<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5722222569147903212</id><updated>2023-05-12T19:56:43.232-07:00</updated><category term="Notícias Jurídicas"/><category term="Direito"/><category term="Cálculos Judiciais"/><category term="Cálculos Prevideciários"/><category term="Contabilidade"/><category term="Benefícios Previdenciários"/><category term="Revisões Previdenciárias"/><category term="Cálculos Trabalhistas"/><category term="Lei e Norma"/><category term="Estagiário"/><category term="STF"/><category term="STJ"/><category term="Fator Previdenciário"/><category term="Concursos"/><category term="Desaposentação"/><category term="Revisão do Teto"/><category term="Download Gratis"/><category term="Imposto de Renda"/><category term="Cursos Jurídicos On-line"/><category term="Seguro Desemprego"/><category term="FGTS"/><category term="Custas Judiciais"/><category term="Seguro-Desemprego"/><category term="Salário Mínimo"/><category term="Serviços Bancários"/><category term="Notícias Contábeis"/><category term="TST"/><category term="Micro e Pequena Empresa"/><category term="Receita Federal do Brasil"/><category term="Juro de Mora"/><category term="Precatórios"/><category term="Correção Monetária"/><category term="RPV"/><category term="Tempo de Serviço"/><category term="Contribuição Sindical"/><category term="Cálculos Financeiros"/><category term="Auditoria"/><category term="Trabalhador Rural"/><category term="Férias Trabalhistas"/><category term="Honorários Advocatícios"/><category term="Perito Judicial"/><category term="SELIC"/><category term="Lei n° 11.960/2009"/><category term="exame ordem"/><category term="Bolsa Família"/><category term="Exame de Suficiência"/><category term="Índices da Caderneta de Poupança"/><category term="eventos"/><title type='text'>ContJus - Notícias Contábeis e Jurídicas</title><subtitle type='html'>O ContJus apresenta de forma dinâmica Notícias Contábeis e jurídicas em um só lugar!</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>3453</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-6962002445697601908</id><published>2020-09-22T22:53:00.001-07:00</published><updated>2020-09-22T22:53:17.285-07:00</updated><title type='text'>UCLan Games Design Projects With GSM Research Group</title><summary type="text">Latest News from Paresh Parmar: Head of International Development &amp; Partnerships for School of Art, Design &amp; Fashion at University of Central Lancashire.&#39;We are grateful that 2019 gave us (GSM - Global Sound Movement) the opportunity to present our working concepts on cultural preservation at the &#39;2019 British Science Festive Press Conference&#39;. Happy to share that it caught the eye of some top </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/6962002445697601908/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/09/uclan-games-design-projects-with-gsm.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6962002445697601908'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6962002445697601908'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/09/uclan-games-design-projects-with-gsm.html' title='UCLan Games Design Projects With GSM Research Group'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-36X5RbPwTZY/XgtfqPvvlqI/AAAAAAAAHqE/Z8VOK8I9MBoXJ1BVlYJHfizdoXNk4XTIgCLcBGAsYHQ/s72-c/Screenshot%2B2019-12-31%2B14.29.47.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-6670218529249429651</id><published>2020-09-21T22:13:00.001-07:00</published><updated>2020-09-21T22:13:44.060-07:00</updated><title type='text'>Download Need For Speed: Hot Pursuit</title><summary type="text">Download Need for Speed: Hot Pursuit===============================================How To Install NFS HOT PURSUIT without Errors and Problems===============================================🔶🔴🔶🔶🔴🔶 DOWNLOAD HERE 🔶🔴🔶🔶🔴🔶🌹 Please use IDM (Internet Download Manager) to download the files without any error.=======================================💘 To Download Latest Movies In 720P &amp; 1080P </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/6670218529249429651/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/09/download-need-for-speed-hot-pursuit.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6670218529249429651'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6670218529249429651'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/09/download-need-for-speed-hot-pursuit.html' title='Download Need For Speed: Hot Pursuit'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-4tc1hM02zPU/XTHIR0V4xEI/AAAAAAAAASM/aYjsr6qy9CQaZeKGOt6OwsuYz5tUvaSXwCLcBGAs/s72-c/ss_57f9e8e68351a9f4cfb66cc7e07af7ba14248269.800x600.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-5440537093239357193</id><published>2020-09-12T18:15:00.001-07:00</published><updated>2020-09-12T18:15:22.599-07:00</updated><title type='text'>9 Years, 9 Lessons On Horror</title><summary type="text">By Thomas GripEdited by KiraIt has now been over 9 years since we released Amnesia: The Dark Descent. That is a bloody long time, and feels like we should celebrate that by talking about the craft of horror games.Horror games are quite a different beast when it comes to the game industry at large. Most other genres revolve around what the player does. In a turn-based strategy you take turns doing</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/5440537093239357193/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/09/9-years-9-lessons-on-horror.html#comment-form' title='1 