FAKE EXPLOIT CODE |
2010-02-08 | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
FAKE |
2024-01-24/a> | Johannes Ullrich | How Bad User Interfaces Make Security Tools Harmful |
2022-03-02/a> | Johannes Ullrich | The More Often Something is Repeated, the More True It Becomes: Dealing with Social Media |
2022-01-03/a> | Xavier Mertens | McAfee Phishing Campaign with a Nice Fake Scan |
2021-08-04/a> | Yee Ching Tok | Pivoting and Hunting for Shenanigans from a Reported Phishing Domain |
2020-04-18/a> | Guy Bruneau | Maldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store |
2020-02-05/a> | Brad Duncan | Fake browser update pages are "still a thing" |
2019-04-07/a> | Guy Bruneau | Fake Office 365 Payment Information Update |
2019-04-02/a> | Johannes Ullrich | Fake AV is Back: LaCie Network Drives Used to Spread Malware |
2019-03-21/a> | Xavier Mertens | New Wave of Extortion Emails: Central Intelligence Agency Case |
2017-07-07/a> | Renato Marinho | DDoS Extortion E-mail: Yet Another Bluff? |
2016-05-12/a> | Xavier Mertens | Another Day, Another Wave of Phishing Emails |
2015-09-28/a> | Johannes Ullrich | "Transport of London" Malicious E-Mail |
2014-02-21/a> | Johannes Ullrich | UPS Malware Spam Using Fake SPF Headers |
2013-04-29/a> | Adam Swanger | Report Fake Tech Support Calls submission form reminder |
2013-04-16/a> | John Bambenek | Fake Boston Marathon Scams Update |
2013-01-03/a> | Manuel Humberto Santander Pelaez | New year and new CA compromised |
2012-12-06/a> | Daniel Wesemann | Fake tech support calls - revisited |
2012-10-03/a> | Kevin Shortt | Fake Support Calls Reported |
2012-06-19/a> | Daniel Wesemann | Vulnerabilityqueerprocessbrittleness |
2011-07-25/a> | Bojan Zdrnja | When the FakeAV coder(s) fail |
2011-07-21/a> | Daniel Wesemann | Down the FakeAV rabbit hole |
2011-05-19/a> | Daniel Wesemann | Fake AV Bingo |
2011-05-04/a> | Bojan Zdrnja | More on Google image poisoning |
2011-01-18/a> | Daniel Wesemann | Yet another rogue anti-virus |
2010-11-11/a> | Daniel Wesemann | Fake AV scams via Skype Chat |
2010-02-27/a> | Johannes Ullrich | Search Engine Poisoning: Chile Earthquake |
2010-02-15/a> | Johannes Ullrich | Various Olympics Related Dangerous Google Searches |
2010-02-08/a> | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
2010-01-08/a> | Rob VandenBrink | Microsoft OfficeOnline, Searching for Trust and Malware |
2009-09-17/a> | Bojan Zdrnja | Why is Rogue/Fake AV so successful? |
2009-09-04/a> | Adrien de Beaupre | Fake anti-virus |
2009-02-06/a> | Adrien de Beaupre | Fake stimulus payments |
2008-09-15/a> | donald smith | Fake antivirus 2009 and search engine results |
EXPLOIT |
2024-12-27/a> | Guy Bruneau | Phishing for Banking Information |
2024-09-24/a> | Johannes Ullrich | Exploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120 |
2024-07-16/a> | Guy Bruneau | Who You Gonna Call? AndroxGh0st Busters! [Guest Diary] |
2023-12-20/a> | Guy Bruneau | How to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary] |
2023-12-16/a> | Xavier Mertens | An Example of RocketMQ Exploit Scanner |
2023-04-18/a> | Johannes Ullrich | UDDIs are back? Attackers rediscovering old exploits. |
2023-03-16/a> | Xavier Mertens | Simple Shellcode Dissection |
2022-12-22/a> | Guy Bruneau | Exchange OWASSRF Exploited for Remote Code Execution |
2022-06-10/a> | Russ McRee | EPSScall: An Exploit Prediction Scoring System App |
2022-05-31/a> | Xavier Mertens | First Exploitation of Follina Seen in the Wild |
2022-05-07/a> | Guy Bruneau | Phishing PDF Received in my ISC Mailbox |
