cursinho de hackear carro
https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec
🕴 @Parakov
🕴 @Warez_Lab
https://medium.freecodecamp.org/hacking-cars-a-guide-tutorial-on-how-to-hack-a-car-5eafcfbbb7ec
🕴 @Parakov
🕴 @Warez_Lab
freeCodeCamp
How to hack a car — a quick crash-course
The goal of this article is to get you started hacking cars — fast, cheap, and easy. In order to do this, we’ll spoof the RPM gauge as an…
CURSO GRATUITO DE WIRESHARK
https://guardweb.com.br/cursos/fundamentos-de-wireshark
🕴 @SrBiggs
🕴 @Warez_Lab
https://guardweb.com.br/cursos/fundamentos-de-wireshark
🕴 @SrBiggs
🕴 @Warez_Lab
Forwarded from @Phantasm_Lab (Rabbitz )
This media is not supported in your browser
VIEW IN TELEGRAM
🌍All about Astronomy:🌍
News, curiosities, planets, stars, universe...
Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...
📌User: @CosmosAstronomia
News, curiosities, planets, stars, universe...
Tudo sobre Astronomia:
Notícias, curiosidades, planetas, estrelas, Universo...
📌User: @CosmosAstronomia
Forwarded from 📚 Biblioteca do Vini 📚
REPORTAGEM QUE O CANAL APARECEU
https://olhardigital.com.br/noticia/cursos-pirataria-e-pornografia-saiba-o-que-encontramos-no-telegram/69555
https://olhardigital.com.br/noticia/cursos-pirataria-e-pornografia-saiba-o-que-encontramos-no-telegram/69555
Olhar Digital
Cursos, pirataria e pornografia: saiba o que encontramos no Telegram
Nota atualizada em 08/08/2017 com o posicionamento do Telegram; ver abaixo Desde que foi lançado, em 2013, o Telegram não tem a mesma popularidade do WhatsApp
Reportagem de hipócritas que atacam uploaders que ajudam a disseminar o conhecimento, que devia ser livre aliás.
#Cursos
https://drive.google.com/drive/folders/0Bx5VppDMoe4UTEwwV3ZpZXFmdUU
https://mega.nz/#F!BEFVBCzI!xRFUfxpn2Sp4BSfnWHjadg
SENHA: conhecimentoparatodos
Aproveite os links pode cair ainda hoje por direitos autorais.
🕴 @bibliotecadovini
🕴 @Phantasm_Lab
https://drive.google.com/drive/folders/0Bx5VppDMoe4UTEwwV3ZpZXFmdUU
https://mega.nz/#F!BEFVBCzI!xRFUfxpn2Sp4BSfnWHjadg
SENHA: conhecimentoparatodos
Aproveite os links pode cair ainda hoje por direitos autorais.
🕴 @bibliotecadovini
🕴 @Phantasm_Lab
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Best Exploits
phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA
https://github.com/XiphosResearch/exploits
@S4fh1R
phpMoAdmin Remote Code Execution (CVE-2015-2208)
LotusCMS Remote Code Execution (OSVDB-75095)
ElasticSearch Remote Code Execution (CVE-2015-1427)
ShellShock (httpd) Remote Code Execution (CVE-2014-6271)
IISlap - http.sys Denial of Service/RCE PoC (DoS only). (MS-15-034)
se0wned - Seowintech Router diagnostic.cgi remote root
WPsh0pwn - Wordpress WPShop eCommerce Shell Upload (WPVDB-7830)
nmediapwn - Wordpress N-Media Website Contact Form with File Upload 1.3.4 Shell Upload
pwnflow - Wordpress Work the flow file upload 2.5.2 Shell Upload
delusions - Wordpress InfusionSoft Gravity Forms Shell Upload (CVE-2014-6446)
suiteshell - SuiteCRM Post-Auth Remote Code Execution (CVE-2015-NOTYET)
suiteracer - SuiteCRM Post-Auth Remote Code Execution Race Condition (CVE-2015-xxxx)
unsanitary - Address Sanitizer + Setuid Binary = Local Root exploit (LD_PRELOAD vector)
DiamondFox - DiamondFox Botnet C&C Panel Shell Upload
DoubtfullyMalignant - BenignCertain DoS PoC
TorCT-Shell - TorCT RAT C&C Panel Shell Upload
vBullshit - vBulletin 5.x.x unserialize() Remote Code Execution (CVE-2015-7808)
Xanity-Shell - Xanity RAT C&C Panel Shell Upload
Joomraa - PoC + upload blacklist bypass (CVE-2016-8869, CVE-2016-8870, CVE-2016-9836)
Deathsize - LifeSize Room remote code execution & local root exploit
AssetExploder - ManageEngine Asset Explorer remote code execution
DroppleGanger - Droppler <= 1.6.5 Auth-Bypass & RCE
tr-06fail - TR-064 Misimplementations leading to remote device takeover in ZyXEL Routers
screen2root - Screen 4.05.00 (CVE-2017-5618) local privesc
FreeACS-Pwn - TR-069 exploit for FreeACS server, disclosed at BSides Edinburgh.