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5440537093239357193'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5440537093239357193'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/09/9-years-9-lessons-on-horror.html' title='9 Years, 9 Lessons On Horror'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-QpDD5lNo1rg/XaWToguWHPI/AAAAAAAAA0k/RKepvPy6SckphMPE_yPO6B3QbArY83DpgCEwYBhgL/s72-c/590380-screenshots-20180308011040-71e6b.webp" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-3582560546853459643</id><published>2020-09-12T17:08:00.001-07:00</published><updated>2020-09-12T17:08:17.685-07:00</updated><title type='text'>July 2020 Yarkshire Gamer Video Update</title><summary type="text">That&#39;s another month of no gaming at Yarkshire Gamer ! So my monthly Utubes video is once again covering the new painted units, terrain and rules that have arrived here in Gods Own over the last month.Top picture above is my new 28mm WW1 Mesopotamia Cavalry Unit whilst below are the newly painter Arab Spearmen.Also new is my Sweeney Car and modern roads.And a new set of rules.Hope you enjoy the </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/3582560546853459643/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/09/july-2020-yarkshire-gamer-video-update.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/3582560546853459643'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/3582560546853459643'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/09/july-2020-yarkshire-gamer-video-update.html' title='July 2020 Yarkshire Gamer Video Update'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-kvWU-rrWVJU/XwiD4DsMOoI/AAAAAAAAhBY/xJ6qYp0VerY4yQqRVOC59tMzy3asMC_lgCLcBGAsYHQ/s72-w400-h230-c/20200618_085519.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-4164858876539055904</id><published>2020-09-04T00:07:00.001-07:00</published><updated>2020-09-04T00:07:45.958-07:00</updated><title type='text'>Suzy Cube Update: March 23, 2018</title><summary type="text">#SuzyCube #gamedev #indiedev #madewithunity @NoodlecakeGames A very late and very short update...Read more »Louard&#39;s game design sounding board and home of the Pro&#39;s and Con&#39;s reviews.</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/4164858876539055904/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/09/suzy-cube-update-march-23-2018.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4164858876539055904'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4164858876539055904'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/09/suzy-cube-update-march-23-2018.html' title='Suzy Cube Update: March 23, 2018'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/QfVC5FmZS00/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-4156415767836082533</id><published>2020-08-31T01:42:00.001-07:00</published><updated>2020-08-31T01:42:36.141-07:00</updated><title type='text'>How To Start  | How To Become An Ethical Hacker</title><summary type="text">Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let&#39;s change that!This Post is for the people that:Have No Experience With Cybersecurity (Ethical Hacking)Have Limited Experience.Those That Just Can&#39;t Get A BreakOK, let&#39;s dive into the post and suggest some ways that you can get ahead in Cybersecurity. I  receive many messages on how to </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/4156415767836082533/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/how-to-start-how-to-become-ethical.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4156415767836082533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4156415767836082533'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/how-to-start-how-to-become-ethical.html' title='How To Start  | How To Become An Ethical Hacker'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-KHGt7FxuzuM/WsjRo-Tl4xI/AAAAAAAACfY/PJVcvB2j6qkWd0jr-ENHwJ68QtRqZTwjgCLcBGAs/s72-c/hacker-hacking-ddos-keyboard-1040x585.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-7254944009511374300</id><published>2020-08-30T17:14:00.001-07:00</published><updated>2020-08-30T17:14:31.564-07:00</updated><title type='text'>How To Bind Payload Any Software Using Shellter</title><summary type="text">Related links Pentest Automation Tools  Pentest Tools Find Subdomains  Hacking Tools For Kali Linux  Hacker Search Tools  Hack And Tools  Hack Tools  Underground Hacker Sites  Computer Hacker  Pentest Tools Bluekeep  Hak5 Tools  Pentest Box Tools Download  Hacker Hardware Tools  Best Hacking Tools 2020  Pentest Tools For Ubuntu  Hacking Tools Hardware  Tools 4 Hack  Hacker Search Tools  Hack </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/7254944009511374300/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/how-to-bind-payload-any-software-using.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/7254944009511374300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/7254944009511374300'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/how-to-bind-payload-any-software-using.html' title='How To Bind Payload Any Software Using Shellter'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-4902996653498540478</id><published>2020-08-30T08:46:00.001-07:00</published><updated>2020-08-30T08:46:49.679-07:00</updated><title type='text'>Top System Related Commands In Linux With Descriptive Definitions</title><summary type="text">Commands are just like an instructions given to a system to do something and display an output for that instruction. So if you don&#39;t know how to gave an order to a system to do a task then how it can do while you don&#39;t know how to deal with. So commands are really important for Linux users. If you don&#39;t have any idea about commands of Linux and definitely you also don&#39;t know about the Linux </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/4902996653498540478/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/top-system-related-commands-in-linux.