From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress 16 Sep 2016 ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Rocktastic: a word list on steroids 8 Sep 2016 Bigger isn’t always better, but sometimes it is. If you need a huge word list before you... Read more
Rocktastic 8 Sep 2016 Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word... Read more
Cross Site Scripting Payloads 2 Sep 2016 We curate a set of fun and interesting Cross Site Scripting (XSS) payloads. They’re designed for quick... Read more
Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have... 2 Sep 2016 Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with. You may find... Read more
PoshC2 v1.0 released, a command and control framework 12 Jul 2016 PoshC2 is a proxy aware command and control framework written completely in PowerShell. It is designed to aid penetration... Read more
QNAP Android: Don't Over Provide 7 Jun 2016 The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can... Read more
QNAP android: don't over provide 7 Jun 2016 The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from OWASP M4 (2014), Unintended Data Leakage. Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*