2022-03-31/a> | Johannes Ullrich | Spring Vulnerability Update - Exploitation Attempts CVE-2022-22965 |
2022-02-22/a> | Xavier Mertens | A Good Old Equation Editor Vulnerability Delivering Malware |
2022-02-01/a> | Xavier Mertens | Automation is Nice But Don't Replace Your Knowledge |
2022-01-25/a> | Bojan Zdrnja | Local privilege escalation vulnerability in polkit's pkexec (CVE-2021-4034) |
2021-11-26/a> | Guy Bruneau | Searching for Exposed ASUS Routers Vulnerable to CVE-2021-20090 |
2021-11-20/a> | Guy Bruneau | Hikvision Security Cameras Potentially Exposed to Remote Code Execution |
2021-10-30/a> | Guy Bruneau | Remote Desktop Protocol (RDP) Discovery |
2021-10-16/a> | Guy Bruneau | Apache is Actively Scan for CVE-2021-41773 & CVE-2021-42013 |
2021-10-09/a> | Guy Bruneau | Scanning for Previous Oracle WebLogic Vulnerabilities |
2021-06-26/a> | Guy Bruneau | CVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability |
2021-06-12/a> | Guy Bruneau | Fortinet Targeted for Unpatched SSL VPN Discovery Activity |
2021-06-11/a> | Xavier Mertens | Sonicwall SRA 4600 Targeted By an Old Vulnerability |
2021-03-10/a> | Rob VandenBrink | SharpRDP - PSExec without PSExec, PSRemoting without PowerShell |
2021-01-15/a> | Brad Duncan | Throwback Friday: An Example of Rig Exploit Kit |
2021-01-02/a> | Guy Bruneau | Protecting Home Office and Enterprise in 2021 |
2020-08-22/a> | Guy Bruneau | Remote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common? |
2020-08-08/a> | Guy Bruneau | Scanning Activity Include Netcat Listener |
2020-07-19/a> | Guy Bruneau | Scanning Activity for ZeroShell Unauthenticated Access |
2020-07-11/a> | Guy Bruneau | VMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html |
2020-07-11/a> | Guy Bruneau | Scanning Home Internet Facing Devices to Exploit |
2020-05-16/a> | Guy Bruneau | Scanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP) |
2019-10-20/a> | Guy Bruneau | Scanning Activity for NVMS-9000 Digital Video Recorder |
2019-09-07/a> | Guy Bruneau | Unidentified Scanning Activity |
2019-06-25/a> | Brad Duncan | Rig Exploit Kit sends Pitou.B Trojan |
2019-06-17/a> | Brad Duncan | An infection from Rig exploit kit |
2019-04-27/a> | Didier Stevens | Quick Tip for Dissecting CVE-2017-11882 Exploits |
2019-04-22/a> | Didier Stevens | .rar Files and ACE Exploit CVE-2018-20250 |
2018-12-23/a> | Guy Bruneau | Scanning Activity, end Goal is to add Hosts to Mirai Botnet |
2018-11-23/a> | Didier Stevens | Video: Dissecting a CVE-2017-11882 Exploit |
2018-09-24/a> | Didier Stevens | Analyzing Encoded Shellcode with scdbg |
2018-06-05/a> | Xavier Mertens | Malicious Post-Exploitation Batch File |
2018-05-20/a> | Didier Stevens | DASAN GPON home routers exploits in-the-wild |
2018-05-03/a> | Renato Marinho | WebLogic Exploited in the Wild (Again) |
2017-09-30/a> | Lorna Hutcheson | Who's Borrowing your Resources? |
2017-09-10/a> | Didier Stevens | Analyzing JPEG files |
2017-02-25/a> | Guy Bruneau | Unpatched Microsoft Edge and IE Bug |
2017-01-07/a> | Xavier Mertens | Using Security Tools to Compromize a Network |
2016-04-21/a> | Daniel Wesemann | Decoding Pseudo-Darkleech (#1) |
2016-03-13/a> | Guy Bruneau | A Look at the Mandiant M-Trends 2016 Report |
2015-07-27/a> | Daniel Wesemann | Angler's best friends |
2015-03-10/a> | Brad Duncan | Threatglass has pcap files with exploit kit activity |
2015-02-04/a> | Alex Stanford | Exploit Kit Evolution - Neutrino |
2014-08-16/a> | Lenny Zeltser | Web Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability |
