@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Forwarded from Hacking Brasil (Ryoon Ivo)
No plano foi sugerido que a Agência de Segurança Nacional(NSA) realizasse ataques cibernéticos para neutralizar sites russos e o hacker Guccifer 2.0 que hackearia o email da sede da campanha de Hillary Clinton e do Comitê Nacional do Partido Democrata.

https://hackingbrasil.wordpress.com/2018/03/11/a-casa-branca-planejava-um-ataque-cibernetico-massivo-contra-a-russia/
Shiva

First of all, put Shiva on watch. I will be upgrading it to a full stress testing suite over time. Shiva is designed to perform Denial Of Service (DOS) attack on wordpress sites by loading all jquery noscripts at once through load-noscripts.php. So basically its an exploit for CVE-2018-6389.

https://github.com/UltimateHackers/Shiva

🕴 @Phantasm_Lab
Forwarded from DARKNET BR
📚 #Ebook | #Hacking
🔖 Stealing the Network ~ How to Own a Shadow
📄 450

© ÐᗩᖇḰᘉᕮƬ ᙖᖇ
Forwarded from DARKNET BR
A série Stealing the Network, mais vendida , chega a suas conclusões climáticas, uma vez que a aplicação da lei e o crime organizado formam uma rede de alta tecnologia na tentativa de derrubar o maldito hacker-vilão conhecido como Knuth no livro Stealing ainda mais tecnicamente sofisticado
Forwarded from DARKNET BR
Stealing the Network How to Own a Shadow.pdf
9.1 MB
Forwarded from @Phantasm_Lab ([L]uŧh1er)
#Documentario #CyberCrime #Hackerville

Assista o documentário sobre cibercrime que apresenta a cidade romena chamada “Hackerville” ou a “Cidade mais perigosa da Internet”. Hackers blackhat condenados, como Guccifer (nome real), falam sobre worms, vírus, engenharia social, roubo de identidade e até sobre invadir o e-mail de Hillary Clinton.

https://m.youtube.com/watch?v=mJ0bN6Nq0PE

🕴 @Phantasm_Lab
Red Team Infrastructure Wiki

This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh (@424f424f) and Jeff Dimmock's (@bluscreenofjeff) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure"

https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki

🕴 @Phantasm_Lab
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software — and how to defend against it.

https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6

🕴 @Phantasm_Lab
Forwarded from Hunter X Hunter
#Cybary #Advanced #Pentesting

Cybary - Advanced Penetration Testing

This course covers how to attack from the web using cross-site noscripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you’re breaking into to. You’ll also learn tricks for exploiting a network.

https://www.cybrary.it/course/advanced-penetration-testing/