#código
"OpenREIL is open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)."
https://github.com/Cr4sh/openreil
@pr1v8
"OpenREIL is open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)."
https://github.com/Cr4sh/openreil
@pr1v8
GitHub
GitHub - Cr4sh/openreil: Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language)
Open source library that implements translator and tools for REIL (Reverse Engineering Intermediate Language) - Cr4sh/openreil
#código
"This is a multi-use bash noscript for Linux systems to audit wireless networks."
https://github.com/v1s1t0r1sh3r3/airgeddon
@pr1v8
"This is a multi-use bash noscript for Linux systems to audit wireless networks."
https://github.com/v1s1t0r1sh3r3/airgeddon
@pr1v8
GitHub
GitHub - v1s1t0r1sh3r3/airgeddon: This is a multi-use bash noscript for Linux systems to audit wireless networks.
This is a multi-use bash noscript for Linux systems to audit wireless networks. - v1s1t0r1sh3r3/airgeddon
#código
"Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)"
https://github.com/mthbernardes/strutszeiro
@pr1v8
"Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)"
https://github.com/mthbernardes/strutszeiro
@pr1v8
GitHub
GitHub - mthbernardes/strutszeiro: Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)
Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) - mthbernardes/strutszeiro
#código
"Printer Exploitation Toolkit - The tool that made dumpster diving obsolete."
https://github.com/RUB-NDS/PRET
@pr1v8
"Printer Exploitation Toolkit - The tool that made dumpster diving obsolete."
https://github.com/RUB-NDS/PRET
@pr1v8
GitHub
GitHub - RUB-NDS/PRET: Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete. - RUB-NDS/PRET
#guia
"The Essential Skills to Becoming a Master Hacker"
https://null-byte.wonderhowto.com/how-to/essential-skills-becoming-master-hacker-0154509/
@pr1v8
"The Essential Skills to Becoming a Master Hacker"
https://null-byte.wonderhowto.com/how-to/essential-skills-becoming-master-hacker-0154509/
@pr1v8
WonderHowTo
The Essential Skills to Becoming a Master Hacker
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?"
#código
"Cleans out "open" wireless connections from OSX machine"
https://github.com/mubix/osx-wificleaner
@pr1v8
"Cleans out "open" wireless connections from OSX machine"
https://github.com/mubix/osx-wificleaner
@pr1v8
GitHub
mubix/osx-wificleaner
osx-wificleaner - Cleans out "open" wireless connections from OSX machine
#código
"HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass"
https://github.com/Cn33liz/HSEVD-StackOverflowX64
@pr1v8
"HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass"
https://github.com/Cn33liz/HSEVD-StackOverflowX64
@pr1v8
GitHub
GitHub - Cn33liz/HSEVD-StackOverflowX64: HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass
HackSys Extreme Vulnerable Driver - Windows 10 x64 StackOverflow Exploit with SMEP Bypass - Cn33liz/HSEVD-StackOverflowX64
#noticia
"Hackers podem usar ondas sonoras para controlar o seu smartphone"
http://gizmodo.uol.com.br/hackers-ondas-sonoras/
@pr1v8
"Hackers podem usar ondas sonoras para controlar o seu smartphone"
http://gizmodo.uol.com.br/hackers-ondas-sonoras/
@pr1v8
Gizmodo Brasil
Hackers podem usar ondas sonoras para controlar o seu smartphone
Existe uma máxima no mundo da segurança que diz que qualquer coisa pode ser invadida. E, quanto mais complexos os nossos dispositivos se tornam, mais métodos são imaginados pelos hackers...
#Apache #Exploit
Hackers exploram brecha no Apache Struts para atacar servidores web corporativos
A vulnerabilidade é muito fácil de explorar e permite que hackers executem comandos do sistema com os privilégios do usuário que está realizando o processo no servidor web.
http://computerworld.com.br/hackers-exploram-brecha-no-apache-struts-para-atacar-servidores-web-corporativos
🌐 @PR1V8
Hackers exploram brecha no Apache Struts para atacar servidores web corporativos
A vulnerabilidade é muito fácil de explorar e permite que hackers executem comandos do sistema com os privilégios do usuário que está realizando o processo no servidor web.