2014-07-22/a> | Daniel Wesemann | Ivan's Order of Magnitude |
2014-02-28/a> | Daniel Wesemann | Fiesta! |
2014-02-13/a> | Johannes Ullrich | Linksys Worm ("TheMoon") Captured |
2014-02-12/a> | Johannes Ullrich | Suspected Mass Exploit Against Linksys E1000 / E1200 Routers |
2013-10-01/a> | John Bambenek | *Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893 |
2013-09-20/a> | Russ McRee | Threat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild |
2013-05-22/a> | Adrien de Beaupre | Privilege escalation, why should I care? |
2013-02-21/a> | Pedro Bueno | NBC site redirecting to Exploit kit |
2013-02-17/a> | Guy Bruneau | Adobe Acrobat and Reader Security Update Planned this Week |
2013-02-13/a> | Swa Frantzen | More adobe reader and acrobat (PDF) trouble |
2013-01-05/a> | Guy Bruneau | Adobe ColdFusion Security Advisory |
2013-01-04/a> | Guy Bruneau | "FixIt" Patch for CVE-2012-4792 Bypassed |
2012-12-10/a> | Johannes Ullrich | Your CPA License has not been revoked |
2012-12-02/a> | Guy Bruneau | Zero Day MySQL Buffer Overflow |
2012-08-05/a> | Daniel Wesemann | Phishing for Payroll with unpatched Java |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-06-18/a> | Guy Bruneau | CVE-2012-1875 exploit is now available |
2012-05-05/a> | Tony Carothers | Vulnerability Exploit for Snow Leopard |
2012-04-26/a> | Richard Porter | Packetstorm Security and Metasploit have Exploit code for MS12-027 |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-12-08/a> | Adrien de Beaupre | Newest Adobe Flash 11.1.102.55 and Previous 0 Day Exploit |
2011-12-06/a> | Pedro Bueno | The RedRet connection... |
2011-11-22/a> | Pedro Bueno | Updates on ZeroAccess and BlackHole front... |
2011-10-13/a> | Johannes Ullrich | Critical OS X Vulnerability Patched |
2011-05-06/a> | Richard Porter | Updated Exploit Index for Microsoft |
2011-03-29/a> | Daniel Wesemann | Malware emails with fake cellphone invoice |
2011-03-15/a> | Lenny Zeltser | Limiting Exploit Capabilities by Using Windows Integrity Levels |
2011-03-09/a> | Kevin Shortt | AVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B |
2011-02-16/a> | Jason Lam | Windows 0-day SMB mrxsmb.dll vulnerability |
2010-12-27/a> | Johannes Ullrich | Various sites "Owned and Exposed" |
2010-12-13/a> | Deborah Hale | The Week to Top All Weeks |
2010-12-02/a> | Kevin Johnson | ProFTPD distribution servers compromised |
2010-11-01/a> | Manuel Humberto Santander Pelaez | CVE-2010-3654 exploit in the wild |
2010-09-26/a> | Daniel Wesemann | PDF analysis paper |
2010-09-14/a> | Adrien de Beaupre | Adobe Flash v10.1.82.76 and earlier vulnerability in-the-wild |
2010-09-13/a> | Manuel Humberto Santander Pelaez | Enhanced Mitigation Experience Toolkit can block Adobe 0-day exploit |
2010-09-13/a> | Manuel Humberto Santander Pelaez | Adobe SING table parsing exploit (CVE-2010-2883) in the wild |
2010-09-02/a> | Daniel Wesemann | SDF, please! |
2010-08-22/a> | Manuel Humberto Santander Pelaez | Anatomy of a PDF exploit |
2010-06-15/a> | Manuel Humberto Santander Pelaez | Microsoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild |
2010-06-06/a> | Manuel Humberto Santander Pelaez | Nice OS X exploit tutorial |
2010-05-23/a> | Manuel Humberto Santander Pelaez | Oracle Java SE and Java for Business 'MixerSequencer' Remote Code Execution Vulnerability |
2010-04-10/a> | Andre Ludwig | New bug/exploit for javaws |
2010-02-08/a> | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
2010-01-24/a> | Pedro Bueno | Outdated client applications |
2010-01-19/a> | Johannes Ullrich | Unpatched Microsoft Windows (all versions) Privilege Escalation Vulnerability Released |
