Analysing the NULL SecurityDescriptor kernel exploitation mitigation in the... 13 Oct 2016 We recently discovered a new and quietly released Windows kernel exploitation defence. Exploiting a kernel bug by setting... Read more
From macro to malware - a step by step... 3 Oct 2016 We recently received an email which contained a malicious Word macro. Usually, the only thing that changes between malicious Office... Read more
ZeroPress 16 Sep 2016 ZeroPress provides a way to quickly catch critical impact ‘low hanging fruit’ vulnerabilities in WordPress. As a... Read more
ZeroPress - A WordPress Vulnerability Hunter 16 Sep 2016 Finding WordPress plugin vulnerabilities is like shooting fish in a barrel. Like taking candy from a baby. Like…... Read more
Rocktastic: a word list on steroids 8 Sep 2016 Bigger isn’t always better, but sometimes it is. If you need a huge word list before you... Read more
Rocktastic 8 Sep 2016 Bigger, better (faster, stronger…) Bigger isn’t always better, but sometimes it is. If you need a huge word... Read more
Cross Site Scripting Payloads 2 Sep 2016 We curate a set of fun and interesting Cross Site Scripting (XSS) payloads. They’re designed for quick... Read more
Introducing 'XSS Payloads' repository: Cross Site Scripting doesn't have... 2 Sep 2016 Sometimes, particularly when dealing with a system perimeter, there’s very little attack surface to deal with. You may find... Read more
PoshC2 v1.0 released, a command and control framework 12 Jul 2016 PoshC2 is a proxy aware command and control framework written completely in PowerShell. It is designed to aid penetration... Read more
QNAP Android: Don't Over Provide 7 Jun 2016 The QNAP Android applications Qnotes 1.1.8.0128 and Qget 2.0.1.1029 suffer from unintended data leakage. A malicious process can... Read more
Best seller New Price from Limited availability Course type Course length Dates and location x *PLEASE NOTE: Course is available in more countries, languages and dates*