PoshC2 - new features 1 Dec 2016 There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we... Read more
An analysis of the RIG exploit kit 27 Oct 2016 Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This... Read more
Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the... 13 Oct 2016 We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting... Read more
From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Rocktastic: a word list on steroids 8 Sep 2016 Bigger isn’t always better, but sometimes it is. If you need a huge word list before you... Read more
Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have... 2 Sep 2016 Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with. You may find... Read more
PoshC2 v1.0 released, a command and control framework 12 Jul 2016 PoshC2 is a proxy aware command and control framework written completely in PowerShell. It is designed to aid penetration... Read more
QNAP Android: Don't Over Provide 7 Jun 2016 The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can... Read more
Escaping the Avast sandbox 19 Apr 2016 An Avast Sandbox escape, CVE-2016-4025, is possible due to a design flaw in the Avast DeepScreen feature. It is... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*