Date Author Title

FAKE EXPLOIT CODE

2010-02-08Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.

FAKE

2024-01-24/a>Johannes UllrichHow Bad User Interfaces Make Security Tools Harmful
2022-03-02/a>Johannes UllrichThe More Often Something is Repeated, the More True It Becomes: Dealing with Social Media
2022-01-03/a>Xavier MertensMcAfee Phishing Campaign with a Nice Fake Scan
2021-08-04/a>Yee Ching TokPivoting and Hunting for Shenanigans from a Reported Phishing Domain
2020-04-18/a>Guy BruneauMaldoc Falsely Represented as DOCX Invoice Redirecting to Fake Apple Store
2020-02-05/a>Brad DuncanFake browser update pages are "still a thing"
2019-04-07/a>Guy BruneauFake Office 365 Payment Information Update
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2019-03-21/a>Xavier MertensNew Wave of Extortion Emails: Central Intelligence Agency Case
2017-07-07/a>Renato MarinhoDDoS Extortion E-mail: Yet Another Bluff?
2016-05-12/a>Xavier MertensAnother Day, Another Wave of Phishing Emails
2015-09-28/a>Johannes Ullrich"Transport of London" Malicious E-Mail
2014-02-21/a>Johannes UllrichUPS Malware Spam Using Fake SPF Headers
2013-04-29/a>Adam SwangerReport Fake Tech Support Calls submission form reminder
2013-04-16/a>John BambenekFake Boston Marathon Scams Update
2013-01-03/a>Manuel Humberto Santander PelaezNew year and new CA compromised
2012-12-06/a>Daniel WesemannFake tech support calls - revisited
2012-10-03/a>Kevin ShorttFake Support Calls Reported
2012-06-19/a>Daniel Wesemann Vulnerabilityqueerprocessbrittleness
2011-07-25/a>Bojan ZdrnjaWhen the FakeAV coder(s) fail
2011-07-21/a>Daniel WesemannDown the FakeAV rabbit hole
2011-05-19/a>Daniel WesemannFake AV Bingo
2011-05-04/a>Bojan ZdrnjaMore on Google image poisoning
2011-01-18/a>Daniel WesemannYet another rogue anti-virus
2010-11-11/a>Daniel WesemannFake AV scams via Skype Chat
2010-02-27/a>Johannes UllrichSearch Engine Poisoning: Chile Earthquake
2010-02-15/a>Johannes UllrichVarious Olympics Related Dangerous Google Searches
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2009-09-17/a>Bojan ZdrnjaWhy is Rogue/Fake AV so successful?
2009-09-04/a>Adrien de BeaupreFake anti-virus
2009-02-06/a>Adrien de BeaupreFake stimulus payments
2008-09-15/a>donald smithFake antivirus 2009 and search engine results

