@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Criando um servidor Git

O git é uma ferramenta de linha de comandos para fazer controle de versões de código. Existem alguns sites na web, como o Github, que utilizam o git para criar uma serviço de gestão de projetos de código. Se você tem uma empresa, ou um laboratório de universidade e precisa ter um repositório Git remote ao qual uma equipe ou diversos colaboradores precisam enviar código, esse tutorial irá te ajudar a habilitar um servidor Git remoto.

https://blog.pantuza.com/tutoriais/criando-um-servidor-git

🕴 @Phantasm_Lab
C Socket Tutorial - Echo Server

Anytime two devices want to connect through a TCP/IP socket , one of them has to be a client and the other has to be a server. As an example your computer might be the client and Google computer might be the server. The client should be aware of the Server’s IP Address and Port Number, while the server can accept any client and determine his IP later.

https://vcansimplify.wordpress.com/2013/03/14/c-socket-tutorial-echo-server/

🕴 @Phantasm_Lab
Forwarded from Programmer Humor
Every Github repo right now
https://redd.it/8ocma6

by @programmer_humor
Forwarded from @Phantasm_Lab
Official Black Hat Arsenal Tools Github Repository
Forwarded from @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook

Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.

The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.

🕴 @Phantasm_Lab