Forwarded from Security Talks (Jonhnathan Jonhnathan Jonhnathan)
YouTube
Defending against PowerShell attacks - in theory, and in practice by Lee holmes
Learn how attackers are using PowerShell and how to defend against those attacks.
Endpoint Detection and Responde (EDR)
https://akkysanj.wordpress.com/2018/04/17/endpoint-detection-and-response-edr/
🕴 @Phantasm_Lab
https://akkysanj.wordpress.com/2018/04/17/endpoint-detection-and-response-edr/
🕴 @Phantasm_Lab
Akkysanj
Endpoint Detection and Response (EDR)
This blog post is about an Modern day detection/Response solution termed by Gartner, as EDR (Endpoint detection and response) and about its usefulness in day-to-day activity of blue t…
Criando um servidor Git
https://blog.pantuza.com/tutoriais/criando-um-servidor-git
🕴 @Phantasm_Lab
O git é uma ferramenta de linha de comandos para fazer controle de versões de código. Existem alguns sites na web, como o Github, que utilizam o git para criar uma serviço de gestão de projetos de código. Se você tem uma empresa, ou um laboratório de universidade e precisa ter um repositório Git remote ao qual uma equipe ou diversos colaboradores precisam enviar código, esse tutorial irá te ajudar a habilitar um servidor Git remoto.https://blog.pantuza.com/tutoriais/criando-um-servidor-git
🕴 @Phantasm_Lab
Blog sobre Ciência da computação - Gustavo Pantuza
Criando um servidor Git
Aprenda a criar um servidor remoto git privado para seus projetos particulares
C Socket Tutorial - Echo Server
https://vcansimplify.wordpress.com/2013/03/14/c-socket-tutorial-echo-server/
🕴 @Phantasm_Lab
Anytime two devices want to connect through a TCP/IP socket , one of them has to be a client and the other has to be a server. As an example your computer might be the client and Google computer might be the server. The client should be aware of the Server’s IP Address and Port Number, while the server can accept any client and determine his IP later.https://vcansimplify.wordpress.com/2013/03/14/c-socket-tutorial-echo-server/
🕴 @Phantasm_Lab
A Simple Programmer's Blog
C Socket Tutorial – Echo Server
Following my previous post here , I’ll get to the programming part.But before that a few concepts that are important. Client Server Model Anytime two devices want to connect through a TCP/IP …
Migrate from GitHub to GitLab
https://about.gitlab.com/
🕴 @Phantasm_Lab
Use our GitHub importer to easily migrate your projects from GitHub to GitLab with minimal effort. https://about.gitlab.com/
🕴 @Phantasm_Lab
about.gitlab.com
The most-comprehensive AI-powered DevSecOps platform
From planning to production, bring teams together in one application. Ship secure code more efficiently to deliver value faster.
Forwarded from Programmer Humor
Bypassing Web Application Firewalls (WAF)
https://github.com/frizb/Bypassing-Web-Application-Firewalls
🕴 @Phantasm_Lab
A series of python noscripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockershttps://github.com/frizb/Bypassing-Web-Application-Firewalls
🕴 @Phantasm_Lab
GitHub
GitHub - frizb/Bypassing-Web-Application-Firewalls: A series of python noscripts for generating weird character combinations for…
A series of python noscripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers - frizb/Bypassing-Web-Application-Firewalls
GitLab vs GitHub for Open Source Projects
https://dzone.com/articles/gitlab-vs-github-for-open-source-projects
🕴 @Phantasm_Lab
https://dzone.com/articles/gitlab-vs-github-for-open-source-projects
🕴 @Phantasm_Lab
dzone.com
GitLab vs. GitHub for Open Source Projects - DZone Open Source
GitHub is a widespread community for developers sharing code, but isn't open source. Take a look at GitLab and how it compares on functionality and usability.
Forwarded from @Phantasm_Lab ([L]uŧh1er)
Free Templates for Penetration Testing Report!
https://www.peerlyst.com/posts/how-to-write-a-penetration-testing-report-magda-chelly-ph-d?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BpAeVqlOST9Or28C6V22UNw%3D%3D
🕴🏽 @Phantasm_Lab
https://www.peerlyst.com/posts/how-to-write-a-penetration-testing-report-magda-chelly-ph-d?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BpAeVqlOST9Or28C6V22UNw%3D%3D
🕴🏽 @Phantasm_Lab
Peerlyst
How to Write a Penetration Testing Report ? With a Free Template !
A hacker’s definition in the 1990s was related to innovation, creativity and the capacity to solve complex problems.Nowadays, media use the ‘’hacker’’ definition to relate to cyber criminals breaking into systems. In the infosec community, we are all
Forwarded from @Phantasm_Lab
XXE vulnerability demo
https://github.com/rgerganov/xxe-example
Simple web application which demonstrates XXE vulnerabitlity.https://github.com/rgerganov/xxe-example
GitHub
GitHub - rgerganov/xxe-example: XXE vulnerability demo
XXE vulnerability demo. Contribute to rgerganov/xxe-example development by creating an account on GitHub.
Forwarded from @Phantasm_Lab
The Mobile Application Hackers Handbook
🕴 @Phantasm_Lab
Mobile computing has changed the game. Your personal data is no longer just stored on your desktop in the sanctuary of your office or home. You now carry personally identifiable information, financial data, personal and corporate email, and much more in your pocket, wherever you go. The smartphone is quickly becoming ubiquitous, and with at least 40 applications installed on the average smartphone the attack surface is significant.The focus of this book is highly practical. Although we provide some background theory for you to understand the fundamentals of mobile application vulnerabilities, our primary concern is documenting the techniques you need to master to attack and exploit them. Where applicable, we include real-world examples derived from our many years of experience and from publically documented vulnerabilities.🕴 @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing
🕴🏽 @Phantasm_Lab
This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:- Abusing Active Directory- Abusing Kerberos- Advanced Web Attacks- Better Ways to Move Laterally- Cloud Vulnerabilities- Faster/Smarter Password Cracking- Living Off the Land- Lateral Movement Attacks- Multiple Custom Labs- Newer Web Language Vulnerabilities- Physical Attacks- Privilege Escalation- PowerShell Attacks- Ransomware Attacks- Red Team vs Penetration Testing- Setting Up Your Red Team Infrastructure- Usable Red Team Metrics- Writing Malware and Evading AV- And so much more🕴🏽 @Phantasm_Lab