@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Webinar: Tips on Building a World Class Bug Bounty Program From Senior Red Team Expert, Mack Staples

There’s nothing more important than protecting the lifeblood of your business: customer data. No one takes this more seriously than Zenefits, the All-in-One HR Platform. Zenefits holds sensitive personal and financial data for over 10,000 small and medium businesses. That’s a lot of high risk customer data, including Personally Identifiable Information (PII) and Protected Health Information (PHI). Thankfully, Zenefits has a world-class security program and a Red Team that knows, like many other companies with similarly sensitive data, they must be on their game 24/7. Mack Staples, Senior Manager of Zenefits' Red Team, walks through some best practices they use to enable bug bounties as a core product security strategy. He discusses tips, practical advice, and insights into how they’ve built their world-class bug bounty program into one of the top program’s on the HackerOne platform.

https://www.youtube.com/watch?v=USRi1M2mlm8

🕴 @Phantasm_Lab
Official Black Hat Arsenal Tools Github Repository
XXE Recursive Download

This tool exploits XXE to retrieve files from a target server. It obtains directory listings and recursively downloads file contents.

https://github.com/GDSSecurity/xxe-recursive-download
QRLJacking - A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the “Login with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking.

https://github.com/OWASP/QRLJacking

🕴🏼 @PhantasmLab
Forwarded from CryptoRave 2025
Mais do que nunca é hora de falar da importância da CryptoRave. Mais do que nunca é hora de compartilhar em todos os grupos que você faz parte.

A CryptoRave é um evento de muita resistência: voluntário, sem publicidade, sem terno, gravata e pão de queijo murcho. Financiada por todos nós. Construída por nós, com uma programação coletiva.

Ano passado 600 pessoas acreditaram e ajudaram a realizar o evento. Esse é um evento único no Brasil e que precisa continuar existindo.

É por esse motivo que nós agradecemos a cada um de vocês que, de alguma forma, em algum momento desses cinco anos apoiou a CryptoRave. Nem sempre dá para apoiar com dinheiro, mas divulgar para os/as amigos/as é sempre possível e muito importante.

Divulguem! <3

https://www.catarse.me/cryptorave2018
#Perfil #HackerOne #Series

Dr.Jones (sp1d3rs)

Reputation: 3875 Rank: 78th

Spiders are the only web developers that enjoy finding bugs

https://hackerone.com/sp1d3rs
How Russia Hacked America—And Why It Will Happen Again

During the 2016 presidential campaign, Russian hackers attacked the U.S. on two fronts: the psychological and the technical. And it won't be the last time it happens. This psychological cyber warfare will only get better, and its methods more sophisticated.

https://www.youtube.com/watch?v=GYIgmua-J7o
How Russian Bots Invade Our Elections

How do bots and trolls work to infiltrate social media platforms and influence U.S. elections? We take a closer look at these insidious online pests to explain how they work.

https://www.youtube.com/watch?v=sZmrIkRDMsU
How Russian Trolls Collected Americans' Personal Information

The Kremlin-backed Internet Research Agency, a.k.a. the Troll Factory, ​used fake social media accounts before and after the 2016 U.S. election to collect sensitive personal information on Americans, a Wall Street Journal investigation has found. Shelby Holliday explains how the Russian schemes worked.​

https://www.youtube.com/watch?v=heXp2tyDl6k