@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Shiva

First of all, put Shiva on watch. I will be upgrading it to a full stress testing suite over time. Shiva is designed to perform Denial Of Service (DOS) attack on wordpress sites by loading all jquery noscripts at once through load-noscripts.php. So basically its an exploit for CVE-2018-6389.

https://github.com/UltimateHackers/Shiva

🕴 @Phantasm_Lab
Forwarded from DARKNET BR
📚 #Ebook | #Hacking
🔖 Stealing the Network ~ How to Own a Shadow
📄 450

© ÐᗩᖇḰᘉᕮƬ ᙖᖇ
Forwarded from DARKNET BR
A série Stealing the Network, mais vendida , chega a suas conclusões climáticas, uma vez que a aplicação da lei e o crime organizado formam uma rede de alta tecnologia na tentativa de derrubar o maldito hacker-vilão conhecido como Knuth no livro Stealing ainda mais tecnicamente sofisticado
Forwarded from DARKNET BR
Stealing the Network How to Own a Shadow.pdf
9.1 MB
Forwarded from @Phantasm_Lab ([L]uŧh1er)
#Documentario #CyberCrime #Hackerville

Assista o documentário sobre cibercrime que apresenta a cidade romena chamada “Hackerville” ou a “Cidade mais perigosa da Internet”. Hackers blackhat condenados, como Guccifer (nome real), falam sobre worms, vírus, engenharia social, roubo de identidade e até sobre invadir o e-mail de Hillary Clinton.

https://m.youtube.com/watch?v=mJ0bN6Nq0PE

🕴 @Phantasm_Lab
Red Team Infrastructure Wiki

This wiki is intended to provide a resource for setting up a resilient Red Team infrastructure. It was made to complement Steve Borosh (@424f424f) and Jeff Dimmock's (@bluscreenofjeff) BSides NoVa 2017 talk "Doomsday Preppers: Fortifying Your Red Team Infrastructure"

https://github.com/bluscreenofjeff/Red-Team-Infrastructure-Wiki

🕴 @Phantasm_Lab
RDP hijacking — how to hijack RDS and RemoteApp sessions transparently to move through an organisation

How you can very easily use Remote Desktop Services to gain lateral movement through a network, using no external software — and how to defend against it.

https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6

🕴 @Phantasm_Lab
Forwarded from Hunter X Hunter
#Cybary #Advanced #Pentesting

Cybary - Advanced Penetration Testing

This course covers how to attack from the web using cross-site noscripting, SQL injection attacks, remote and local file inclusion and how to understand the defender of the network you’re breaking into to. You’ll also learn tricks for exploiting a network.

https://www.cybrary.it/course/advanced-penetration-testing/
Forwarded from SHELL SHOCK
Forwarded from SHELL SHOCK
securing-node-applications.pdf
5.3 MB
Forwarded from T.I. da Depressão (Nerd Codefail🐧)
Gambiarras + gambiarras
Why is Hong Kong the Perfect Setting for Cyberpunk?

Hong Kong is the most cyberpunk place in the world. Hong Kong has been featured in the most popular and influential Cyberpunk films. In this video I discussed why Hong Kong is such a preferred destination fro cyberpunk filmmakers.

https://www.youtube.com/watch?v=G93eQ9HXNdg

🕴 @Phantasm_Lab