Joomla Joomanager 2.0.0 Joomanager Arbitrary File Download Exploit
https://0daydb.com/exploit/16348
🕴 @Phantasm_Lab
https://0daydb.com/exploit/16348
🕴 @Phantasm_Lab
#Pentest #SANS #SecurityGuildes
SANS Security Guildes
https://www.sans.org/reading-room/whitepapers/testing/
🕴 @Phantasm_Lab
SANS Security Guildes
https://www.sans.org/reading-room/whitepapers/testing/
🕴 @Phantasm_Lab
www.sans.org
SANS Institute: Reading Room - Penetration Testing
Computer security training, certification and free resources. We specialize in computer/network security, digital forensics, application security and IT audit.
Forwarded from The Bug Bounty Hunter
How I gained access to Sony’s database
https://medium.com/bugbountywriteup/how-i-gained-access-to-sonys-database-f3ba08d0e035
https://medium.com/bugbountywriteup/how-i-gained-access-to-sonys-database-f3ba08d0e035
Medium
How I gained access to Sony’s database
This was a bug that I found back in 2017. This started when a friend of mine (a.k.a 1337) showed me a T-Shirt that he got from Sony . So I…
Forwarded from @Phantasm_Lab (Deleted Account)
Advanced Penetration Testing - Hacking the World's Most Secure Networks | PDF/EPUB | 6/6 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfMy05SjhEaWpGODQ
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Black Hat Python | PDF/EPUB | 3/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfbHY0dWVSVURMVE0
Defensive security handbook | PDF/EPUB/AZW3 | 29/27/4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfT1JBa1VFMFBnVDg
Ethical Hacking and Penetration Testing Guide | PDF | 22 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfQVUwczFMU2JMWGc
Hacking - The Art of Explotation | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXNUbl96ZEt3Mk0
Hash Crack - Password Cracking Manual | PDF/EPUB/AZW3 | 6/2/3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfZDV1V251UzVtMmc
Kali Linux Revealed - Mastering the Penetration Testing Distribution | PDF | 26 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfSGpUSWk0QVJTUVU
RTFM - Red Team Field Manual | PDF | 3 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfaFB5LVpsOGlMS00
The Hacker Playbook 2 - Practical Guide To Penetration Testing | PDF/EPUB/MOBI | 23/18/53 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
The Shellcoders's Handbook - Discovering and Exploiting Security Holes | PDF | 4 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfeXFvX1YzdG8zMVU
Violent Python - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers | PDF | 8 MB | https://drive.google.com/open?id=0B-OpLAp8EyTfNnYtUHQycGZwS28
Forwarded from Hacking Brasil (Ryoon Ivo)
No plano foi sugerido que a Agência de Segurança Nacional(NSA) realizasse ataques cibernéticos para neutralizar sites russos e o hacker Guccifer 2.0 que hackearia o email da sede da campanha de Hillary Clinton e do Comitê Nacional do Partido Democrata.
https://hackingbrasil.wordpress.com/2018/03/11/a-casa-branca-planejava-um-ataque-cibernetico-massivo-contra-a-russia/
https://hackingbrasil.wordpress.com/2018/03/11/a-casa-branca-planejava-um-ataque-cibernetico-massivo-contra-a-russia/
We are Zerodium
http://zerodium.com/
The premium acquisition program for zero-day exploits and advanced cybersecurity research.http://zerodium.com/
Zerodium
ZERODIUM - The Premium Exploit Acquisition Platform
ZERODIUM is the leading exploit acquisition platform for premium zero-days and advanced cybersecurity research. Our platform allows security researchers to sell their 0day (zero-day) exploits for the highest rewards.
Stored XSS when you read eamils. <style>
https://hackerone.com/reports/274844
🕴 @Phantasm_lab
Reported To: Mail.Ruhttps://hackerone.com/reports/274844
🕴 @Phantasm_lab
HackerOne
Mail.ru disclosed on HackerOne: Stored XSS when you read eamils....
XSS via crafted block style.
Demonstrated attack vector was eliminated on the date of reporintg, final solution changes parsing algorythm to eliminate similar attacks.
Demonstrated attack vector was eliminated on the date of reporintg, final solution changes parsing algorythm to eliminate similar attacks.
Instalando e configurando Freenet, Tor Browser e Retroshare no Arch linux
http://telegra.ph/Instalando-e-configurando-Freenet-Tor-Browser-e-Retroshare-no-Arch-linux-03-11
🕴 @Phantasm_lab
http://telegra.ph/Instalando-e-configurando-Freenet-Tor-Browser-e-Retroshare-no-Arch-linux-03-11
🕴 @Phantasm_lab
Telegraph
Instalando e configurando Freenet, Tor Browser e Retroshare no Arch linux
Vamos começar com a retroshare que é muito fácil de ser instalada.
Remote Code Execution (CVE-2018-5767) Walkthrough on Tenda AC15 Router
https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/
🕴 @Phantasm_Lab
https://www.fidusinfosec.com/remote-code-execution-cve-2018-5767/
🕴 @Phantasm_Lab
www.wavenet.co.uk
Fidus Information Security
2nd February 2023 - Wavenet announced the acquisition of Fidus Information Security Limited.
Shiva
https://github.com/UltimateHackers/Shiva
🕴 @Phantasm_Lab
First of all, put Shiva on watch. I will be upgrading it to a full stress testing suite over time. Shiva is designed to perform Denial Of Service (DOS) attack on wordpress sites by loading all jquery noscripts at once through load-noscripts.php. So basically its an exploit for CVE-2018-6389.https://github.com/UltimateHackers/Shiva
🕴 @Phantasm_Lab
GitHub
GitHub - s0md3v/Shiva: Improved DOS exploit for wordpress websites (CVE-2018-6389)
Improved DOS exploit for wordpress websites (CVE-2018-6389) - GitHub - s0md3v/Shiva: Improved DOS exploit for wordpress websites (CVE-2018-6389)
