Skip content

131 140 191 results

Filter by

  • From macro to malware - a step by step...

    We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office...

    Read more
  • ZeroPress

    ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a...

    Read more
  • ZeroPress - A WordPress Vulnerability Hunter

    Finding WordPress plugin vulnerabilities is like shooting fish in a barrel.  Like taking candy from a baby.  Like…...

    Read more
  • Rocktastic: a word list on steroids

    Bigger isn’t always better, but sometimes it is. If you need a huge word list before you...

    Read more
  • Rocktastic

    Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word...

    Read more
  • Cross Site Scripting Payloads

    We curate a set of fun and interesting Cross Site Scripting (XSS) payloads. They’re designed for quick...

    Read more
  • Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have...

    Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with.  You may find...

    Read more
  • PoshC2 v1.0 released, a command and control framework

    PoshC2 is a proxy aware command and control framework written completely in PowerShell.  It is designed to aid penetration...

    Read more
  • QNAP Android: Don't Over Provide

    The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can...

    Read more
  • QNAP android: don't over provide

    The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from OWASP M4 (2014), Unintended Data Leakage.

    Read more

Error

Error

No results found

No results found that match your query

Loading results