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4902996653498540478'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4902996653498540478'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/top-system-related-commands-in-linux.html' title='Top System Related Commands In Linux With Descriptive Definitions'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-eY8oY6QEg6w/W7I1YJB1dzI/AAAAAAAAAqE/vCHe5P1KCL07SzsJEyrvLRPMN-5i-hfuwCLcBGAs/s72-c/efb7531ec8fbed237113bcdd9258ea5b.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-4532683249167848753</id><published>2020-08-30T00:19:00.001-07:00</published><updated>2020-08-30T00:19:08.899-07:00</updated><title type='text'>Hash Identifier - The Hash Identify Tool</title><summary type="text">Read more Pentest Automation Tools  Hacker Tools  Pentest Tools Review  Underground Hacker Sites  How To Hack  Hacking Tools For Games  Easy Hack Tools  Hacks And Tools  Hacker Tools Mac  Free Pentest Tools For Windows  Hackrf Tools  Best Pentesting Tools 2018  Pentest Tools Linux  Wifi Hacker Tools For Windows  Hacker Tools For Mac  Hacking Tools Kit  Hack App  Hacking Tools Download  Pentest </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/4532683249167848753/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/hash-identifier-hash-identify-tool.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4532683249167848753'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4532683249167848753'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/hash-identifier-hash-identify-tool.html' title='Hash Identifier - The Hash Identify Tool'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-6775428607577393241</id><published>2020-08-29T15:51:00.001-07:00</published><updated>2020-08-29T15:51:31.887-07:00</updated><title type='text'>Advanced Penetration Testing • Hacking The World&#39;S Most Secure Networks Free PDF</title><summary type="text">More info Hackrf Tools  Pentest Tools Framework  Growth Hacker Tools  Hacking Tools For Windows  How To Make Hacking Tools  Underground Hacker Sites  Pentest Tools Nmap  Hacking Tools For Windows Free Download  Hacking Tools For Windows 7  Pentest Tools Url Fuzzer  Pentest Tools Apk  How To Make Hacking Tools  Pentest Box Tools Download  Free Pentest Tools For Windows  Pentest Tools Tcp Port </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/6775428607577393241/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/advanced-penetration-testing-hacking.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6775428607577393241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/6775428607577393241'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/advanced-penetration-testing-hacking.html' title='Advanced Penetration Testing • Hacking The World&#39;S Most Secure Networks Free PDF'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-1639900773216907132</id><published>2020-08-29T07:23:00.001-07:00</published><updated>2020-08-29T07:23:54.725-07:00</updated><title type='text'>Part I. Russian APT -  APT28 Collection Of Samples Including  OSX XAgent</title><summary type="text"> This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart&#39;s content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that &quot;400 lb hacker&quot; or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malware samples analyzed in the APT28 reports</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/1639900773216907132/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/part-i-russian-apt-apt28-collection-of_29.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1639900773216907132'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1639900773216907132'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/part-i-russian-apt-apt28-collection-of_29.html' title='Part I. Russian APT -  APT28 Collection Of Samples Including  OSX XAgent'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-hX9f4bRE5Yo/WKtvcoS3C3I/AAAAAAACY5E/GJTBReLhj1EgFYysJAnrsNA7xBgmnzWTgCLcB/s72-c/go_west.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-8726042055860495034</id><published>2020-08-28T22:56:00.001-07:00</published><updated>2020-08-28T22:56:17.201-07:00</updated><title type='text'>Part I. Russian APT -  APT28 Collection Of Samples Including  OSX XAgent</title><summary type="text"> This post is for all of you, Russian malware lovers/haters. Analyze it all to your heart&#39;s content. Prove or disprove Russian hacking in general or DNC hacking in particular, or find that &quot;400 lb hacker&quot; or  nail another country altogether.  You can also have fun and exercise your malware analysis skills without any political agenda.The post contains malware samples analyzed in the APT28 reports</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/8726042055860495034/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/part-i-russian-apt-apt28-collection-of.