@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
#BlackBat #Virus #Non #Destructive

Overview

Language – x86 Assembly
Operating Systems – Windows 95/98
Type – Memory Resident
Files Infected – Win32 Portable Executable Files (PE .EXE)
Characteristics – Polymorphic, Encrypting

Advanced features include Anti-Debugging Code and use of Structured Exception Handling. The virus will not infect computers that have WIN.SYS located in the root directory. The file time and date restored after infection. The virus will not infect Anti-Virus programs like Norton Anti-Virus, TBAV, McAfee, F-Prot and a few others.

🕴🏼 @Phantasm_Lab
🕴🏼 About Information:

http://www.rohitab.com/blackbat-virus
blackbat.pdf
193.7 KB
Forwarded from @Phantasm_Lab (Rabbitz )
This media is not supported in your browser
VIEW IN TELEGRAM
🌍All about Astronomy:🌍
News, curiosities, planets, stars, universe...

Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...

📌User: @CosmosAstronomia
Reportagem de hipócritas que atacam uploaders que ajudam a disseminar o conhecimento, que devia ser livre aliás.
Best Exploits

phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA

https://github.com/XiphosResearch/exploits

@S4fh1R
Forwarded from @Phantasm_Lab
Pra quem curte CTF 🚩