Guardians Of The New World
https://www.youtube.com/watch?v=jUFEeuWqFPE
🕴 @Phantasm_Lab
(Hacking Documentary) - Real Storieshttps://www.youtube.com/watch?v=jUFEeuWqFPE
🕴 @Phantasm_Lab
YouTube
Guardians Of The New World (Hacking Documentary) | Real Stories
Until recently, many of us thought we were safe online and that the Internet provided a safe haven to share ideas and democratise information with the security of privacy. Guardians of the New World introduces us to the world of hacker culture. Emerging from…
Forwarded from ؘ.
Meetup sobre Comunidades e Carreiras em T.I que vai rolar em Campinas!! Simbora?!
https://www.meetup.com/pt-BR/Nerdzao/events/248250342/
https://www.meetup.com/pt-BR/Nerdzao/events/248250342/
Meetup
NerdZaoCampinas #5 - Comunidades e Carreiras em T.I
• O que vamos fazerNeste encontro PRESENCIAL e GRATUITO alguns profissionais irão contar um pouco sobre suas experiências e vivências no mercado de trabalho e principalmente nas comunidades relacionad
Cross Site Scripting Vulnerability in Oracle
https://www.ifrahiman.com/2018/02/cross-site-noscripting-vulnerability-in.html#more
🧠 @Phantasm_Lab
So as you already know that Cross Site Scripting is an attack in which we can inject custom JavaScript codes & the browser executes them as the part of the page. So for the proof of concept I used a simple alert(document.domain) payload, but the exploitation is not limited.https://www.ifrahiman.com/2018/02/cross-site-noscripting-vulnerability-in.html#more
🧠 @Phantasm_Lab
Ifrahiman
Cross Site Scripting Vulnerability in Oracle
Oracle Cross Site Scripting Bug
Webinar: Tips on Building a World Class Bug Bounty Program From Senior Red Team Expert, Mack Staples
https://www.youtube.com/watch?v=USRi1M2mlm8
🕴 @Phantasm_Lab
There’s nothing more important than protecting the lifeblood of your business: customer data. No one takes this more seriously than Zenefits, the All-in-One HR Platform. Zenefits holds sensitive personal and financial data for over 10,000 small and medium businesses. That’s a lot of high risk customer data, including Personally Identifiable Information (PII) and Protected Health Information (PHI). Thankfully, Zenefits has a world-class security program and a Red Team that knows, like many other companies with similarly sensitive data, they must be on their game 24/7. Mack Staples, Senior Manager of Zenefits' Red Team, walks through some best practices they use to enable bug bounties as a core product security strategy. He discusses tips, practical advice, and insights into how they’ve built their world-class bug bounty program into one of the top program’s on the HackerOne platform.https://www.youtube.com/watch?v=USRi1M2mlm8
🕴 @Phantasm_Lab
YouTube
Webinar: Tips on Building a World Class Bug Bounty Program From Senior Red Team Expert, Mack Staples
There’s nothing more important than protecting the lifeblood of your business: customer data. No one takes this more seriously than Zenefits, the All-in-One HR Platform. Zenefits holds sensitive personal and financial data for over 10,000 small and medium…
XXE vulnerability demo
https://github.com/rgerganov/xxe-example
Simple web application which demonstrates XXE vulnerabitlity.https://github.com/rgerganov/xxe-example
GitHub
GitHub - rgerganov/xxe-example: XXE vulnerability demo
XXE vulnerability demo. Contribute to rgerganov/xxe-example development by creating an account on GitHub.
XXE Recursive Download
https://github.com/GDSSecurity/xxe-recursive-download
This tool exploits XXE to retrieve files from a target server. It obtains directory listings and recursively downloads file contents.https://github.com/GDSSecurity/xxe-recursive-download
GitHub
GDSSecurity/xxe-recursive-download
Contribute to GDSSecurity/xxe-recursive-download development by creating an account on GitHub.
awesome-reversing
https://github.com/fdivrp/awesome-reversing
🕴🏼 @H3XL0VER
🕴🏼 @PhantasmLab
A curated list of awesome reversing resourceshttps://github.com/fdivrp/awesome-reversing
🕴🏼 @H3XL0VER
🕴🏼 @PhantasmLab
GitHub
GitHub - tylerha97/awesome-reversing: A curated list of awesome reversing resources
A curated list of awesome reversing resources. Contribute to tylerha97/awesome-reversing development by creating an account on GitHub.
Misconfiguration of Demographics Privacy in a Page
https://www.youtube.com/watch?v=hGa4qEN0amo&feature=youtu.be
https://www.youtube.com/watch?v=hGa4qEN0amo&feature=youtu.be
YouTube
Misconfiguration of Demographics Privacy in a Page
Forwarded from The Bug Bounty Hunter
Misconfiguration of Demographics Privacy in a Page
https://medium.com/@markchristiandeduyo/misconfiguration-of-demographics-privacy-in-a-page-682feb1179f2
https://medium.com/@markchristiandeduyo/misconfiguration-of-demographics-privacy-in-a-page-682feb1179f2
Medium
Misconfiguration of Demographics Privacy in a Page
Denoscription: Demographics is Limit Visibility of This Post, Choose who can see your post on Facebook based on their demographic. For…
QRLJacking - A New Social Engineering Attack Vector
https://github.com/OWASP/QRLJacking
🕴🏼 @PhantasmLab
QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking.https://github.com/OWASP/QRLJacking
🕴🏼 @PhantasmLab
GitHub
GitHub - OWASP/QRLJacking: QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the…
QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login with QR code” feature as a secure way to login into account...