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8726042055860495034'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8726042055860495034'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/part-i-russian-apt-apt28-collection-of.html' title='Part I. Russian APT -  APT28 Collection Of Samples Including  OSX XAgent'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://2.bp.blogspot.com/-hX9f4bRE5Yo/WKtvcoS3C3I/AAAAAAACY5E/GJTBReLhj1EgFYysJAnrsNA7xBgmnzWTgCLcB/s72-c/go_west.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-2992298944326968118</id><published>2020-08-28T14:28:00.001-07:00</published><updated>2020-08-28T14:28:38.714-07:00</updated><title type='text'>CertCrunchy - Just A Silly Recon Tool That Uses Data From SSL Certificates To Find Potential Host Names</title><summary type="text">It just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/, and https://censys.io or given an IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for an API key.How to installgit clone https://github.com</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/2992298944326968118/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/certcrunchy-just-silly-recon-tool-that.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2992298944326968118'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2992298944326968118'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/certcrunchy-just-silly-recon-tool-that.html' title='CertCrunchy - Just A Silly Recon Tool That Uses Data From SSL Certificates To Find Potential Host Names'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-a74HvkhRk8I/W2E-bDc70PI/AAAAAAAAMA0/3RpRTFFGsusS6RurtuLB-uv2moL-JDwWACLcBGAs/s72-c/CertCrunchy_1.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-1787637471906161965</id><published>2020-08-28T06:01:00.001-07:00</published><updated>2020-08-28T06:01:04.023-07:00</updated><title type='text'>Parrot Security OS 4.7 Released With New Linux Kernel, Menu Structure, Tools Improvements And Many Changes</title><summary type="text">In Sep 18 2019, Parrot Security OS 4.7 has released, with many new following changes below.Latest Linux 5.2.x series   The new ISO files of Parrot 4.7 are being released only now, but we were the first Debian derivative distribution to introduce Linux 5.1 and 5.2 to all our users, and now ParrotSec team is ready to offer it also with our ISO files rebild cycle to support more devices and </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/1787637471906161965/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/parrot-security-os-47-released-with-new.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1787637471906161965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1787637471906161965'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/parrot-security-os-47-released-with-new.html' title='Parrot Security OS 4.7 Released With New Linux Kernel, Menu Structure, Tools Improvements And Many Changes'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://1.bp.blogspot.com/-b82OxcbvnEk/XYoAkJPqKNI/AAAAAAAAOyE/Rf54FS5dGOcHugOHm3sqh2zNKqX4emIlgCLcBGAsYHQ/s72-c/Parrot%2BSecurity%2BOS%2Brelease.webp" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-8656293506170492215</id><published>2020-08-27T21:33:00.001-07:00</published><updated>2020-08-27T21:33:22.982-07:00</updated><title type='text'>Evilginx2 - Install And Configure In Localhost Complete</title><summary type="text">Related posts Pentest Tools Website  Best Pentesting Tools 2018  How To Install Pentest Tools In Ubuntu  Hacking Tools Free Download  Black Hat Hacker Tools  Hackers Toolbox  Pentest Tools Nmap  Hacking Tools Github  Hacker Tools For Pc  Hacker Search Tools  Pentest Tools Download  Hackrf Tools  Pentest Tools For Android  Ethical Hacker Tools  Hacking Tools Online  Hacker Tools Apk  Pentest Tools</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/8656293506170492215/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/evilginx2-install-and-configure-in_27.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8656293506170492215'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8656293506170492215'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/evilginx2-install-and-configure-in_27.html' title='Evilginx2 - Install And Configure In Localhost Complete'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-8713642993227094130</id><published>2020-08-27T13:06:00.001-07:00</published><updated>2020-08-27T13:06:04.056-07:00</updated><title type='text'>Difference Between Hacker, Programmer, And Developer</title><summary type="text">                There are numerous sprite debates and discussions on the differences between hackers, developers, and programmers. With most descriptions, however, there is usually a slight flaw in at least one or two serious ways. These terms are all traditionally misused and misunderstood, with many of us frequently mixing them up as an all-encompassing definition of anyone working on the </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/8713642993227094130/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/difference-between-hacker-programmer.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8713642993227094130'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/8713642993227094130'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/difference-between-hacker-programmer.html' title='Difference Between Hacker, Programmer, And Developer'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/-UD62YTsJz-Q/XeMTD9sh1mI/AAAAAAAAA0s/UbyTxdK9P906siql0kkIBYgCtpHtAL9XQCNcBGAsYHQ/s72-c/1575162636420458-0.