EXPLOIT

2024-09-24/a>Johannes UllrichExploitation of RAISECOM Gateway Devices Vulnerability CVE-2024-7120
2024-07-16/a>Guy BruneauWho You Gonna Call? AndroxGh0st Busters! [Guest Diary]
2023-12-20/a>Guy BruneauHow to Protect your Webserver from Directory Enumeration Attack ? Apache2 [Guest Diary]
2023-12-16/a>Xavier MertensAn Example of RocketMQ Exploit Scanner
2023-04-18/a>Johannes UllrichUDDIs are back? Attackers rediscovering old exploits.
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2022-12-22/a>Guy BruneauExchange OWASSRF Exploited for Remote Code Execution
2022-06-10/a>Russ McReeEPSScall: An Exploit Prediction Scoring System App
2022-05-31/a>Xavier MertensFirst Exploitation of Follina Seen in the Wild
2022-05-07/a>Guy BruneauPhishing PDF Received in my ISC Mailbox
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-02-22/a>Xavier MertensA Good Old Equation Editor Vulnerability Delivering Malware
2022-02-01/a>Xavier MertensAutomation is Nice But Don't Replace Your Knowledge
2022-01-25/a>Bojan ZdrnjaLocal privilege escalation vulnerability in polkit's pkexec (CVE-2021-4034)
2021-11-26/a>Guy BruneauSearching for Exposed ASUS Routers Vulnerable to CVE-2021-20090
2021-11-20/a>Guy BruneauHikvision Security Cameras Potentially Exposed to Remote Code Execution
2021-10-30/a>Guy BruneauRemote Desktop Protocol (RDP) Discovery
2021-10-16/a>Guy BruneauApache is Actively Scan for CVE-2021-41773 & CVE-2021-42013
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-06-26/a>Guy BruneauCVE-2019-9670: Zimbra Collaboration Suite XXE vulnerability
2021-06-12/a>Guy BruneauFortinet Targeted for Unpatched SSL VPN Discovery Activity
2021-06-11/a>Xavier MertensSonicwall SRA 4600 Targeted By an Old Vulnerability
2021-03-10/a>Rob VandenBrinkSharpRDP - PSExec without PSExec, PSRemoting without PowerShell
2021-01-15/a>Brad DuncanThrowback Friday: An Example of Rig Exploit Kit
2021-01-02/a>Guy BruneauProtecting Home Office and Enterprise in 2021
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-08-08/a>Guy BruneauScanning Activity Include Netcat Listener
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-07-11/a>Guy BruneauVMware XPC Client validation privilege escalation vulnerability - https://www.vmware.com/security/advisories/VMSA-2020-0017.html
2020-07-11/a>Guy BruneauScanning Home Internet Facing Devices to Exploit
2020-05-16/a>Guy BruneauScanning for Outlook Web Access (OWA) & Microsoft Exchange Control Panel (ECP)
2019-10-20/a>Guy BruneauScanning Activity for NVMS-9000 Digital Video Recorder
2019-09-07/a>Guy BruneauUnidentified Scanning Activity
2019-06-25/a>Brad DuncanRig Exploit Kit sends Pitou.B Trojan
2019-06-17/a>Brad DuncanAn infection from Rig exploit kit
2019-04-27/a>Didier StevensQuick Tip for Dissecting CVE-2017-11882 Exploits
2019-04-22/a>Didier Stevens.rar Files and ACE Exploit CVE-2018-20250
2018-12-23/a>Guy BruneauScanning Activity, end Goal is to add Hosts to Mirai Botnet
2018-11-23/a>Didier StevensVideo: Dissecting a CVE-2017-11882 Exploit
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-06-05/a>Xavier MertensMalicious Post-Exploitation Batch File
2018-05-20/a>Didier StevensDASAN GPON home routers exploits in-the-wild
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2017-09-30/a>Lorna HutchesonWho's Borrowing your Resources?
2017-09-10/a>Didier StevensAnalyzing JPEG files
2017-02-25/a>Guy BruneauUnpatched Microsoft Edge and IE Bug
2017-01-07/a>Xavier MertensUsing Security Tools to Compromize a Network
2016-04-21/a>Daniel WesemannDecoding Pseudo-Darkleech (#1)
2016-03-13/a>Guy BruneauA Look at the Mandiant M-Trends 2016 Report
2015-07-27/a>Daniel WesemannAngler's best friends
2015-03-10/a>Brad DuncanThreatglass has pcap files with exploit kit activity
2015-02-04/a>Alex StanfordExploit Kit Evolution - Neutrino
2014-08-16/a>Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-07-22/a>Daniel WesemannIvan's Order of Magnitude
2014-02-28/a>Daniel WesemannFiesta!
2014-02-13/a>Johannes UllrichLinksys Worm ("TheMoon") Captured
2014-02-12/a>Johannes UllrichSuspected Mass Exploit Against Linksys E1000 / E1200 Routers
2013-10-01/a>John Bambenek*Metaspoit Releases Module to Exploit Unpatched IE Vuln CVE-2013-3893
2013-09-20/a>Russ McReeThreat Level Yellow: Protection recommendations regarding Internet Explorer exploits in the wild
2013-05-22/a>Adrien de BeauprePrivilege escalation, why should I care?
2013-02-21/a>Pedro BuenoNBC site redirecting to Exploit kit
2013-02-17/a>Guy BruneauAdobe Acrobat and Reader Security Update Planned this Week
2013-02-13/a>Swa FrantzenMore adobe reader and acrobat (PDF) trouble
2013-01-05/a>Guy BruneauAdobe ColdFusion Security Advisory
