Authored by Murat Demirci
Macro Expert version 4.9 suffers from an unquoted service path vulnerability.
Change Mirror Download
# Exploit Title: Macro Expert 4.9 - Unquoted Service...
By: Ravie Lakshmanan
Microsoft has disclosed details of an evasive year-long social engineering campaign wherein the operators kept changing their obfuscation and encryption mechanisms every...
By:
î ‚Mar 30, 2023î „Ravie LakshmananCloud Security / Vulnerability
Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to...
Ransomware Landscape Has Adapted and Evolved
Author: Kyle Fedorek
Ransomware attacks have increased manifold over the years and so have the ransom demands. This year-over-year evolution...
By: Tina Martin
Why You Need Cybersecurity to Protect Your Greatest Assets
When it comes to cybersecurity, you can never be too careful. After all, not...
By:
î ‚Feb 10, 2023î „Ravie LakshmananData Breach / Source Code
Popular social news aggregation platform Reddit has disclosed that it was the victim of a security...
Malicious threat actors might use cyber tools to disrupt the February Beijing Winter Olympics and March Paralympics.
Significant, high-profile events provide an opportunity for threat...
HomePostsGerman Man Accused of Running a Darkweb Child Abuse ForumGerman Man Accused of Running a Darkweb Child Abuse ForumThe Dresden Public Prosecutor’s Office accused...
I Can Haz Domain Admin?
Active Directory security is notoriously difficult. Small organizations generally have no idea what they're doing, and way too many people...
domhttpx is a google search engine dorker with HTTP toolkit built with python, can make it easier for you to find many URLs/IPs at once with fast time.
Usage
Flags
This...
Sniffle is a sniffer for Bluetooth 5 and 4.x (LE) using TI CC1352/CC26x2 hardware.
Sniffle has a number of useful features, including:
Support for BT5/4.2 extended...
Modular brute force tool written in Python, for very fast password spraying SSH, and FTP and in the near future other network services.
COMING SOON: SMB,...
This project builds virtual machine which can be used for analytics of tshark -T ek (ndjson) output. The virtual appliance is built using vagrant, which builds...
Authored by CraCkEr
osCommerce version 4 suffers from a cross site scripting vulnerability. This finding is another vector of attack for this issue already discovered...
Authored by gabe_k
Proof of concept code that demonstrates how the Windows kernel suffers from a privilege escalation vulnerability due to a double-fetch in NtQueryInformationThread...