http://computerworld.com.br/hackers-exploram-brecha-no-apache-struts-para-atacar-servidores-web-corporativos
🌐 @PR1V8
COMPUTERWORLD
Hackers exploram brecha no Apache Struts para atacar servidores web corporativos
Vulnerabilidade é muito fácil de explorar e permite que hackers executem comandos do sistema com os privilégios do usuário que está realizando o processo no servidor web
:: @PR1V8 Network ::
• Canal: https://news.1rj.ru/str/PR1V8
• Grupo Off-Topic: https://news.1rj.ru/str/pr1v8grupo
• Grupo On-Topic: https://news.1rj.ru/str/pr1v8grupo
• Acervo: https://news.1rj.ru/str/acervopr1v8
• Blog: https://0xpr1v8.wordpress.com
• Site: http://pr1v8.co.nf
Discussões sobre politica e relacionados, favor usar o grupo On-Topic
EOF #pin #network
• Canal: https://news.1rj.ru/str/PR1V8
• Grupo Off-Topic: https://news.1rj.ru/str/pr1v8grupo
• Grupo On-Topic: https://news.1rj.ru/str/pr1v8grupo
• Acervo: https://news.1rj.ru/str/acervopr1v8
• Blog: https://0xpr1v8.wordpress.com
• Site: http://pr1v8.co.nf
Discussões sobre politica e relacionados, favor usar o grupo On-Topic
EOF #pin #network
Telegram
.: PR1V8 :.
▪️Sobre:
▪️ ▪️Hacking
▪️ ▪️Coding
▪️ ▪️Hacktivism
▫️Twitter: https://twitter.com/0xpr1v8
▫️Acervo: @acervopr1v8
▫️Wiki: https://github.com/0xpr1v8/pr1v8society/wiki/
〰️“Go Beyond Your Limits”〰️
▪️ ▪️Hacking
▪️ ▪️Coding
▪️ ▪️Hacktivism
▫️Twitter: https://twitter.com/0xpr1v8
▫️Acervo: @acervopr1v8
▫️Wiki: https://github.com/0xpr1v8/pr1v8society/wiki/
〰️“Go Beyond Your Limits”〰️
#bitcoin #pr1v8
Major DDoS attacks hit Bitcoin.com
🔗 https://news.bitcoin.com/ddos-attacks-bitcoin-com-uncensored-information/
creditos: @linuxroot1
🌐 @PR1V8
Major DDoS attacks hit Bitcoin.com
🔗 https://news.bitcoin.com/ddos-attacks-bitcoin-com-uncensored-information/
creditos: @linuxroot1
🌐 @PR1V8
Bitcoin News
Major DDoS Attacks Hit Bitcoin.com - Bitcoin News
Large scale DDoS attacks on Bitcoin.com and its subdomains started a few days ago and have heightened over the past 48 hours, targeting the “big block” side
#php #informacaolivre #pr1v8
PHP do Zero ao Profissional
🔗 https://drive.google.com/open?id=0B9Oh95vNc8dRVUhhLWp0QXZZeFE
🌐 @PR1V8
PHP do Zero ao Profissional
🔗 https://drive.google.com/open?id=0B9Oh95vNc8dRVUhhLWp0QXZZeFE
🌐 @PR1V8
#WhatsApp #Hacked
Uma vulnerabilidade foi descoberta no WhatsApp Web. Essa vulnerabilidade, se explorada, permitiriar que os invasores tomem completamente as contas dos usuários em qualquer navegador acessem as conversas pessoais e de grupo das vítimas, fotos, vídeos e outros arquivos compartilhados, listas de contatos e muito mais.
Vídeo demonstrativo:
https://www.youtube.com/watch?v=UR_i5XSAKrg
🌐 @PR1V8
Uma vulnerabilidade foi descoberta no WhatsApp Web. Essa vulnerabilidade, se explorada, permitiriar que os invasores tomem completamente as contas dos usuários em qualquer navegador acessem as conversas pessoais e de grupo das vítimas, fotos, vídeos e outros arquivos compartilhados, listas de contatos e muito mais.
Vídeo demonstrativo:
https://www.youtube.com/watch?v=UR_i5XSAKrg
🌐 @PR1V8
YouTube
Demo of WhatsApp Web Account Takeover | Hacking Demonstration
A vulnerability has been discovered in WhatsApp Web. This vulnerability, if exploited, would allow attackers to completely take over users’ accounts on any browser, and access victims’ personal and group conversations, photos, videos and other shared files…