2010-01-12/a> | Adrien de Beaupre | PoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability |
2009-12-05/a> | Guy Bruneau | Java JRE Buffer and Integer Overflow |
2009-11-16/a> | G. N. White | Reports of a successful exploit of the SSL Renegotiation Vulnerability? |
2009-11-14/a> | Adrien de Beaupre | Microsoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released |
2009-11-12/a> | Rob VandenBrink | Windows 7 / Windows Server 2008 Remote SMB Exploit |
2009-10-21/a> | Pedro Bueno | WordPress Hardening |
2009-09-16/a> | Bojan Zdrnja | SMB2 remote exploit released |
2009-08-31/a> | Pedro Bueno | Microsoft IIS 5/6 FTP 0Day released |
2009-08-18/a> | Bojan Zdrnja | MS09-039 exploit in the wild? |
2009-07-16/a> | Bojan Zdrnja | OWC exploits used in SQL injection attacks |
2009-07-15/a> | Bojan Zdrnja | Make sure you update that Java |
2009-07-13/a> | Adrien de Beaupre | * Infocon raised to yellow for Excel Web Components ActiveX vulnerability |
2009-07-10/a> | Guy Bruneau | WordPress Fixes Multiple vulnerabilities |
2009-07-09/a> | Bojan Zdrnja | OpenSSH 0day FUD |
2009-06-12/a> | Adrien de Beaupre | Green Dam |
2009-06-08/a> | Chris Carboni | Kloxo (formerly Lxadmin) Vulnerability Exploited |
2009-05-06/a> | Tom Liston | Follow The Bouncing Malware: Gone With the WINS |
2009-04-24/a> | Pedro Bueno | Did you check your conference goodies? |
2009-04-14/a> | Swa Frantzen | VMware exploits - just how bad is it ? |
2009-03-19/a> | Mark Hofman | Browsers Tumble at CanSecWest |
2009-03-18/a> | Adrien de Beaupre | Adobe Security Bulletin Adobe Reader and Acrobat |
2009-02-25/a> | Andre Ludwig | Adobe Acrobat pdf 0-day exploit, No JavaScript needed! |
2009-02-25/a> | Andre Ludwig | Preview/Iphone/Linux pdf issues |
2008-08-26/a> | John Bambenek | Active attacks using stolen SSH keys (UPDATED) |
2008-05-07/a> | Jim Clausing | More on automated exploit generation |
2008-05-05/a> | John Bambenek | Defenses Against Automated Patch-Based Exploit Generation |
2008-04-24/a> | Maarten Van Horenbeeck | Targeted attacks using malicious PDF files |
2008-04-18/a> | John Bambenek | The Patch Window is Gone: Automated Patch-Based Exploit Generation |
2008-04-10/a> | Deborah Hale | Symantec Threatcon Level 2 |
2006-11-20/a> | Joel Esler | MS06-070 Remote Exploit |
CODE |
2025-03-10/a> | Xavier Mertens | Shellcode Encoded in UUIDs |
2024-12-31/a> | Xavier Mertens | No Holiday Season for Attackers |
2024-08-23/a> | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-19/a> | Xavier Mertens | Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python |
2023-12-06/a> | Guy Bruneau | Revealing the Hidden Risks of QR Codes [Guest Diary] |
2023-07-28/a> | Xavier Mertens | ShellCode Hidden with Steganography |
2023-03-16/a> | Xavier Mertens | Simple Shellcode Dissection |
2023-03-07/a> | Johannes Ullrich | Hackers Love This VSCode Extension: What You Can Do to Stay Safe |
2022-11-04/a> | Xavier Mertens | Remcos Downloader with Unicode Obfuscation |
2022-09-14/a> | Xavier Mertens | Easy Process Injection within Python |
2022-05-30/a> | Xavier Mertens | New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) |
2022-02-26/a> | Guy Bruneau | Using Snort IDS Rules with NetWitness PacketDecoder |
2022-01-22/a> | Xavier Mertens | Mixed VBA & Excel4 Macro In a Targeted Excel Sheet |
2022-01-20/a> | Xavier Mertens | RedLine Stealer Delivered Through FTP |
2022-01-06/a> | Xavier Mertens | Malicious Python Script Targeting Chinese People |
2022-01-05/a> | Xavier Mertens | Code Reuse In the Malware Landscape |
