HACKING CON KALI LINUX 1: https://drive.google.com/file/d/0B9-SOas-c41Vcmo5b29hWWhWTUE/view?usp=drive_web
HACKING CON KALI 2.0: https://drive.google.com/file/d/0B9-SOas-c41VNEpZOFJ6OThCck0/view?usp=drive_web
HACKING CON FOCA: https://drive.google.com/file/d/0B9-SOas-c41VQ2E5WkstMko4X1U/view?usp=drive_web
Advanced Cross Site Scripting: https://drive.google.com/file/d/0B9-SOas-c41VZXkxQWpzQ2lMNGM/view?usp=drive_web
Analisis forense: https://drive.google.com/file/d/0B9-SOas-c41VX3RhZ2gzNzZ3Zzg/view?usp=drive_web
Ataques a BB.DD.: https://drive.google.com/file/d/0B9-SOas-c41VT0p1VS1NYUhGaFk/view?usp=drive_web
Complete Cross-site Scripting Walkthrough: https://drive.google.com/file/d/0B9-SOas-c41Vd2NuOXEtZ2dOSG8/view?usp=drive_web
Cracking sin secretos: https://drive.google.com/file/d/0B9-SOas-c41VaGx1ckRydW44XzA/view?usp=drive_web
Curso de nmap: https://drive.google.com/file/d/0B9-SOas-c41VQU5ZY1BhVkUxZVE/view?usp=drive_web
Deep web for hackers: https://drive.google.com/file/d/0B9-SOas-c41VWmNwME5IVktHQW8/view?usp=drive_web
El arte del engaño: https://drive.google.com/file/d/0B9-SOas-c41VakNnOXVFejRfaFE/view?usp=drive_web
El internet de las cosas: https://drive.google.com/file/d/0B9-SOas-c41VN0dwMEc4N25YMnM/view?usp=drive_web
Escaneos con snort: https://drive.google.com/file/d/0B9-SOas-c41VLTZuRVZjZ0tnZFE/view?usp=drive_web
Ethical hacking 2.0: https://drive.google.com/file/d/0B9-SOas-c41VZU5KNF9QdWNxX3M/view?usp=drive_web
Exiftool: https://drive.google.com/file/d/0B9-SOas-c41VbEZBNG15NE9paTQ/view?usp=drive_web
Hackers al descubierto: https://drive.google.com/file/d/0B9-SOas-c41VWi1xNXd5b0VCbnc/view?usp=drive_web
Hacking web tecnology: https://drive.google.com/file/d/0B9-SOas-c41VREU3dl9haWpRaVU/view?usp=drive_web
La biblia de footprinting: https://drive.google.com/file/d/0B9-SOas-c41VZWZhNWE3Q0wxdDg/view?usp=drive_web
Nessus: https://drive.google.com/file/d/0B9-SOas-c41VVF9pR0h5VnNhRVU/view?usp=drive_web
Ofensive security: https://drive.google.com/file/d/0B9-SOas-c41VUlROMUo2OUdyNGs/view?usp=drive_web
Sqlmap manual: https://drive.google.com/file/d/0B9-SOas-c41VVzFQemwxVTFJOE0/view?usp=drive_web
Sqlmap tutorial: https://drive.google.com/file/d/0B9-SOas-c41VTmJNdlROMzhvd1k/view?usp=drive_web
Tecnicas de sql injection: https://drive.google.com/file/d/0B9-SOas-c41Vd3BFTVZsRURmQjg/view?usp=drive_web
W3af user guide: https://drive.google.com/file/d/0B9-SOas-c41VSnZIM2trRlRDSTA/view?usp=drive_web
XSS a fondo: https://drive.google.com/file/d/0B9-SOas-c41VWHRaeFZGN09KTEU/view?usp=drive_web
XSS con javanoscript: https://drive.google.com/file/d/0B9-SOas-c41VaHpwc3dOVmI0MFE/view?usp=drive_web
XSS tunelling: https://drive.google.com/file/d/0B9-SOas-c41VeWs5bWRYM1kzckU/view?usp=drive_web
XSS hacking tutorial: https://drive.google.com/file/d/0B9-SOas-c41VdVBoMEpZa2RKR00/view?usp=drive_web
XSS street fight: https://drive.google.com/file/d/0B9-SOas-c41VMFh4Tl9EdjhqNlk/view?usp=drive_web
XSS atacks: https://drive.google.com/file/d/0B9-SOas-c41VOXpkUWFCcEdwaFU/view?usp=drive_web
XSS mas alla del alert(): https://drive.google.com/file/d/0B9-SOas-c41VdXFtUXdDd21zZEk/view?usp=drive_web
🕴🏽 @Noobguy24000
🕴🏽 @Phantasm_Lab
HACKING CON KALI 2.0: https://drive.google.com/file/d/0B9-SOas-c41VNEpZOFJ6OThCck0/view?usp=drive_web