GitHub Enterprise - Remote Code Execution
https://www.youtube.com/watch?v=GoO7_lCOfic&feature=youtu.be
🕴🏼 @PhantasmLab
GitHub Enterprise smaller than 2.8.7 Remote Code Execution A demo video of Black Hat USA 2017https://www.youtube.com/watch?v=GoO7_lCOfic&feature=youtu.be
🕴🏼 @PhantasmLab
YouTube
GitHub Enterprise - Remote Code Execution
GitHub Enterprise smaller than 2.8.7 Remote Code Execution A demo video of Black Hat USA 2017 This is the demo video of http://blog.orange.tw/2017/07/how-i-c...
OSCP Prep - SLmail Buffer Overflow Exploit Development with Kali Linux
https://www.youtube.com/watch?v=OOkU7to0Ty4
🕴🏽 @Phantasm_Lab
https://www.youtube.com/watch?v=OOkU7to0Ty4
🕴🏽 @Phantasm_Lab
YouTube
SLmail Buffer Overflow Exploit Development with Kali Linux
Please check out my Udemy courses! Coupon code applied to the following links....
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali…
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali…
OSCP Prep - Vulnserver Buffer Overflow Exploit Development with Kali Linux
https://www.youtube.com/watch?v=qjWs___hQcE
🕴🏽 @Phantasm_Lab
https://www.youtube.com/watch?v=qjWs___hQcE
🕴🏽 @Phantasm_Lab
YouTube
Vulnserver Buffer Overflow Exploit Development with Kali Linux
Please check out my Udemy courses! Coupon code applied to the following links....
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali…
https://www.udemy.com/hands-on-penetration-testing-labs-30/?couponCode=NINE99
https://www.udemy.com/hands-on-penetration-testing-labs-20/?couponCode=NINE99
https://www.udemy.com/kali…
Forwarded from CryptoRave 2025
Mais do que nunca é hora de falar da importância da CryptoRave. Mais do que nunca é hora de compartilhar em todos os grupos que você faz parte.
A CryptoRave é um evento de muita resistência: voluntário, sem publicidade, sem terno, gravata e pão de queijo murcho. Financiada por todos nós. Construída por nós, com uma programação coletiva.
Ano passado 600 pessoas acreditaram e ajudaram a realizar o evento. Esse é um evento único no Brasil e que precisa continuar existindo.
É por esse motivo que nós agradecemos a cada um de vocês que, de alguma forma, em algum momento desses cinco anos apoiou a CryptoRave. Nem sempre dá para apoiar com dinheiro, mas divulgar para os/as amigos/as é sempre possível e muito importante.
Divulguem! <3
https://www.catarse.me/cryptorave2018
A CryptoRave é um evento de muita resistência: voluntário, sem publicidade, sem terno, gravata e pão de queijo murcho. Financiada por todos nós. Construída por nós, com uma programação coletiva.
Ano passado 600 pessoas acreditaram e ajudaram a realizar o evento. Esse é um evento único no Brasil e que precisa continuar existindo.
É por esse motivo que nós agradecemos a cada um de vocês que, de alguma forma, em algum momento desses cinco anos apoiou a CryptoRave. Nem sempre dá para apoiar com dinheiro, mas divulgar para os/as amigos/as é sempre possível e muito importante.
Divulguem! <3
https://www.catarse.me/cryptorave2018
Catarse
CryptoRave 2018
Apoie o maior evento aberto e gratuito de criptografia e segurança do mundo!
How to Install apktool In Android: Decompile & Re-compile any Apk – Kali Nethunter [Reverse Engineering]
https://exploithub.info/install-apktool-in-android/
🕴 @Phantasm_Lab
In this article i will show you how to Install apktool in android and also show you how to decompile & recompile any android apk app with using android kali nethunter.https://exploithub.info/install-apktool-in-android/
🕴 @Phantasm_Lab
ExploitHub
How to Install apktool In Android: Decompile & Re-compile any Apk - Kali Nethunter [Reverse Engineering]
In this article i will show you how to Install apktool in android and also show you how to decompile & recompile any android apk app with using android kali nethunter. Let’s first talk about apktool! A tool for reverse engineering 3rd party, closed, binary…
#Perfil #HackerOne #Series
Dr.Jones (sp1d3rs)
https://hackerone.com/sp1d3rs
Dr.Jones (sp1d3rs)
Reputation: 3875 Rank: 78th Spiders are the only web developers that enjoy finding bugshttps://hackerone.com/sp1d3rs
HackerOne
HackerOne profile - sp1d3rs
The world tried to catch me, but it couldn't. - https://r1p.xyz