
WabLab
http://www.wablab.com/hackme
XSS: Can You XSS This?
http://canyouxssthis.com/HTMLSanitizer/
XSS: ProgPHP
http://xss.progphp.com/
DigitalCorpora
http://digitalcorpora.org/
Digital Forensics Tool Testing Images
http://dftt.sourceforge.net/
DFRWS 2014 Forensics Rodeo
http://www.cs.uno.edu/~golden/dfrws-2014-rodeo.html
Linux LEO Supplemental Files
http://linuxleo.com/
volatility memory samples
https://code.google.com/p/volatility/wiki/FAQ
ISFCE Sample Practical Exercise
http://www.isfce.com/sample-pe.htm
ForGe Forensic test image generator
https://github.com/hannuvisti/forge
Network Forensics
Wireshark Sample Captures
http://wiki.wireshark.org/SampleCaptures
Wireshark Network Analysis Book Supplements
http://www.wiresharkbook.com/studyguide.html
pcapr
http://www.pcapr.net
PacketLife Capture Collection
http://packetlife.net/captures/
DigitalCorpora Packet Dumps
http://digitalcorpora.org/corpora/packet-dumps
Evil Fingers PCAP Challenges
https://www.evilfingers.com/repository/pcaps_challenge.php
PCAPS Repository
https://github.com/markofu/pcaps
Chris Sanders Packet Captures
http://chrissanders.org/packet-captures/
Tcpreplay Sample Captures
http://tcpreplay.appneta.com/wiki/captures.html
Enron Email Dataset
http://www.cs.cmu.edu/~enron/
MAWI Working Group Traffic Archive
http://mawi.wide.ad.jp/mawi/
LBNL-FTP-PKT
http://ee.lbl.gov/anonymized-traces.html/
Malware Analysis
Open Malware / Offensive Computing
http://openmalware.org/
Contagio
http://contagiodump.blogspot.com/
VX Heaven
http://vxheaven.org/
VirusShare.com / VXShare
http://virusshare.com/
VXVault
http://vxvault.siri-urz.net
MalShare
http://malshare.com/
Virusign
http://www.virusign.com/
theZoo / Malware DB
http://ytisf.github.io/theZoo/
malc0de
http://malc0de.com/database/
FakeAVs blog
http://www.fakeavs.com/
malware_traffic
http://malware-traffic-analysis.net/
Georgia Tech malrec page
http://panda.gtisc.gatech.edu/malrec/
Kernelmode Forum
http://www.kernelmode.info
Malware Hub Forum
http://malwaretips.com/categories/malware-hub.103/
MalwareBlacklist.com
http://www.malwareblacklist.com
Joxean Koret’s List
http://malwareurls.joxeankoret.com
Sucuri Research Labs
http://labs.sucuri.net/?malware
CLEAN MX realtime database
http://support.clean-mx.de/clean-mx/viruses.php
Contagio Mobile Malware
http://contagiominidump.blogspot.com/
Android Sandbox
http://androidsandbox.net/samples/
maltrieve
http://maltrieve.org/
HoneyDrive
http://bruteforce.gr/honeydrive
Online and CTFs
Honeynet Challenges
https://www.honeynet.org/challenges
http://old.honeynet.org/scans/index.html
I Smell Packets
http://ismellpackets.com/
Network Forensics Puzzle contest
http://forensicscontest.com/puzzles
DEF CON CTF Archive
https://www.defcon.org/html/links/dc-ctf.html
DFRWS
http://www.dfrws.org/2013/challenge/index.shtml
http://www.dfrws.org/2010/challenge/
http://www.dfrws.org/2011/challenge/index.shtml
http://www.dfrws.org/2007/challenge/index.shtml
http://www.dfrws.org/2006/challenge/
http://www.dfrws.org/2005/challenge/
ForensicKB Practicals
http://www.forensickb.com/2008/01/forensic-practical.html
http://www.forensickb.com/2008/01/forensic-practical-2.html
http://www.forensickb.com/2010/01/forensic-practical-exer
🕴🏼 Créditos: @Y0unglean
🕴🏼 @Phantasm_Lab