#Forum #Rohitab #Programming
🕴🏼 http://www.rohitab.com
🕴🏼 @Phantasm_Lab
Free Software and Source Code, Programming and Development Forums and IRC Chat🕴🏼 http://www.rohitab.com
🕴🏼 @Phantasm_Lab
Rohitab
Free Software and Source Code | Feed Your Brain | rohitab.com
Free Software and Source Code, Programming and Development Forums and IRC Chat
#BlackBat #Virus #Non #Destructive
🕴🏼 @Phantasm_Lab
🕴🏼 About Information:
http://www.rohitab.com/blackbat-virus
OverviewLanguage – x86 AssemblyOperating Systems – Windows 95/98Type – Memory ResidentFiles Infected – Win32 Portable Executable Files (PE .EXE)Characteristics – Polymorphic, EncryptingAdvanced features include Anti-Debugging Code and use of Structured Exception Handling. The virus will not infect computers that have WIN.SYS located in the root directory. The file time and date restored after infection. The virus will not infect Anti-Virus programs like Norton Anti-Virus, TBAV, McAfee, F-Prot and a few others.🕴🏼 @Phantasm_Lab
🕴🏼 About Information:
http://www.rohitab.com/blackbat-virus
Rohitab
BlackBat Virus: Win9x Polymorphic Virus Source Code | rohitab.com
BlackBat Virus is a Non-Destructive Win9x Polymorphic Virus
http://blog.shellterlabs.com/pt/terceira-competicao-de-cibernetica-das-forcas-armadas/
🕴 @Phantasm_Lab
🕴 @Phantasm_Lab
SHELLTER Labs' Blog
Terceira Competição de Cibernética das Forças Armadas
Fala galera, O Shellter Labs gostaria de parabenizar a equipe ZeroByte que venceu a Terceira Competição de Cibernética das Forças Armadas, que ocorreu no dia 29 de junho, em Brasília (DF). A equipe é composta pelo Tenente Paulo Trindade, Sargento João Pedroso…
Ingeniería de Software con PHP, HTML5 y Material Design -
Crea un sistema a la medida desde principiante a experto con un proyecto 100% real y funcional
https://www.udemy.com/desarrollo-de-sistema-empresarial-con-php-y-material-design
https://mega.nz/#F!UOI3iK5B!HSmbOKZrY2pDsY2Elnt8Nw
Crea un sistema a la medida desde principiante a experto con un proyecto 100% real y funcional
https://www.udemy.com/desarrollo-de-sistema-empresarial-con-php-y-material-design
https://mega.nz/#F!UOI3iK5B!HSmbOKZrY2pDsY2Elnt8Nw
Udemy
Ingeniería de Software con PHP, HTML5 y Material Design
Crea un sitio web empresarial con php, html5 y MySQLi con un proyecto 100% practico, real y funcional de cero a experto
cursinho de hackear carro
https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec
🕴 @Parakov
🕴 @Warez_Lab
https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec
🕴 @Parakov
🕴 @Warez_Lab
freeCodeCamp
How to hack a car — a quick crash-course
The goal of this article is to get you started hacking cars — fast, cheap, and easy. In order to do this, we’ll spoof the RPM gauge as an…
CURSO GRATUITO DE WIRESHARK
https://guardweb.com.br/cursos/fundamentos-de-wireshark
🕴 @SrBiggs
🕴 @Warez_Lab
https://guardweb.com.br/cursos/fundamentos-de-wireshark
🕴 @SrBiggs
🕴 @Warez_Lab
Forwarded from @Phantasm_Lab (Rabbitz )
This media is not supported in your browser
VIEW IN TELEGRAM
🌍All about Astronomy:🌍
News, curiosities, planets, stars, universe...
Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...
📌User: @CosmosAstronomia
News, curiosities, planets, stars, universe...
Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...
📌User: @CosmosAstronomia
Forwarded from 📚 Biblioteca do Vini 📚
REPORTAGEM QUE O CANAL APARECEU
https://olhardigital.com.br/noticia/cursos-pirataria-e-pornografia-saiba-o-que-encontramos-no-telegram/69555
https://olhardigital.com.br/noticia/cursos-pirataria-e-pornografia-saiba-o-que-encontramos-no-telegram/69555
Olhar Digital
Cursos, pirataria e pornografia: saiba o que encontramos no Telegram
Nota atualizada em 08/08/2017 com o posicionamento do Telegram; ver abaixo Desde que foi lançado, em 2013, o Telegram não tem a mesma popularidade do WhatsApp
Reportagem de hipócritas que atacam uploaders que ajudam a disseminar o conhecimento, que devia ser livre aliás.
#Cursos
https://drive.google.com/drive/folders/0Bx5VppDMoe4UTEwwV3ZpZXFmdUU
https://mega.nz/#F!BEFVBCzI!xRFUfxpn2Sp4BSfnWHjadg
SENHA: conhecimentoparatodos
Aproveite os links pode cair ainda hoje por direitos autorais.
🕴 @bibliotecadovini
🕴 @Phantasm_Lab
https://drive.google.com/drive/folders/0Bx5VppDMoe4UTEwwV3ZpZXFmdUU
https://mega.nz/#F!BEFVBCzI!xRFUfxpn2Sp4BSfnWHjadg
SENHA: conhecimentoparatodos
Aproveite os links pode cair ainda hoje por direitos autorais.
🕴 @bibliotecadovini
🕴 @Phantasm_Lab
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Best Exploits
phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA
https://github.com/XiphosResearch/exploits
@S4fh1R
phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA
https://github.com/XiphosResearch/exploits
@S4fh1R
GitHub
GitHub - XiphosResearch/exploits: Miscellaneous exploit code
Miscellaneous exploit code. Contribute to XiphosResearch/exploits development by creating an account on GitHub.