Forwarded from The Hacker News
Malicious USB Drives Infect 35,000 Computers With Crypto-Mining Botnet
Read Details — https://thehackernews.com/2020/04/usb-drive-botnet-malware.html
Read Details — https://thehackernews.com/2020/04/usb-drive-botnet-malware.html
NSA/CSS Technical Cyber Threat Framework v2
https://media.defense.gov/2019/Jul/16/2002158108/-1/-1/0/CTR_NSA-CSS-TECHNICAL-CYBER-THREAT-FRAMEWORK_V2.PDF
https://media.defense.gov/2019/Jul/16/2002158108/-1/-1/0/CTR_NSA-CSS-TECHNICAL-CYBER-THREAT-FRAMEWORK_V2.PDF
Forwarded from DARKNET BR
📚 #Ebook | #Privacy | #Terrorists
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
Forwarded from @Phantasm_Lab
The Hacker Playbook 2 - Practical Guide To Penetration Testing
https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
| PDF/EPUB/MOBI | 23/18/53 MB |https://drive.google.com/open?id=0B-OpLAp8EyTfV0JpS1MtX015aEU
🕴 @Phantasm_Lab
Forwarded from @Phantasm_Lab
The Hacker PlayBook 3 - Pratical Guide To Penetration Testing
🕴🏽 @Phantasm_Lab
This is the third iteration of The Hacker Playbook (THP) series. Below is an overview of all the new vulnerabilities and attacks that will be discussed. In addition to the new content, some attacks and techniques from the prior books (which are still relevant today) are included to eliminate the need to refer back to the prior books. So, what's new? Some of the updated topics from the past couple of years include:- Abusing Active Directory- Abusing Kerberos- Advanced Web Attacks- Better Ways to Move Laterally- Cloud Vulnerabilities- Faster/Smarter Password Cracking- Living Off the Land- Lateral Movement Attacks- Multiple Custom Labs- Newer Web Language Vulnerabilities- Physical Attacks- Privilege Escalation- PowerShell Attacks- Ransomware Attacks- Red Team vs Penetration Testing- Setting Up Your Red Team Infrastructure- Usable Red Team Metrics- Writing Malware and Evading AV- And so much more🕴🏽 @Phantasm_Lab
Forwarded from @Phantasm_Lab
C/C++ Kernel Mode / Game Hacking — CS:GO Undetectable External Bunnyhop! (VAC Bypass)
Cheat that uses a driver instead WinAPI for Reading / Writing memory.
https://www.youtube.com/watch?v=sJdBtPosWQs
Project on Github: https://github.com/Zer0Mem0ry/KernelBhop
🕴🏽 @Phantasm_Lab
Cheat that uses a driver instead WinAPI for Reading / Writing memory.
https://www.youtube.com/watch?v=sJdBtPosWQs
Project on Github: https://github.com/Zer0Mem0ry/KernelBhop
🕴🏽 @Phantasm_Lab
YouTube
C/C++ Kernel Mode / Game Hacking — CS:GO Undetectable External Bunnyhop! (VAC Bypass)
Cheat that uses a driver instead WinAPI for Reading / Writing memory.
Project on Github: https://github.com/Zer0Mem0ry/KernelBhop
Unsigned Drivers can be loaded using https://github.com/hfiref0x/DSEFix
This project uses a kernel mode driver in co-operation…
Project on Github: https://github.com/Zer0Mem0ry/KernelBhop
Unsigned Drivers can be loaded using https://github.com/hfiref0x/DSEFix
This project uses a kernel mode driver in co-operation…
Remcos RAT Review - The Most Advanced Remote Access Tool
https://www.youtube.com/watch?v=rffkJDcri18
📟 @Phantasm_Lab
in this video I will be reviewing Remcos RAT, the most advanced remote access tool on the market. Remcos lets you extensively control and manage one or many computers remotely.It’s the perfect solution if you need to use your PC from a remote location, or if you need to overseehttps://www.youtube.com/watch?v=rffkJDcri18
📟 @Phantasm_Lab
YouTube
Remcos RAT Review - The Most Advanced Remote Access Tool
Hey guys! in this video I will be reviewing Remcos RAT, the most advanced remote access tool on the market. Remcos lets you extensively control and manage one or many computers remotely.
It’s the perfect solution if you need to use your PC from a remote location…
It’s the perfect solution if you need to use your PC from a remote location…
Forwarded from @Phantasm_Lab
The Tangled Web - A Guide to Security Web Applications
🕴🏽 @Phantasm_Lab
the field of information security appears to be a mature, well-defined, and accomplished branch of computer science. Resident experts eagerly assert the importance of their area of expertise by pointing to large sets of neatly cataloged security flaws, invariably attributed to security-illiterate developers, while their fellow theoreticians note how all these problems would have been prevented by adhering to this year’s hottest security methodology.🕴🏽 @Phantasm_Lab