@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Cookie-based SQL Injection

Injecting malicious code in cookie: Unlike other parameters, cookies are not supposed to be handled by users. Outside of session cookies which are (usually) random, cookies may contain data in clear or encoded in hexadecimal, base64, hashes (MD5, SHA1), serialized information. If we can determine the encoding used, we will attempt to inject SQL commands.

https://resources.infosecinstitute.com/cookie-based-sql-injection/#gref

🕴🏼 @Phantasm_Lab
Honeytrap is an extensible and opensource system for running, monitoring and managing honeypots.

To start using Honeytrap: See our documentation on docs.honeytrap.io.

https://github.com/honeytrap/honeytrap

🕴🏼 @Phantasm_Lab
Start the emulator from the command line

This page describes command-line features that you can use with the Android Emulator. For information about using the Android Emulator UI, see Run Apps on the Android Emulator.

https://developer.android.com/studio/run/emulator-commandline

🕴🏼 @Phantasm_Lab
Forwarded from SHELL SHOCK
CHFI Module 9 Data Akquisition & Duplication
http://www.mediafire.com/file/3dzf4qdln3pn6qi/CHFI_Module_9_Data_Acquisition_and_Duplication.rar

CHFI Module 10 Recovering deleted Files & & partitions
http://www.mediafire.com/file/ifl18p77a10c2az/CHFI_Module_10_Recovering_Deleted_Files_and_Partitions.rar

CHFI Module 11 Using Access Data FTK
http://www.mediafire.com/file/2zabeg7axi7cwdd/CHFI_Module_11_Using_Access_Data_FTK.rar

CHFI Module 12 Using EnCas
http://www.mediafire.com/file/m1nop2yk6pwsvn0/CHFI_Module_12_Using_EnCase.rar

CHFI Module 13 Steganography
http://www.mediafire.com/file/5aay0ed5uzt8y97/CHFI_Module_13_Steganography.rar

CHFI Module 14 Password Crackers
http://www.mediafire.com/file/k16714g10alwwkb/CHFI_Module_14_Password_Crackers.rar

CHFI Module 15 Log Correlation
http://www.mediafire.com/file/990ili11icinm5c/CHFI_Module_15_Log_Correlation.rar

CHFI Module 16 Network Forensics
http://www.mediafire.com/file/qsrr2yn0ptreyre/CHFI_Module_16_Network_Forensics.rar

CHFI Module 17 Wireless Attacks
http://www.mediafire.com/file/ip1ded3iumcr3dg/CHFI_Module_17_Wireless_Attacks.rar

CHFI Module 18 Web Attacks
http://www.mediafire.com/file/ldrew3v8x298htu/CHFI_Module_18_Web_Attacks.rar

CHFI Module 19 Email Crimes
http://www.mediafire.com/file/82xh758lt2by927/CHFI_Module_19_Email_Crimes.rar

CHFI Module 20 Mobile Investigation
http://www.mediafire.com/file/8lu73yi1s79iw1b/CHFI_Module_20_Mobile_Investigation.rar

CHFI Module 21 Investigative Reports
http://www.mediafire.com/file/jz70shpdzso40ne/CHFI_Module_21_Investigative_Reports.rar

CHFI Module 22 Expert Witness
http://www.mediafire.com/file/926yco1rhqo2ow2/CHFI+Module+22+Expert+Witness.rar
Forwarded from DARKNET BR
📚 #Ebook
🔖 Defensive Security Handbook
~ Best Practices For Securing Infrastructures

@DARKNET_BR
Forwarded from DARKNET BR
Defensive_Security_Handbook_Best.pdf
29.3 MB