The ProxyShell attacks against vulnerable Microsoft Exchange servers started several months ago, with LockFile and Conti being among the first… Read More
Talos researchers warn of a new threat actor that is hacking Microsoft Exchange servers by exploiting ProxyShell flaws to gain… Read More
Researchers have released public exploit code and a proof of concept tool to test Bluetooth devices against System-on-a-Chip (SoC) security… Read More
The purpose of this script is to automate the web enumeration process and search for exploits and vulns. Added Tools… Read More
A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.SummarySpoolSploit is a collection of Windows print… Read More
Experts reported new Mac ZuRu malware spreading via poisoned search engine results in China via Baidu. The criminals masquerade as… Read More
The proof-of-concept exploit code for three iOS zero-day vulnerabilities (and a fourth one patched in July) was published on GitHub… Read More
A newly discovered side-channel attack targeting Google Chrome can allow an attacker to overcome the web browser’s security defenses to… Read More
While Microsoft fully patched these vulnerabilities in May, technical details regarding exploiting the vulnerabilities were recently released, allowing threat actors… Read More
Microsoft has recently fixed a severe vulnerability that could allow PetiPotam NTLM relay attacks. However,… LockFile Ransomware Exploits PetiPotam To… Read More
The security experts of the cybersecurity firm, Volexity have recently reported an attack through which the North Korean Hacker Group… Read More
Features Exploits vulnerabilities in most popular camera models such as Novo, CeNova and QSee. Optimized to exploit multiple cameras at one time from list… Read More
Volexity attributes the compromise of the Daily NK website to a threat actor it refers to as InkySquid, which broadly… Read More
Zero-day exploit broker Zerodium announced it is looking for zero-day exploits for VMware vCenter Server. The company will pay up… Read More
According to experts, the member “integra” has joined the forum in September 2012 and has gained a high reputation over… Read More
CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials. Features Exploits vulnerabilities… Read More