@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
SDLC - Understand the Software Development Life Cycle

SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.

https://stackify.com/what-is-sdlc/

🧬 @Phantasm_Lab
Git Feature Branch Workflow

The core idea behind the Feature Branch Workflow is that all feature development should take place in a dedicated branch instead of the master branch. This encapsulation makes it easy for multiple developers to work on a particular feature without disturbing the main codebase.

https://www.atlassian.com/git/tutorials/comparing-workflows/feature-branch-workflow

🧬 @Phantasm_Lab
Gitflow Workflow

Gitflow Workflow is a Git workflow design that was first published and made popular by Vincent Driessen at nvie. The Gitflow Workflow defines a strict branching model designed around the project release. This provides a robust framework for managing larger projects.

https://www.atlassian.com/git/tutorials/comparing-workflows/gitflow-workflow

🧬 @Phantasm_Lab
Barq: The AWS Cloud Post Exploitation framework!

barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack running EC2 instances without having the original instance SSH keypairs. It also allows you to perform enumeration and extraction of stored Secrets and Parameters in AWS.

https://github.com/Voulnet/barq

🧬 @Phantasm_Lab
Caso Jumpshot: entenda a polêmica da controversa subsidiária da Avast

Uma bomba caiu no colo dos internautas que utilizam o antivírus tcheco Avast na última semana. Uma investigação conjunta da VICE e da PCMag revelou com exclusividade que a companhia europeia estaria comercializando dados altamente sensíveis de alguns de seus usuários através da Jumpshot, sua subsidiária especializada em marketing digital e inteligência de mercado. Entre os clientes de tal empresa secundária, encontram-se marcas como Google, Yelp, Microsoft, McKinsey, Pepsi e Condé Nast.

https://thehack.com.br/caso-jumpshot-entenda-a-polemica-da-controversa-subsidiaria-da-avast/

🏴‍☠️ @Phantasm_Lab
Rede de lojas dos EUA deixa vazar 30 milhões de cartões de crédito de clientes

Criminosos cibernéticos já estão comercializando dados roubados da Wawa, rede de lojas de conveniência norte-americana, através de fóruns e marketplaces online. A companhia revelou, em dezembro do ano passado, ter sofrido um vazamento de dados após ter seu sistema de pagamento comprometido em 850 estabelecimentos ao redor dos Estados Unidos; porém, na época, nem a própria cadeia de lojas conseguiu estipular a real gravidade do incidente.

https://thehack.com.br/rede-de-lojas-dos-eua-deixa-vazar-30-milhoes-de-cartoes-de-credito-de-clientes/

🏴‍☠️ @Phantasm_Lab
Awesome GitHub Repos

1. Book of Secret Knowledge = https://lnkd.in/fWKCdi4
2. Awesome Hacking = https://lnkd.in/f7VPTEX
3. Awesome Bug Bounty = https://lnkd.in/fPrQiVD
4. Awesome Penetration Testing = https://lnkd.in/fAUZgu5
5. Awesome Web Hacking = https://lnkd.in/f5n2hSd
6. Awesome Hacking Resources = https://lnkd.in/fcJ6wFH
7. Awesome Pentest = https://lnkd.in/fNNSFeN
8. Awesome Red Teaming = https://lnkd.in/fGpievF
9. Awesome Web Security = https://lnkd.in/ffG73u2
10. Penetration Test Guide based on OWASP = https://lnkd.in/ffyBwzG
11. Pentest Compilation = https://lnkd.in/f5JwJTD
12. Infosec Reference = https://lnkd.in/fY6wNmX

🧪 @Phantasm_Lab
📬 @tani0m
Forwarded from DARKNET BR
🌐 #Cyberattack | #FBI | #Leaks

Wu Zhiyong, Wang Qian, Xu Ke e Liu Lei são supostamente responsáveis   pela invasão dos sistemas de computador Equifax e dos dados pessoais roubados dos segredos comerciais americanos e Equifax. Eles são acusados pelo FBI de fraude informática, espionagem econômica e fraude eletrônica.

Wu Zhiyong, Wang Qian, Xu Ke and Liu Lei are allegedly responsible for the invasion of Equifax computer systems and personal data stolen from American and Equifax trade secrets. They are accused by the FBI of computer fraud, economic espionage and electronic fraud.
China-backed hackers charged in massive Equifax data breach

The Justice Department has charged four Chinese military officials in the massive 2017 Equifax data breach. Nearly 150 million people were affected as the hackers stole names, addresses, credit card and Social Security numbers. CBS News chief Justice and Homeland Security correspondent Jeff Pegues joins CBSN with the latest.

https://www.youtube.com/watch?v=MpTpUO9qSU0

🏴‍☠️ @Phantasm_Lab
Forwarded from DARKNET BR
📚 #Ebook | #OSINT | #Researchers

OSINT Open Source Intelligence Glossary: Guide to Keywords, Phrases for Improved Internet Research Results
Forwarded from DARKNET BR
OSINT Glossary, Vol I is a serialized publication, designed for those conducting internet or document research to obtain better and more relevant search results.