Joomblah - Joomla 3.7.0 SQL Injection exploit (CVE-2017-8917)
pisspoorpool - Local file inclusion exploit for p2pool status page
wipgpwn - Remote Root Exploit for WePresent WiPG-1000,1500,2000 devices
TBA
https://github.com/XiphosResearch/exploits
@S4fh1R
GitHub
GitHub - XiphosResearch/exploits: Miscellaneous exploit code
Miscellaneous exploit code. Contribute to XiphosResearch/exploits development by creating an account on GitHub.
Forwarded from Packt Free Learning
Forwarded from @Phantasm_Lab
Forwarded from Promochina 🇧🇷
Você é contra o bloqueio de celulares pela ANATEL? O bloqueio pode afetar marcas como Ulefone, Umi, Oukitel, Vernee e outras marcas menores que já se mostraram boas :)
Deixa os consumidores comprarem o que bem entenderem, não cabe a ANATEL decidir isso.
Enviei uma sugestão legislativa e preciso do apoio de vocês. Apoiem a ideia e divulguem para que possa alcançar 20 mil apoios e ir a discussão no Senado!
https://www12.senado.leg.br/ecidadania/visualizacaoideia?id=80190
Deixa os consumidores comprarem o que bem entenderem, não cabe a ANATEL decidir isso.
Enviei uma sugestão legislativa e preciso do apoio de vocês. Apoiem a ideia e divulguem para que possa alcançar 20 mil apoios e ir a discussão no Senado!
https://www12.senado.leg.br/ecidadania/visualizacaoideia?id=80190
Senado Federal - Programa e-Cidadania
Senado Federal - Programa e-Cidadania - Ideia Legislativa
Apoie essa Ideia Legislativa: "Contra o bloqueio de celulares pela ANATEL"
Forwarded from Packt Free Learning
#OWASP #ZAP
🕴🏼 @Phantasm_Lab
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
Da página oficial: "O OWASP Zed Attack Proxy (ZAP) é um das ferramentas gratuitas mais populares do mundo e é ativamente mantida por centenas de voluntários internacionais. Ele pode te ajudar a automaticamente encontrar vulnerabilidades em suas aplicações web enquanto você desenvolve e testa suas aplicações. Ele também é uma ótima ferramenta para pentesters experientes para utilizar em testes de segurança manuais."🕴🏼 @Phantasm_Lab
https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the purpose of finding these passwords for the most commonly-used software.https://github.com/AlessandroZ/LaZagne
🕴🏼 @Phantasm_Lab
GitHub
GitHub - AlessandroZ/LaZagne: Credentials recovery project
Credentials recovery project. Contribute to AlessandroZ/LaZagne development by creating an account on GitHub.
#1Tb #Materiais #Drive
Mais de 1Tb de materiais para estudo.
https://drive.google.com/drive/mobile/folders/0B28wiRqjwTwbbmRVU0lZXzJTZ28
🕴 @TheNesk
🕴 @Warez_Lab
Mais de 1Tb de materiais para estudo.
https://drive.google.com/drive/mobile/folders/0B28wiRqjwTwbbmRVU0lZXzJTZ28
🕴 @TheNesk
🕴 @Warez_Lab