Monthly Archives: August 2018

Crypton – Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

August 27th, 2018 📆 | 2752 Views ⚑

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all

Tagged with:




AdvisorsBot, a previously undocumented downloader involved in malicious email campaigns

August 27th, 2018 📆 | 3084 Views ⚑

Security researchers at Proofpoint security have discovered a previously undocumented downloader tracked as AdvisorsBot that was involved in malicious email campaigns.

Tagged with:




wePWNise – Generates Architecture Independent VBA Code To Be Used In Office Documents Or Templates And Automates Bypassing Application Control And Exploit Mitigation Software

August 19th, 2018 📆 | 6490 Views ⚑

wePWNise is proof-of-concept Python script which generates VBA code that can be used in Office macros or templates. It was

Tagged with:









Back to Top ↑