@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
@EX0DUS1
I started a open source project and I want u to contribute to it

https://bitbucket.org/00hack00/th3-r3p05170ry/src
Highschooler wins $10K for easily spoofing Google server to leak private data

It turns out that scooping a juicy bug bounty reward from Google is as easy as tampering with its host header – or at least this is what one crafty Uruguayan highschooler with cybersecurity ambitions did to pull it off.

The Big G has rewarded Ezequiel Pereira with a $10,000 bug bounty after the independent security researcher came across a vulnerability that allowed coaxing one of the company’s back-end servers into granting attackers access to confidential data.

https://thenextweb.com/google/2017/08/10/highschool-security-research-google-data/#.tnw_tzBB2kiw

🕴🏽 @Phantasm_Lab
China’s VPN ban exposes its citizens to cyber-attacks

Apple last week removed all virtual private network apps (VPNs) from the iTunes store in China. The Chinese government made VPNs illegal this year, and now it’s forcing tech companies to choose between honoring its censorship demands or not doing business there.

China’s government has spent years trying to gain the upper hand against anti-state content. Officials blocked sites and banned content, they even built The Great Firewall. Citizens still found a way to access content the government censored. The easy way: using a VPN.

https://thenextweb.com/world/2017/08/09/chinas-vpn-ban-exposes-its-citizens-to-cyber-attacks/#.tnw_BFauQf5d

🕴🏽 @Phantasm_Lab
RT is a global news channel broadcasting from Moscow and Washington studios. With a global reach of over 700 million people, or over 25% of all cable subscribers worldwide, RT news covers the major issues of our time for viewers wishing to question more. Our team of young news professionals has made RT the first news channel to break the 1 billion YouTube views benchmark.

https://www.youtube.com/channel/UCpwvZwUam-URkxB7g4USKpg

🕴🏽 @Phantasm_Lab
THE MYSTERIOUS HISTORY OF ISIS - DOCUMENTARY 2017

https://www.youtube.com/watch?v=DOA0pYnPj6Q

🕴🏽 @Phantasm_Lab
Russias' Toughest Prison Documentary 2017 - Worlds WORST Prison

Russia is known for handling crime with an iron fist, but you haven't seen anything yet.

In this rare footage we get a look into russias toughest prison, and it doesn't look good at all.

This Russian prison is located in the middle of a forest and is extremely hard to access, its residents are the toughest criminals in Russia, especially mass murderers.

Inmates are going crazy in their cells, being isolated most of the day time, and even the guards are not happy to work there.

This prison is definitely hell on earth.

This documentary is hard to watch - viewers discretion advised.

https://www.youtube.com/watch?v=_f91TPRB-XQ

🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
#Python #Keylogger #TelgramAPI

~ English

keylogger with two ways to save the data from locally or using telegram bot!

~ Portuguese.

Keylogger com duas maneiras de salvar os dados localmente ou usando o bot do telegram!

~ Spanish.

Keylogger con dos maneras de guardar los datos de forma local o mediante el bot de telegram!

https://youtu.be/v57GZ8P3YKs

🕴🏽 @Phantasm_Lab
🐍 @FullPythonAlchemist
#Facebook #Bot #Reactions

Uma bot de reações completa para o Facebook

Muitos carentes necessitam sempre de um bom alcance em suas publicações, de muitas vezes com um certo teor cancerígeno, para resolver esse triste fato, busquei desenvolver uma biblioteca que cubra boa parte dessas necessidades, ou também, que ajude no marketing em cima da rede social, você pode conferi-lo clicando nesse link, lembrando que como quase tudo que desenvolvo, o código é livre, e disponível no GitHub.

https://uliana.tech/criando-bot-para-facebook

🕴🏽GitHub: https://github.com/JonasUliana
🕴🏽 DedSecSquad: https://www.facebook.com/DedsecSquad/
🕴🏽 @Phantasm_Lab
http://thehackernews.com/2017/08/hbo-hackers-game-of-thrones.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29

Hackers who recently hacked into HBO network and stole noscripts, shows, and employee information documents, have now provided an email in which the United States cable channel offered them $250,000.
The company offered the payment as a "bounty payment" reward in which companies reward white-hat hackers for discovering cyber security vulnerabilities in their computer networks.
Late last month, the HBO hackers claimed to have obtained around 1.5 terabytes of information from HBO and dropped upcoming episodes of "Ballers" and "Room 104," and a noscript of the fourth episode of "Game of Thrones."

