🃏 łαbørαŧøriø Ŧαηŧαsмα
- Redx Blue Security
- Open Source & Free Software
- Exploitable tools
- Free Lancer Developers
- CTF
t.me/Phantasm_Lab
- Redx Blue Security
- Open Source & Free Software
- Exploitable tools
- Free Lancer Developers
- CTF
t.me/Phantasm_Lab
Telegram
@Phantasm_Lab
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis
🇺🇸 🇧🇷 🇪🇸
since 2017 ©
Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis
🇺🇸 🇧🇷 🇪🇸
since 2017 ©
Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.
https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
🕴🏽 @Phantasm_Lab
The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I’m about to bring it to yours. No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires. In fact, even though proof of concept code was released OVER 9 MONTHS AGO, none of the products mentioned in the noscript of this post have been patched, along with many more. In fact no patch is available for the Java library containing the vulnerability. In addition to any commercial products that are vulnerable, this also affects many custom applications.https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
🕴🏽 @Phantasm_Lab
Foxglovesecurity
What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common? This Vulnerability.
By @breenmachine What? The most underrated, underhyped vulnerability of 2015 has recently come to my attention, and I’m about to bring it to yours. No one gave it a fancy name, there were no …
Bypassing Same Origin Policy (SOP)
https://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/#gref
🕴🏽 @Phantasm_Lab
The same origin policy is an important concept in the web application information security domain. In this policy, a web browser allows noscripts contained in a first web page ‘A’ to access data/resources in a second web page ‘B’, however, only if both web pages have the same origin.An origin is defined as a combination of URI scheme, hostname, and port number. This policy prevents a malicious noscript on one page from obtaining access to sensitive data on another web page through that page’s DOM (document object model).https://resources.infosecinstitute.com/bypassing-same-origin-policy-sop/#gref
🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab (Ag3nt-dpr)
#Perl #Course #Essentials
1 - https://youtu.be/ZFmdCnBUFy8
2 - https://youtu.be/g44D5ivndQU
3 - https://youtu.be/gcRTFjk8vdo
🕴 @Phantasm_Lab
Perl For Hacking and Pentest1 - https://youtu.be/ZFmdCnBUFy8
2 - https://youtu.be/g44D5ivndQU
3 - https://youtu.be/gcRTFjk8vdo
🕴 @Phantasm_Lab
~ Voltado sobre o mundo da DeepWeb e links das redes da DarkNet.https://news.1rj.ru/str/DARKNET_BR
~ Contra vigilância digital e a favor do anonimato e privacidade.
The Real Untold Story Of Government's Takedown of Silk Road
https://www.youtube.com/watch?v=J8AXCLLIaT0
🕴 @Phantasm_Lab
In this video, Luke Rudkowski talks to Lynn Ulbricht, the mother of Ross Ulbricht who was behind the Silk Road. In this video, Lynn breaks down important never before heard information regarding the case that shows a shocking precedent that has been set with internet freedom.https://www.youtube.com/watch?v=J8AXCLLIaT0
🕴 @Phantasm_Lab
YouTube
The Real Untold Story Of Government's Takedown of Silk Road
In this video, Luke Rudkowski talks to Lynn Ulbricht, the mother of Ross Ulbricht who was behind the Silk Road. In this video, Lynn breaks down important never before heard information regarding the case that shows a shocking precedent that has been set with…