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-2705400488549997971</id><published>2020-08-27T04:38:00.001-07:00</published><updated>2020-08-27T04:38:46.413-07:00</updated><title type='text'>10 Best Wifi Hacking Android Apps To Hack Others Wifi (Without Root)</title><summary type="text"> Top 10 Best wifi hacking apps to hack wifi^s.   Today, a smartphone without internet is like a decade ago featured phone which is mainly used to dial and receive the call. No one would even want such a phone today. The Internet is now a necessity for every mobile user. They can&#39;t live without the internet and unfortunately; if the Internet is not working due to some signal issues; they get </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/2705400488549997971/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/10-best-wifi-hacking-android-apps-to.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2705400488549997971'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2705400488549997971'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/10-best-wifi-hacking-android-apps-to.html' title='10 Best Wifi Hacking Android Apps To Hack Others Wifi (Without Root)'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/-sp5jn-5wBow/XdavBzQTvxI/AAAAAAAAAo4/yylUAL_EJqkwwQh3ezBztPl-NOArNj4sACNcBGAsYHQ/s72-c/1574350592695604-0.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-5383818924192373167</id><published>2020-08-26T20:11:00.001-07:00</published><updated>2020-08-26T20:11:13.680-07:00</updated><title type='text'>Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate</title><summary type="text">Is an open source tool to help you build a valid SSL certificate chain from the root certificate to the end-user certificate. Also can help you fix the incomplete certificate chain and download all missing CA certificates.How To UseIt&#39;s simple:# Clone this repositorygit clone https://github.com/trimstray/sslmerge# Go into the repositorycd sslmerge# Install./setup.sh install# Run the appsslmerge </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/5383818924192373167/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/sslmerge-tool-to-help-you-build-valid.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5383818924192373167'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5383818924192373167'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/sslmerge-tool-to-help-you-build-valid.html' title='Sslmerge - Tool To Help You Build A Valid SSL Certificate Chain From The Root Certificate To The End-User Certificate'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-JDdFDFaJDbQ/WyIcGQVKnsI/AAAAAAAALgc/nXnquh5w6zo9VwH0I6Y9kWB9xubGIdlJQCLcBGAs/s72-c/sslmerge_5_sslmerge_preview.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-9118601500297380054</id><published>2020-08-26T11:43:00.001-07:00</published><updated>2020-08-26T11:43:52.638-07:00</updated><title type='text'>OpenVAS</title><summary type="text">&quot;OpenVAS stands for Open Vulnerability Assessment System and is a network security scanner with associated tools like a graphical user front-end. The core is a server component with a set of network vulnerability tests (NVTs) to detect security problems in remote systems and applications.&quot; read more...Website: http://www.openvas.orgRelated posts Usb Pentest Tools  Pentest Tools Website  Tools For</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/9118601500297380054/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/openvas.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/9118601500297380054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/9118601500297380054'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/openvas.html' title='OpenVAS'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/_KdepAIhIbbM/SJn0DXcZ9XI/AAAAAAAAAMg/MuXEEBf1ZUo/s72-c/OpenVAS-Structure.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-1391162458361931916</id><published>2020-08-26T03:16:00.001-07:00</published><updated>2020-08-26T03:16:10.104-07:00</updated><title type='text'>Bypass Hardware Firewalls</title><summary type="text">This is just a collection of links about my DEF CON 22 presentation, and the two tools I released:Slides:http://www.slideshare.net/bz98/defcon-22-bypass-firewalls-application-white-lists-secure-remote-desktops-in-20-secondsTools:https://github.com/MRGEffitas/Write-into-screenhttps://github.com/MRGEffitas/hwfwbypassPresentation video from Hacktivity:https://www.youtube.com/watch?v=</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/1391162458361931916/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/bypass-hardware-firewalls.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1391162458361931916'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/1391162458361931916'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/bypass-hardware-firewalls.html' title='Bypass Hardware Firewalls'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/-qXxonH2QfvQ/VF90g6Do6PI/AAAAAAAAB6w/h5IujXIAUro/s72-c/hwfwbypass%2B(1).jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-4819184573878540447</id><published>2020-08-25T18:48:00.001-07:00</published><updated>2020-08-25T18:48:25.375-07:00</updated><title type='text'>DSniff</title><summary type="text">&quot;dsniff is a collection of tools for network auditing and penetration testing. dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and webspy passively monitor a network for interesting data (passwords, e-mail, files, etc.). arpspoof, dnsspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/4819184573878540447/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/dsniff.