2013-01-04/a>Guy Bruneau"FixIt" Patch for CVE-2012-4792 Bypassed
2012-12-10/a>Johannes UllrichYour CPA License has not been revoked
2012-12-02/a>Guy BruneauZero Day MySQL Buffer Overflow
2012-08-05/a>Daniel WesemannPhishing for Payroll with unpatched Java
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-06-18/a>Guy BruneauCVE-2012-1875 exploit is now available
2012-05-05/a>Tony CarothersVulnerability Exploit for Snow Leopard
2012-04-26/a>Richard PorterPacketstorm Security and Metasploit have Exploit code for MS12-027
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2011-12-08/a>Adrien de BeaupreNewest Adobe Flash 11.1.102.55 and Previous 0 Day Exploit
2011-12-06/a>Pedro BuenoThe RedRet connection...
2011-11-22/a>Pedro BuenoUpdates on ZeroAccess and BlackHole front...
2011-10-13/a>Johannes UllrichCritical OS X Vulnerability Patched
2011-05-06/a>Richard PorterUpdated Exploit Index for Microsoft
2011-03-29/a>Daniel WesemannMalware emails with fake cellphone invoice
2011-03-15/a>Lenny ZeltserLimiting Exploit Capabilities by Using Windows Integrity Levels
2011-03-09/a>Kevin ShorttAVG Anti-Virus 2011 False Positives - Luhe.Exploit.PDF.B
2011-02-16/a>Jason LamWindows 0-day SMB mrxsmb.dll vulnerability
2010-12-27/a>Johannes UllrichVarious sites "Owned and Exposed"
2010-12-13/a>Deborah HaleThe Week to Top All Weeks
2010-12-02/a>Kevin JohnsonProFTPD distribution servers compromised
2010-11-01/a>Manuel Humberto Santander PelaezCVE-2010-3654 exploit in the wild
2010-09-26/a>Daniel WesemannPDF analysis paper
2010-09-14/a>Adrien de BeaupreAdobe Flash v10.1.82.76 and earlier vulnerability in-the-wild
2010-09-13/a>Manuel Humberto Santander Pelaez Enhanced Mitigation Experience Toolkit can block Adobe 0-day exploit
2010-09-13/a>Manuel Humberto Santander PelaezAdobe SING table parsing exploit (CVE-2010-2883) in the wild
2010-09-02/a>Daniel WesemannSDF, please!
2010-08-22/a>Manuel Humberto Santander PelaezAnatomy of a PDF exploit
2010-06-15/a>Manuel Humberto Santander PelaezMicrosoft Windows Help and Support Center vulnerability (CVE 2010-1885) exploit in the wild
2010-06-06/a>Manuel Humberto Santander PelaezNice OS X exploit tutorial
2010-05-23/a>Manuel Humberto Santander PelaezOracle Java SE and Java for Business 'MixerSequencer' Remote Code Execution Vulnerability
2010-04-10/a>Andre LudwigNew bug/exploit for javaws
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2010-01-24/a>Pedro BuenoOutdated client applications
2010-01-19/a>Johannes UllrichUnpatched Microsoft Windows (all versions) Privilege Escalation Vulnerability Released
2010-01-12/a>Adrien de BeauprePoC for CVE-2009-0689 MacOS X 10.5/10.6 vulnerability
2009-12-05/a>Guy BruneauJava JRE Buffer and Integer Overflow
2009-11-16/a>G. N. WhiteReports of a successful exploit of the SSL Renegotiation Vulnerability?
2009-11-14/a>Adrien de BeaupreMicrosoft advisory for Windows 7 / Windows Server 2008 R2 Remote SMB DoS Exploit released
2009-11-12/a>Rob VandenBrinkWindows 7 / Windows Server 2008 Remote SMB Exploit
2009-10-21/a>Pedro BuenoWordPress Hardening
2009-09-16/a>Bojan ZdrnjaSMB2 remote exploit released
2009-08-31/a>Pedro BuenoMicrosoft IIS 5/6 FTP 0Day released
2009-08-18/a>Bojan ZdrnjaMS09-039 exploit in the wild?
2009-07-16/a>Bojan ZdrnjaOWC exploits used in SQL injection attacks
2009-07-15/a>Bojan ZdrnjaMake sure you update that Java
2009-07-13/a>Adrien de Beaupre* Infocon raised to yellow for Excel Web Components ActiveX vulnerability
2009-07-10/a>Guy BruneauWordPress Fixes Multiple vulnerabilities
2009-07-09/a>Bojan ZdrnjaOpenSSH 0day FUD
2009-06-12/a>Adrien de BeaupreGreen Dam
2009-06-08/a>Chris CarboniKloxo (formerly Lxadmin) Vulnerability Exploited
2009-05-06/a>Tom ListonFollow The Bouncing Malware: Gone With the WINS
2009-04-24/a>Pedro BuenoDid you check your conference goodies?
2009-04-14/a>Swa FrantzenVMware exploits - just how bad is it ?
2009-03-19/a>Mark HofmanBrowsers Tumble at CanSecWest
2009-03-18/a>Adrien de BeaupreAdobe Security Bulletin Adobe Reader and Acrobat
2009-02-25/a>Andre LudwigAdobe Acrobat pdf 0-day exploit, No JavaScript needed!
2009-02-25/a>Andre LudwigPreview/Iphone/Linux pdf issues
2008-08-26/a>John BambenekActive attacks using stolen SSH keys (UPDATED)
2008-05-07/a>Jim ClausingMore on automated exploit generation
2008-05-05/a>John BambenekDefenses Against Automated Patch-Based Exploit Generation
2008-04-24/a>Maarten Van HorenbeeckTargeted attacks using malicious PDF files
2008-04-18/a>John BambenekThe Patch Window is Gone: Automated Patch-Based Exploit Generation
2008-04-10/a>Deborah HaleSymantec Threatcon Level 2
2006-11-20/a>Joel EslerMS06-070 Remote Exploit