HACKING CON FOCA: https://drive.google.com/file/d/0B9-SOas-c41VQ2E5WkstMko4X1U/view?usp=drive_web
Advanced Cross Site Scripting: https://drive.google.com/file/d/0B9-SOas-c41VZXkxQWpzQ2lMNGM/view?usp=drive_web
Analisis forense: https://drive.google.com/file/d/0B9-SOas-c41VX3RhZ2gzNzZ3Zzg/view?usp=drive_web
Ataques a BB.DD.: https://drive.google.com/file/d/0B9-SOas-c41VT0p1VS1NYUhGaFk/view?usp=drive_web
Complete Cross-site Scripting Walkthrough: https://drive.google.com/file/d/0B9-SOas-c41Vd2NuOXEtZ2dOSG8/view?usp=drive_web
Cracking sin secretos: https://drive.google.com/file/d/0B9-SOas-c41VaGx1ckRydW44XzA/view?usp=drive_web
Curso de nmap: https://drive.google.com/file/d/0B9-SOas-c41VQU5ZY1BhVkUxZVE/view?usp=drive_web
Deep web for hackers: https://drive.google.com/file/d/0B9-SOas-c41VWmNwME5IVktHQW8/view?usp=drive_web
El arte del engaño: https://drive.google.com/file/d/0B9-SOas-c41VakNnOXVFejRfaFE/view?usp=drive_web
El internet de las cosas: https://drive.google.com/file/d/0B9-SOas-c41VN0dwMEc4N25YMnM/view?usp=drive_web
Escaneos con snort: https://drive.google.com/file/d/0B9-SOas-c41VLTZuRVZjZ0tnZFE/view?usp=drive_web
Ethical hacking 2.0: https://drive.google.com/file/d/0B9-SOas-c41VZU5KNF9QdWNxX3M/view?usp=drive_web
Exiftool: https://drive.google.com/file/d/0B9-SOas-c41VbEZBNG15NE9paTQ/view?usp=drive_web
Hackers al descubierto: https://drive.google.com/file/d/0B9-SOas-c41VWi1xNXd5b0VCbnc/view?usp=drive_web
Hacking web tecnology: https://drive.google.com/file/d/0B9-SOas-c41VREU3dl9haWpRaVU/view?usp=drive_web
La biblia de footprinting: https://drive.google.com/file/d/0B9-SOas-c41VZWZhNWE3Q0wxdDg/view?usp=drive_web
Nessus: https://drive.google.com/file/d/0B9-SOas-c41VVF9pR0h5VnNhRVU/view?usp=drive_web
Ofensive security: https://drive.google.com/file/d/0B9-SOas-c41VUlROMUo2OUdyNGs/view?usp=drive_web
Sqlmap manual: https://drive.google.com/file/d/0B9-SOas-c41VVzFQemwxVTFJOE0/view?usp=drive_web
Sqlmap tutorial: https://drive.google.com/file/d/0B9-SOas-c41VTmJNdlROMzhvd1k/view?usp=drive_web
Tecnicas de sql injection: https://drive.google.com/file/d/0B9-SOas-c41Vd3BFTVZsRURmQjg/view?usp=drive_web
W3af user guide: https://drive.google.com/file/d/0B9-SOas-c41VSnZIM2trRlRDSTA/view?usp=drive_web
XSS a fondo: https://drive.google.com/file/d/0B9-SOas-c41VWHRaeFZGN09KTEU/view?usp=drive_web
XSS con javanoscript: https://drive.google.com/file/d/0B9-SOas-c41VaHpwc3dOVmI0MFE/view?usp=drive_web
XSS tunelling: https://drive.google.com/file/d/0B9-SOas-c41VeWs5bWRYM1kzckU/view?usp=drive_web
XSS hacking tutorial: https://drive.google.com/file/d/0B9-SOas-c41VdVBoMEpZa2RKR00/view?usp=drive_web
XSS street fight: https://drive.google.com/file/d/0B9-SOas-c41VMFh4Tl9EdjhqNlk/view?usp=drive_web
XSS atacks: https://drive.google.com/file/d/0B9-SOas-c41VOXpkUWFCcEdwaFU/view?usp=drive_web
XSS mas alla del alert(): https://drive.google.com/file/d/0B9-SOas-c41VdXFtUXdDd21zZEk/view?usp=drive_web
🕴🏽 @Noobguy24000
🕴🏽 @Phantasm_Lab
O Utilizador Usenet pagará 4,8 mil euros pelo download de conteúdo pirateado
A organização holandesa BREIN, que se envolve na luta contra a pirataria da Internet, forçou a rede Usenet a extraditar um usuário suspeito de pirataria.