2021-12-10/a> | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-10-20/a> | Xavier Mertens | Thanks to COVID-19, New Types of Documents are Lost in The Wild |
2021-08-20/a> | Xavier Mertens | Waiting for the C2 to Show Up |
2021-02-13/a> | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2021-01-18/a> | Didier Stevens | Doc & RTF Malicious Document |
2020-10-14/a> | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-02/a> | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-06/a> | Xavier Mertens | A Fork of the FTCode Powershell Ransomware |
2020-07-27/a> | Didier Stevens | Analyzing Metasploit ASP .NET Payloads |
2019-12-12/a> | Xavier Mertens | Code & Data Reuse in the Malware Ecosystem |
2019-10-27/a> | Didier Stevens | Using scdbg to Find Shellcode |
2019-07-08/a> | Didier Stevens | Machine Code? No! |
2019-07-04/a> | Didier Stevens | Machine Code? |
2019-05-31/a> | Didier Stevens | Retrieving Second Stage Payload with Ncat |
2019-05-30/a> | Didier Stevens | Analyzing First Stage Shellcode |
2019-05-06/a> | Didier Stevens | Text and Text |
2019-05-01/a> | Xavier Mertens | Another Day, Another Suspicious UDF File |
2019-04-23/a> | Didier Stevens | Malicious VBA Office Document Without Source Code |
2019-03-24/a> | Didier Stevens | Decoding QR Codes with Python |
2019-02-25/a> | Didier Stevens | Sextortion Email Variant: With QR Code |
2019-01-02/a> | Didier Stevens | Maldoc with Nonfunctional Shellcode |
2018-09-24/a> | Didier Stevens | Analyzing Encoded Shellcode with scdbg |
2018-09-08/a> | Didier Stevens | Video: Using scdbg to analyze shellcode |
2018-09-03/a> | Didier Stevens | Another quickie: Using scdbg to analyze shellcode |
2018-08-31/a> | Jim Clausing | Quickie: Using radare2 to disassemble shellcode |
2018-06-04/a> | Rob VandenBrink | Digging into Authenticode Certificates |
2017-04-16/a> | Johannes Ullrich | Tool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains |
2016-11-24/a> | Didier Stevens | Extracting Shellcode From JavaScript |
2016-11-18/a> | Didier Stevens | VBA Shellcode and Windows 10 |
2016-09-26/a> | Didier Stevens | VBA and P-code |
2015-09-21/a> | Xavier Mertens | Detecting XCodeGhost Activity |
2015-03-30/a> | Didier Stevens | YARA Rules For Shellcode |
2013-10-25/a> | Johannes Ullrich | PHP.net compromise aftermath: Why Code Signing Beats Hashes |
2013-08-04/a> | Johannes Ullrich | BBCode tag "[php]" used to inject php code |
2013-02-16/a> | Lorna Hutcheson | Fedora RedHat Vulnerabilty Released |
2012-07-19/a> | Mark Baggett | A Heap of Overflows? |
2012-04-26/a> | Richard Porter | Packetstorm Security and Metasploit have Exploit code for MS12-027 |
2012-04-25/a> | Daniel Wesemann | Blacole's shell code |
2012-03-16/a> | Russ McRee | MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect |
2012-03-11/a> | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-08-11/a> | Guy Bruneau | BlackBerry Enterprise Server Critical Update |
2011-08-03/a> | Johannes Ullrich | Malicious Images: What's a QR Code |
2011-03-07/a> | Bojan Zdrnja | Oracle padding attacks (Codegate crypto 400 writeup) |
2010-05-12/a> | Rob VandenBrink | Adobe Shockwave Update |
2010-03-10/a> | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-02-08/a> | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
2009-08-08/a> | Guy Bruneau | XML Libraries Data Parsing Vulnerabilities |
2009-05-29/a> | Lorna Hutcheson | VMWare Patches Released |
2008-07-22/a> | Mari Nichols | ‘Cold Boot’ Attack Utility Tools |
2008-06-10/a> | Swa Frantzen | Ransomware keybreaking |