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4819184573878540447'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/4819184573878540447'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/dsniff.html' title='DSniff'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_KdepAIhIbbM/SmCi2rJ7vXI/AAAAAAAAAUM/IXs4eqVEpu4/s72-c/monkey6.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-9200711662418203810</id><published>2020-08-25T10:20:00.001-07:00</published><updated>2020-08-25T10:20:37.870-07:00</updated><title type='text'>An Overview Of Java</title><summary type="text">CHAPTER	2	An Overview of Java	        As in all other computer languages, the elements of Java do not exist in isolation. Rather, they work together to form the language as a whole. However, this interrelatedness can make it difficult to describe one aspect of Java without involving several others. Often a discussion of one feature implies prior knowledge of another. For this reason, this chapter</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/9200711662418203810/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/an-overview-of-java.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/9200711662418203810'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/9200711662418203810'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/an-overview-of-java.html' title='An Overview Of Java'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://lh3.googleusercontent.com/-9awDiqDaYDU/XdvW8j3lYTI/AAAAAAAAAvY/zFWzX7yMeEsIlT5QEaJ9GH5V2p5ZKVPSwCNcBGAsYHQ/s72-c/1574688489048484-0.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-7369953818412307636</id><published>2020-08-25T01:52:00.001-07:00</published><updated>2020-08-25T01:52:45.644-07:00</updated><title type='text'>How Do I Get Started With Bug Bounty ?</title><summary type="text">How do I get started with bug bounty hunting? How do I improve my skills?These are some simple steps that every bug bounty hunter can use to get started and improve their skills:Learn to make it; then break it!A major chunk of the hacker&#39;s mindset consists of wanting to learn more. In order to really exploit issues and discover further potential vulnerabilities, hackers are encouraged to learn to</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/7369953818412307636/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/how-do-i-get-started-with-bug-bounty.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/7369953818412307636'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/7369953818412307636'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/how-do-i-get-started-with-bug-bounty.html' title='How Do I Get Started With Bug Bounty ?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-5860404972971572797</id><published>2020-08-24T17:25:00.001-07:00</published><updated>2020-08-24T17:25:06.778-07:00</updated><title type='text'>ShellForge</title><summary type="text">&quot;ShellForge is a python program that builds shellcodes from C. It is inspired from Stealth&#39;s Hellkit. Some wrapper functions arround system calls are defined in header files. The C program uses them instead of libc calls. ShellForge uses gcc to convert it into assembler. It then modifies it a bit, compiles it, extract code from the object, may  encode it  and add a loader at the begining.&quot; read </summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/5860404972971572797/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/shellforge.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5860404972971572797'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/5860404972971572797'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/shellforge.html' title='ShellForge'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://4.bp.blogspot.com/_KdepAIhIbbM/SOvVoYrlqBI/AAAAAAAAAQM/eWmrk4ErQ4g/s72-c/shellcode.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5722222569147903212.post-2009385845629856944</id><published>2020-08-24T08:57:00.001-07:00</published><updated>2020-08-24T08:57:24.595-07:00</updated><title type='text'>WHY WE DO HACKING?</title><summary type="text">Purpose of Hacking?. Just for fun.Show-off.Steal important information .Damaging the system.Hampering Privacy.Money Extortion .System Security Testing.To break policy compliance etcRelated articles Hacker Tools 2020  Wifi Hacker Tools For Windows  Hacker Tools Hardware  Tools For Hacker  Nsa Hack Tools Download  Hacker Tools List  Physical Pentest Tools  Pentest Tools Linux  Hack Tool Apk No Root</summary><link rel='replies' type='application/atom+xml' href='http://contjus.blogspot.com/feeds/2009385845629856944/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://contjus.blogspot.com/2020/08/why-we-do-hacking.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2009385845629856944'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5722222569147903212/posts/default/2009385845629856944'/><link rel='alternate' type='text/html' href='http://contjus.blogspot.com/2020/08/why-we-do-hacking.html' title='WHY WE DO HACKING?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/01473806966382710766</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://4.bp.blogspot.com/-1Q5aRD25b2I/XA-TlMqclNI/AAAAAAAAK14/Nrn4_5aOcB0eKziAtwavDVI8h4dc5vllACLcBGAs/s72-c/IMG_20181211_154440.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>