Nos últimos anos, a BREIN desenvolveu uma vigorosa atividade na luta contra a pirataria na Internet. A organização caza ativamente os usuários de serviços de compartilhamento de arquivos, rastreadores de torrent, grupos especializados no Facebook, YouTube-piratas, e também para usuários do Usenet.
Conforme relatado pela publicação do Torrent Freak, a BREIN pediu a um dos provedores da Usenet, Eweka, que divulgue a identidade da pirataria de usuários suspeita. Alguém sob o pseudônimo de Badfan69 foi acusado de baixar 9538 direitos autorais de infração na rede. Eweka forneceu a organização anti-pirataria com o endereço de casa do suspeito, e os oficiais do BREIN o acusaram.
https://goo.gl/ZnNzt5
🕴🏽 @Phantasm_Lab
A organização holandesa BREIN, que se envolve na luta contra a pirataria da Internet, forçou a rede Usenet a extraditar um usuário suspeito de pirataria.
Nos últimos anos, a BREIN desenvolveu uma vigorosa atividade na luta contra a pirataria na Internet. A organização caza ativamente os usuários de serviços de compartilhamento de arquivos, rastreadores de torrent, grupos especializados no Facebook, YouTube-piratas, e também para usuários do Usenet.
Conforme relatado pela publicação do Torrent Freak, a BREIN pediu a um dos provedores da Usenet, Eweka, que divulgue a identidade da pirataria de usuários suspeita. Alguém sob o pseudônimo de Badfan69 foi acusado de baixar 9538 direitos autorais de infração na rede. Eweka forneceu a organização anti-pirataria com o endereço de casa do suspeito, e os oficiais do BREIN o acusaram.
https://goo.gl/ZnNzt5
🕴🏽 @Phantasm_Lab
www.securitylab.ru
Пользователь Usenet выплатит 4,8 тыс. евро за загрузку пиратского контента
Суд в Нидерландах обязал провайдера выдать персональные данные пользователя.
Hacking Tutorial from android.
Disclaimer:
I'm not responsible for any illegal work done by you.
My video is only for education purpose.
https://www.youtube.com/exploithub
🕴🏽 Group: https://goo.gl/cKp5NF
🕴🏽 @Phantasm_Lab
Disclaimer:
I'm not responsible for any illegal work done by you.
My video is only for education purpose.
https://www.youtube.com/exploithub
🕴🏽 Group: https://goo.gl/cKp5NF
🕴🏽 @Phantasm_Lab
[+] Title: WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required)
Denoscription: WARNING:
This project is still under development and by installing the app may misconfigure the Wi-Fi settings of your Android OS, a system restore may be necessary to fix it.
[+] url: http://www.kitploit.com/2017/08/wifi-bruteforcer-android-application-to.html
🕴🏽 @Phantasm_Lab
Denoscription: WARNING:
This project is still under development and by installing the app may misconfigure the Wi-Fi settings of your Android OS, a system restore may be necessary to fix it.
[+] url: http://www.kitploit.com/2017/08/wifi-bruteforcer-android-application-to.html
🕴🏽 @Phantasm_Lab
KitPloit - PenTest & Hacking Tools
WiFi Bruteforcer - Android application to brute force WiFi passwords (No Root Required)
https://actualidad.rt.com/actualidad/246963-pionyang-posible-prueba-misiles-guam?utm_source=browser&utm_medium=aplication_chrome&utm_campaign=chrome
🕴🏽 @andreaspires
🕴🏽 @Phantasm_Lab
🕴🏽 @andreaspires
🕴🏽 @Phantasm_Lab
RT en Español
El Ejército norcoreano informa a Kim Jong-un sobre planes de lanzar misiles hacia la isla de Guam
Según la televisión estatal de Corea del Norte, el líder de ese país ha instruido al Ejército a mantenerse "en todo momento" listo para atacar.
Forwarded from Central de Redes Vault 🔐
Grupo para todos os tipos de Jogadores.
Jogadores Casuais,Amadores,Pro.
MOBA/RPG/MMORPG/FPS/INDIE/MOBILE/RTS/ETC
Windows/Linux
A Taverna
https://news.1rj.ru/str/ATaverna
Jogadores Casuais,Amadores,Pro.
MOBA/RPG/MMORPG/FPS/INDIE/MOBILE/RTS/ETC
Windows/Linux
A Taverna
https://news.1rj.ru/str/ATaverna
[+] Title: Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector
Denoscription: Phishery is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic Authentication. Phishery also provides the ability easily to inject the URL into a .docx Word document.