🕴 @Phantasm_Lab
HACKING CON KALI LINUX 1: https://drive.google.com/file/d/0B9-SOas-c41Vcmo5b29hWWhWTUE/view?usp=drive_web
HACKING CON KALI 2.0: https://drive.google.com/file/d/0B9-SOas-c41VNEpZOFJ6OThCck0/view?usp=drive_web
HACKING CON FOCA: https://drive.google.com/file/d/0B9-SOas-c41VQ2E5WkstMko4X1U/view?usp=drive_web
Advanced Cross Site Scripting: https://drive.google.com/file/d/0B9-SOas-c41VZXkxQWpzQ2lMNGM/view?usp=drive_web
Analisis forense: https://drive.google.com/file/d/0B9-SOas-c41VX3RhZ2gzNzZ3Zzg/view?usp=drive_web
Ataques a BB.DD.: https://drive.google.com/file/d/0B9-SOas-c41VT0p1VS1NYUhGaFk/view?usp=drive_web
Complete Cross-site Scripting Walkthrough: https://drive.google.com/file/d/0B9-SOas-c41Vd2NuOXEtZ2dOSG8/view?usp=drive_web
Cracking sin secretos: https://drive.google.com/file/d/0B9-SOas-c41VaGx1ckRydW44XzA/view?usp=drive_web
Curso de nmap: https://drive.google.com/file/d/0B9-SOas-c41VQU5ZY1BhVkUxZVE/view?usp=drive_web
Deep web for hackers: https://drive.google.com/file/d/0B9-SOas-c41VWmNwME5IVktHQW8/view?usp=drive_web
El arte del engaño: https://drive.google.com/file/d/0B9-SOas-c41VakNnOXVFejRfaFE/view?usp=drive_web
El internet de las cosas: https://drive.google.com/file/d/0B9-SOas-c41VN0dwMEc4N25YMnM/view?usp=drive_web
Escaneos con snort: https://drive.google.com/file/d/0B9-SOas-c41VLTZuRVZjZ0tnZFE/view?usp=drive_web
Ethical hacking 2.0: https://drive.google.com/file/d/0B9-SOas-c41VZU5KNF9QdWNxX3M/view?usp=drive_web
Exiftool: https://drive.google.com/file/d/0B9-SOas-c41VbEZBNG15NE9paTQ/view?usp=drive_web
Hackers al descubierto: https://drive.google.com/file/d/0B9-SOas-c41VWi1xNXd5b0VCbnc/view?usp=drive_web
Hacking web tecnology: https://drive.google.com/file/d/0B9-SOas-c41VREU3dl9haWpRaVU/view?usp=drive_web
La biblia de footprinting: https://drive.google.com/file/d/0B9-SOas-c41VZWZhNWE3Q0wxdDg/view?usp=drive_web
Nessus: https://drive.google.com/file/d/0B9-SOas-c41VVF9pR0h5VnNhRVU/view?usp=drive_web
Ofensive security: https://drive.google.com/file/d/0B9-SOas-c41VUlROMUo2OUdyNGs/view?usp=drive_web
Sqlmap manual: https://drive.google.com/file/d/0B9-SOas-c41VVzFQemwxVTFJOE0/view?usp=drive_web
Sqlmap tutorial: https://drive.google.com/file/d/0B9-SOas-c41VTmJNdlROMzhvd1k/view?usp=drive_web
Tecnicas de sql injection: https://drive.google.com/file/d/0B9-SOas-c41Vd3BFTVZsRURmQjg/view?usp=drive_web
W3af user guide: https://drive.google.com/file/d/0B9-SOas-c41VSnZIM2trRlRDSTA/view?usp=drive_web
XSS a fondo: https://drive.google.com/file/d/0B9-SOas-c41VWHRaeFZGN09KTEU/view?usp=drive_web
XSS con javanoscript: https://drive.google.com/file/d/0B9-SOas-c41VaHpwc3dOVmI0MFE/view?usp=drive_web
XSS tunelling: https://drive.google.com/file/d/0B9-SOas-c41VeWs5bWRYM1kzckU/view?usp=drive_web
XSS hacking tutorial: https://drive.google.com/file/d/0B9-SOas-c41VdVBoMEpZa2RKR00/view?usp=drive_web
XSS street fight: https://drive.google.com/file/d/0B9-SOas-c41VMFh4Tl9EdjhqNlk/view?usp=drive_web
XSS atacks: https://drive.google.com/file/d/0B9-SOas-c41VOXpkUWFCcEdwaFU/view?usp=drive_web
XSS mas alla del alert(): https://drive.google.com/file/d/0B9-SOas-c41VdXFtUXdDd21zZEk/view?usp=drive_web

🕴🏽 @Noobguy24000
🕴🏽 @Phantasm_Lab
O Utilizador Usenet pagará 4,8 mil euros pelo download de conteúdo pirateado

A organização holandesa BREIN, que se envolve na luta contra a pirataria da Internet, forçou a rede Usenet a extraditar um usuário suspeito de pirataria.

Nos últimos anos, a BREIN desenvolveu uma vigorosa atividade na luta contra a pirataria na Internet. A organização caza ativamente os usuários de serviços de compartilhamento de arquivos, rastreadores de torrent, grupos especializados no Facebook, YouTube-piratas, e também para usuários do Usenet.
Conforme relatado pela publicação do Torrent Freak, a BREIN pediu a um dos provedores da Usenet, Eweka, que divulgue a identidade da pirataria de usuários suspeita. Alguém sob o pseudônimo de Badfan69 foi acusado de baixar 9538 direitos autorais de infração na rede. Eweka forneceu a organização anti-pirataria com o endereço de casa do suspeito, e os oficiais do BREIN o acusaram.

https://goo.gl/ZnNzt5

🕴🏽 @Phantasm_Lab
Hacking Tutorial from android.

Disclaimer:
I'm not responsible for any illegal work done by you.
My video is only for education purpose.

https://www.youtube.com/exploithub

🕴🏽 Group: https://goo.gl/cKp5NF
🕴🏽 @Phantasm_Lab
[+] Title: WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required)

Denoscription: WARNING:
This project is still under development and by installing the app may misconfigure the Wi-Fi settings of your Android OS, a system restore may be necessary to fix it.

[+] url: http://www.kitploit.com/2017/08/wifi-bruteforcer-android-application-to.html

🕴🏽 @Phantasm_Lab