Skip content

111 120 156 results

Filter by

  • PoshC2 - new features

    There have been a few cool updates to PoshC2, our public Command & Control (C2) software, since we...

    Read more
  • An analysis of the RIG exploit kit

    Over the last few weeks, we have observed an increase of RIG exploit kit alarms, delivering CrypMIC ransomware. This...

    Read more
  • Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the...

    We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting...

    Read more
  • From macro to malware - a step by step...

    We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office...

    Read more
  • ZeroPress - A WordPress Vulnerability Hunter

    Finding WordPress plugin vulnerabilities is like shooting fish in a barrel.  Like taking candy from a baby.  Like…...

    Read more
  • Rocktastic: a word list on steroids

    Bigger isn’t always better, but sometimes it is. If you need a huge word list before you...

    Read more
  • Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have...

    Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with.  You may find...

    Read more
  • PoshC2 v1.0 released, a command and control framework

    PoshC2 is a proxy aware command and control framework written completely in PowerShell.  It is designed to aid penetration...

    Read more
  • QNAP Android: Don't Over Provide

    The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can...

    Read more
  • Escaping the Avast sandbox

    An Avast Sandbox escape, CVE-2016-4025, is possible due to a design flaw in the Avast DeepScreen feature.  It is...

    Read more

Error

Error

No results found

No results found that match your query

Loading results