Tranqueiras hackers, oldschool e etc. Nostalgia e aprendizado para Criptoanarquista e Cypherpunks de plantão. ^_^
https://news.1rj.ru/str/oldschool_br
🕴 @Phantasm_Lab
https://news.1rj.ru/str/oldschool_br
🕴 @Phantasm_Lab
Telegram
OldSchool
Tranqueiras hackers, oldschool e etc. Nostalgia e aprendizado para Criptoanarquista e Cypherpunks de plantão. ^_^v
Record and share your terminal sessions, the right way.
asciinema [as-kee-nuh-muh] is a free and open source solution for recording terminal sessions and sharing them on the web. Read about how it works.
https://asciinema.org
🕴 @Phantasm_Lab
asciinema [as-kee-nuh-muh] is a free and open source solution for recording terminal sessions and sharing them on the web. Read about how it works.
https://asciinema.org
🕴 @Phantasm_Lab
CEO do Telegram efetivamente proibido de ir ao irã.
https://portaltelezap.com.br/ceo-telegram-efetivamente-proibido-de-ir-ao-ira/
🕴 @Phantasm_Lab
https://portaltelezap.com.br/ceo-telegram-efetivamente-proibido-de-ir-ao-ira/
🕴 @Phantasm_Lab
Portal Telezap
CEO do Telegram efetivamente proibido de ir ao Irã. - Portal Telezap
O CEO da Telegram, Pavel Durov, foi efetivamente proibido de viajar para o Irã. O Sr. Durov anunciou a notícia através de seu Telegram Channel, dizendo que o promotor de Teerã acaba de apresentar acusações criminais contra ele lá. O Irã é um lugar popular…
🏴 Segue a primeira parte do meu presente pelo aniversário da organização, uma lista de bons 11 livros relacionados ao hacking e a segurança da informação. Enjoy! 😉
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
#InfoSec #CyberSecurity
Mobile Application Reverse Engineering: MARA
https://n0where.net/mobile-application-reverse-engineering-mara/
🕴 @Phantasm_Lab
Mobile Application Reverse Engineering: MARA
https://n0where.net/mobile-application-reverse-engineering-mara/
🕴 @Phantasm_Lab
CyberPunk
Mobile Application Reverse Engineering: MARA
Mobile Application Reverse engineering and Analysis Framework MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering tools, in order to make the task…
Forwarded from André Santos
Repassando:
Quem tiver interesse vaga pra Desenvolvedor Junior PHP e que conheça Laravel Framework.
PJ
Remoto
Manda mensagem no pvt.
Quem tiver interesse vaga pra Desenvolvedor Junior PHP e que conheça Laravel Framework.
PJ
Remoto
Manda mensagem no pvt.
Aldous Huxley (1894 — 1963) foi um escritor inglês e um dos mais proeminentes membros da família Huxley. Passou parte da sua vida nos Estados Unidos, e viveu em Los Angeles de 1937 até à sua morte, em 1963. Huxley produziu um total de 47 livros ao longo de sua vida entre os quais está o famoso "Brave New World" "Admirável Novo Mundo".https://www.youtube.com/watch?v=Tg4vZrv_cRI&t=1681
🕴 @Phantasm_Lab
YouTube
Aldous Huxley em entrevista (Legendado)
Mike Wallace entrevista Aldous Huxley - Legendado - Completo Entrevista 18 de maio de 1958 Aldous Huxley (1894 — 1963) foi um escritor inglês e um dos mais p...
Uma sociedade inteiramente organizada segundo princípios científicos, na qual a mera menção das antiquadas palavras “pai” e “mãe” produzem repugnância. Um mundo de pessoas programadas em laboratório, e adestradas para cumprir seu papel numa sociedade de castas biologicamente definidas já no nascimento. Um mundo no qual a literatura, a música e o cinema só têm a função de solidificar o espírito de conformismo. Um universo que louva o avanço da técnica, a linha de montagem, a produção em série, a uniformidade, e que idolatra Henry Ford. Essa é a visão desenvolvida no clarividente romance distópico de Aldous Huxley, que ao lado de 1984, de George Orwell, constituem os exemplos mais marcantes, na esfera literária, da tematização de estados autoritários.https://www.youtube.com/watch?v=GZdfaahl0U4
🕴 @Phantasm_Lab
YouTube
AUDIOLIVRO - Aldous Huxley - Admirável Mundo Novo
Uma sociedade inteiramente organizada segundo princípios científicos, na qual a mera menção das antiquadas palavras “pai” e “mãe” produzem repugnância. Um mu...