CODE

2024-08-23/a>Jesse La GrewPandas Errors: What encoding are my logs in?
2024-08-19/a>Xavier MertensDo you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2023-12-06/a>Guy BruneauRevealing the Hidden Risks of QR Codes [Guest Diary]
2023-07-28/a>Xavier MertensShellCode Hidden with Steganography
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-03-07/a>Johannes UllrichHackers Love This VSCode Extension: What You Can Do to Stay Safe
2022-11-04/a>Xavier MertensRemcos Downloader with Unicode Obfuscation
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-05-30/a>Xavier MertensNew Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190)
2022-02-26/a>Guy BruneauUsing Snort IDS Rules with NetWitness PacketDecoder
2022-01-22/a>Xavier MertensMixed VBA & Excel4 Macro In a Targeted Excel Sheet
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-06/a>Xavier MertensMalicious Python Script Targeting Chinese People
2022-01-05/a>Xavier MertensCode Reuse In the Malware Landscape
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-10-20/a>Xavier MertensThanks to COVID-19, New Types of Documents are Lost in The Wild
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-01-18/a>Didier StevensDoc & RTF Malicious Document
2020-10-14/a>Xavier MertensNicely Obfuscated Python RAT
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-08-06/a>Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-07-27/a>Didier StevensAnalyzing Metasploit ASP .NET Payloads
2019-12-12/a>Xavier MertensCode & Data Reuse in the Malware Ecosystem
2019-10-27/a>Didier StevensUsing scdbg to Find Shellcode
2019-07-08/a>Didier StevensMachine Code? No!
2019-07-04/a>Didier StevensMachine Code?
2019-05-31/a>Didier StevensRetrieving Second Stage Payload with Ncat
2019-05-30/a>Didier StevensAnalyzing First Stage Shellcode
2019-05-06/a>Didier StevensText and Text
2019-05-01/a>Xavier MertensAnother Day, Another Suspicious UDF File
2019-04-23/a>Didier StevensMalicious VBA Office Document Without Source Code
2019-03-24/a>Didier StevensDecoding QR Codes with Python
2019-02-25/a>Didier StevensSextortion Email Variant: With QR Code
2019-01-02/a>Didier StevensMaldoc with Nonfunctional Shellcode
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-08/a>Didier StevensVideo: Using scdbg to analyze shellcode
2018-09-03/a>Didier StevensAnother quickie: Using scdbg to analyze shellcode
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2017-04-16/a>Johannes UllrichTool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains
2016-11-24/a>Didier StevensExtracting Shellcode From JavaScript
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-09-26/a>Didier StevensVBA and P-code
2015-09-21/a>Xavier MertensDetecting XCodeGhost Activity
2015-03-30/a>Didier StevensYARA Rules For Shellcode
2013-10-25/a>Johannes UllrichPHP.net compromise aftermath: Why Code Signing Beats Hashes
2013-08-04/a>Johannes UllrichBBCode tag "[php]" used to inject php code
2013-02-16/a>Lorna HutchesonFedora RedHat Vulnerabilty Released
2012-07-19/a>Mark BaggettA Heap of Overflows?
2012-04-26/a>Richard PorterPacketstorm Security and Metasploit have Exploit code for MS12-027
2012-04-25/a>Daniel WesemannBlacole's shell code
2012-03-16/a>Russ McReeMS12-020 RDP vulnerabilities: Patch, Mitigate, Detect
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2011-08-11/a>Guy BruneauBlackBerry Enterprise Server Critical Update
2011-08-03/a>Johannes UllrichMalicious Images: What's a QR Code
2011-03-07/a>Bojan ZdrnjaOracle padding attacks (Codegate crypto 400 writeup)
2010-05-12/a>Rob VandenBrinkAdobe Shockwave Update
2010-03-10/a>Rob VandenBrinkMicrosoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7
2010-02-08/a>Adrien de BeaupreWhen is a 0day not a 0day? Fake OpenSSh exploit, again.
2009-08-08/a>Guy BruneauXML Libraries Data Parsing Vulnerabilities
2009-05-29/a>Lorna HutchesonVMWare Patches Released
2008-07-22/a>Mari Nichols‘Cold Boot’ Attack Utility Tools
2008-06-10/a>Swa FrantzenRansomware keybreaking