CISCO CCNP Security 300-209
https://mega.nz/#F!YvhFSLBA!9CrIZgGt9PBYYeKq3fN3Sw
🕴 @Phantasm_lab
🕴 Carlos (Vision)
https://mega.nz/#F!YvhFSLBA!9CrIZgGt9PBYYeKq3fN3Sw
🕴 @Phantasm_lab
🕴 Carlos (Vision)
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Forwarded from RedBird | #CiberSeguridad #OSINT (GhostHellBlaz3r)
Así es GandCrab, el nuevo ransomware que tiene características nunca vistas.
https://www.redeszone.net/2018/01/30/gandcrab-ransomware-caracteristicas-nunca-vistas/amp/
https://www.redeszone.net/2018/01/30/gandcrab-ransomware-caracteristicas-nunca-vistas/amp/
RedesZone
GandCrab, el nuevo ransomware que tiene características nunca vistas
GandCrab es un nuevo ransomware, uno más de los muchos que hay, que tiene características jamás vistas hasta ahora en otros.
Forwarded from burpsuite (not official)
Holy shit!!!
https://0x00sec.org/t/malware-reversing-burpsuite-keygen/5167
Pls, don't use burpsuite loader 1.7.31 on Windows machines
https://0x00sec.org/t/malware-reversing-burpsuite-keygen/5167
Pls, don't use burpsuite loader 1.7.31 on Windows machines
0x00sec - The Home of the Hacker
Malware Reversing - Burpsuite Keygen
DISCLAIMER: The following post contains a virus sample. If you decide to mess with it you do so at your own risk. Do not go running it on your computer, at least use a VM. Some random new “user” called @the_heat_man posted some files on the forums multiple…
Forwarded from @Phantasm_Lab (Deleted Account)
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Forwarded from ؘ.
Te liga nesse meetup sobre segurança da informação que vai rolar no dia 06 na Moip em SP:
Call4Papaers aberto: http://bit.ly/call4papers-nerdzao24-seguranca
Neste encontro PRESENCIAL e GRATUITO será apresentado algumas técnicas e ferramentas que são utilizadas por profissionais da área da segurança da informação durante a realização de seus trabalhos.
https://www.meetup.com/pt-BR/Nerdzao/events/247157744/
Call4Papaers aberto: http://bit.ly/call4papers-nerdzao24-seguranca
Neste encontro PRESENCIAL e GRATUITO será apresentado algumas técnicas e ferramentas que são utilizadas por profissionais da área da segurança da informação durante a realização de seus trabalhos.
https://www.meetup.com/pt-BR/Nerdzao/events/247157744/
Google Docs
Call4Papers Nerdzao #24 - Segurança da Informação - 06/02/2018
Todas as palestras terão 30 minutos de duração
Preencha todos os campos obrigatórios
Cadastre um email que seja de uso diário,
pois a confirmação da palestra será feita através dele
O evento ocorrerá em 06/02/2018 das 19:00 às 22:30
Preencha todos os campos obrigatórios
Cadastre um email que seja de uso diário,
pois a confirmação da palestra será feita através dele
O evento ocorrerá em 06/02/2018 das 19:00 às 22:30
Forwarded from HackerSec - Canal
LANÇAMENTO OFICIAL DE NOSSO PRIMEIRO CURSO GRATUITO!
https://hackersec.com/treinamentos-para-voce/curso-de-linux-gratis/
https://hackersec.com/treinamentos-para-voce/curso-de-linux-gratis/
Forwarded from The Bug Bounty Hunter
Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART 2)
https://medium.com/@mohdaltaf163/hunting-insecure-direct-object-reference-vulnerabilities-for-fun-and-profit-part-2-af832d1c0bb6
https://medium.com/@mohdaltaf163/hunting-insecure-direct-object-reference-vulnerabilities-for-fun-and-profit-part-2-af832d1c0bb6
Medium
Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART 2)
In this blog i have added all endpoints on which you can look for IDOR vulnerabilities. For Part 1 you can visit this Link
Forwarded from The Bug Bounty Hunter
Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART 1)
https://medium.com/@mohdaltaf163/hunting-insecure-direct-object-reference-vulnerabilities-for-fun-and-profit-part-1-f338c6a52782
https://medium.com/@mohdaltaf163/hunting-insecure-direct-object-reference-vulnerabilities-for-fun-and-profit-part-1-f338c6a52782
Medium
Hunting Insecure Direct Object Reference Vulnerabilities for Fun and Profit (PART-1)
Hello Guys!!
Forwarded from DARKNET BR
🗂 #Artigo | #DarkNet | #BlackMarket
〰〰〰〰〰〰〰〰〰〰
http://telegra.ph/Servi%C3%A7os-de-entrega-e-postal-an%C3%B4nimos---Poderia-funcionar-02-05
〰〰〰〰〰〰〰〰〰〰
http://telegra.ph/Servi%C3%A7os-de-entrega-e-postal-an%C3%B4nimos---Poderia-funcionar-02-05
Telegraph
Serviços de entrega e postal anônimos - Poderia funcionar?
Com o uso de Darknet Market crescendo, há uma quantidade crescente de entregas sendo apreendidas. Existe potencial para um serviço postal anônimo em que as ordens são entregues sob o radar, ou simplesmente não é possível? A web profunda é freqüentemente usada…