@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from @Phantasm_Lab (Rabbitz )
This media is not supported in your browser
VIEW IN TELEGRAM
🌍All about Astronomy:🌍
News, curiosities, planets, stars, universe...

Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...

📌User: @CosmosAstronomia
Reportagem de hipócritas que atacam uploaders que ajudam a disseminar o conhecimento, que devia ser livre aliás.
Best Exploits

phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA

https://github.com/XiphosResearch/exploits

@S4fh1R
Forwarded from @Phantasm_Lab
Pra quem curte CTF 🚩
Forwarded from @Phantasm_Lab
Forwarded from Promochina 🇧🇷
Você é contra o bloqueio de celulares pela ANATEL? O bloqueio pode afetar marcas como Ulefone, Umi, Oukitel, Vernee e outras marcas menores que já se mostraram boas :)

Deixa os consumidores comprarem o que bem entenderem, não cabe a ANATEL decidir isso.

Enviei uma sugestão legislativa e preciso do apoio de vocês. Apoiem a ideia e divulguem para que possa alcançar 20 mil apoios e ir a discussão no Senado!

https://www12.senado.leg.br/ecidadania/visualizacaoideia?id=80190
#OWASP #ZAP

Da página oficial: "O OWASP Zed Attack Proxy (ZAP) é um das ferramentas gratuitas mais populares do mundo e é ativamente mantida por centenas de voluntários internacionais. Ele pode te ajudar a automaticamente encontrar vulnerabilidades em suas aplicações web enquanto você desenvolve e testa suas aplicações. Ele também é uma ótima ferramenta para pentesters experientes para utilizar em testes de segurança manuais."

🕴🏼 @Phantasm_Lab

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software.

https://github.com/AlessandroZ/LaZagne

🕴🏼 @Phantasm_Lab