#LinguagemCorporal #PNL #Biggs
[+] Linguagem Corporal da Sedução 1 - Fazendo Contato
https://www.youtube.com/watch?v=7ruGZzkmL68
🕴🏽 @phantasm_lab
[+] Linguagem Corporal da Sedução 1 - Fazendo Contato
https://www.youtube.com/watch?v=7ruGZzkmL68
🕴🏽 @phantasm_lab
YouTube
Linguagem Corporal da Sedução 1 - Fazendo Contato
Sedução não é apenas conseguir o número do celular de alguém, ou conseguir dar um beijo em outra pessoa, muito mais que isso, sedução é a capacidade de influenciar o comportamento de alguém.
VÍDEOS UTILIZADOS COMO EXEMPLO;
That Was Epic: https://youtu.be/XuaC3dXayAs…
VÍDEOS UTILIZADOS COMO EXEMPLO;
That Was Epic: https://youtu.be/XuaC3dXayAs…
Forwarded from @Phantasm_Lab ( .D rahtleN)
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
The United States has reportedly been engaged in offensive cyberattacks against North Korea, but with no destructive results. According to a report by the Washington Post, President Donald Trump signed a directive earlier this year of putting pressure against North Korea that involved several diplomatic and cyber-military actions, including using cyber activities against the country.
http://wccftech.com/cyberwarfare-us-ddos-north-korea/
🕴 @Phantasm_Lab
http://wccftech.com/cyberwarfare-us-ddos-north-korea/
🕴 @Phantasm_Lab
Wccftech
Cyberwarfare: US Launched DDoS Attacks Against North Korean Spy Agency
US launched non-destructive cyberattacks against North Korea, but hopes it would be taken as a warning and not as a military action.
[+] Portuguese;
[+] English;
https://youtu.be/0bzh4KeLggQ
🕴 @Phantasm_Lab
Brute Force no sistema de logins da Centauro, demonstração de como fazer requisições avançadas com python, 4 Fun :D[+] English;
Brute Force into the Centauro logins system, demonstrating how to make advanced requests with python, 4Fun :Dhttps://youtu.be/0bzh4KeLggQ
🕴 @Phantasm_Lab
http://www.cbsi.net.br/2017/10/profissional-de-ti-erra-noscript-e-apaga-16-mil-processos-do-banco-de-dados-doTCE-AM.html?m=1
🕴 @RajaBR
🕴 @Phantasm_Lab
🕴 @RajaBR
🕴 @Phantasm_Lab
CBSI | SISTEMAS DE INFORMAÇÃO.
Comando sem checagem afeta servidor e apaga 16,5 mil processos do TCE-AM
Os processos eletrônicos do Tribunal de Contas do Estado do Amazonas (TCE-AM) afetados pela pane nos sistemas e-Contas e Spede (Sistema de Processos e Documentos Eletrônicos)
Forwarded from Libros y Revistas Seginfo
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Libros y Revistas Seginfo
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Libros y Revistas Seginfo
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from @Phantasm_Lab ([L]uŧh1er | #PL )
[+] Portuguese;
[+] English;
https://youtu.be/0bzh4KeLggQ
🕴 @Phantasm_Lab
Brute Force no sistema de logins da Centauro, demonstração de como fazer requisições avançadas com python, 4 Fun :D[+] English;
Brute Force into the Centauro logins system, demonstrating how to make advanced requests with python, 4Fun :Dhttps://youtu.be/0bzh4KeLggQ
🕴 @Phantasm_Lab