The power of phishery is best demonstrated by setting a Word document's template to a phishery URL. This causes Microsoft Word to make a request to the URL, resulting in an Authentication Dialog being shown to the end-user. The ability to inject any .docx file with a URL is possible using phishery's
[+] url: http://www.kitploit.com/2017/08/phishery-ssl-enabled-basic-auth.html
🕴🏽 @Phantasm_Lab
Denoscription: Phishery is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic Authentication. Phishery also provides the ability easily to inject the URL into a .docx Word document.
The power of phishery is best demonstrated by setting a Word document's template to a phishery URL. This causes Microsoft Word to make a request to the URL, resulting in an Authentication Dialog being shown to the end-user. The ability to inject any .docx file with a URL is possible using phishery's
[+] url: http://www.kitploit.com/2017/08/phishery-ssl-enabled-basic-auth.html
🕴🏽 @Phantasm_Lab
KitPloit - PenTest Tools for your Security Arsenal ☣
Phishery - An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector
Phishery is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic Authentication. Phishery also pr...
Uma tarde no porão secreto de hackers em São Paulo!
"Queremos mostrar que São Paulo tem uma cena hacker", contou um dos organizadores, antes de emendar que ali ninguém é santo, embora existam os limites éticos. "E também, tá todo mundo envelhecendo, criando família, se distanciando, então é uma boa oportunidade de reencontrar", disse.
https://motherboard.vice.com/pt_br/article/9kw5za/uma-tarde-no-porao-secreto-de-hackers-em-sao-paulo
🕴🏽 @Phantasm_Lab
"Queremos mostrar que São Paulo tem uma cena hacker", contou um dos organizadores, antes de emendar que ali ninguém é santo, embora existam os limites éticos. "E também, tá todo mundo envelhecendo, criando família, se distanciando, então é uma boa oportunidade de reencontrar", disse.
https://motherboard.vice.com/pt_br/article/9kw5za/uma-tarde-no-porao-secreto-de-hackers-em-sao-paulo
🕴🏽 @Phantasm_Lab
Motherboard
Uma tarde no porão secreto de hackers em São Paulo
Escondidos em meio ao caos do centro paulistano, hackers da velha guarda se uniram para beber, revelar segredos e esquematizar umas maldadezinhas.
Forwarded from HD/HD
Как часто Вы сталкивались с тем, что одни люди добиваются успеха и нравятся всем вокруг, а другие
остаются неудачниками до конца жизни? Ваш успех напрямую зависит не только от того, ЧТО Вы делаете,
но и от того, КАК.
Однако, мало кто задумывается, что основой любой деятельности является
простая человеческая психология. Изучив принципы работы психики и освоив управление ею,
Вы сможете не только обезопасить себя от примитивных манипуляций, но и повысить собственную эффективность.
Подписавшись на @darkeffects, Вы получаете информацию о том, как настроить себя на правильную волну, управляя собственным поведением, учитесь влиять на окружающих и защищать себя от чужих манипуляций.
Там собраны разнообразные статьи о поведении успешного человека и правильном взаимодействии с окружающими.
Подпишись - https://news.1rj.ru/str/darkeffects
остаются неудачниками до конца жизни? Ваш успех напрямую зависит не только от того, ЧТО Вы делаете,
но и от того, КАК.
Однако, мало кто задумывается, что основой любой деятельности является
простая человеческая психология. Изучив принципы работы психики и освоив управление ею,
Вы сможете не только обезопасить себя от примитивных манипуляций, но и повысить собственную эффективность.
Подписавшись на @darkeffects, Вы получаете информацию о том, как настроить себя на правильную волну, управляя собственным поведением, учитесь влиять на окружающих и защищать себя от чужих манипуляций.
Там собраны разнообразные статьи о поведении успешного человека и правильном взаимодействии с окружающими.
Подпишись - https://news.1rj.ru/str/darkeffects
[+] Title: Microsoft Office OneNote 2007 DLL Hijacking
EDB-ID: 42333
Author:
Published: 2017-07-18
CVE:
Type:
Platform:
Vulnerable App: N/A
[+] Exploit: http://exploit.kitploit.com/2017/04/microsoft-office-onenote-2007-dll.html
🕴🏽 @Phantasm_Lab
EDB-ID: 42333
Author:
Published: 2017-07-18
CVE:
Type:
Platform:
Vulnerable App: N/A
[+] Exploit: http://exploit.kitploit.com/2017/04/microsoft-office-onenote-2007-dll.html
🕴🏽 @Phantasm_Lab
Kitploit
Microsoft Office OneNote 2007 DLL Hijacking
Exploit Collector is the ultimate collection of public exploits and exploitable vulnerabilities. Remote/Local Exploits, Shellcode and 0days.