The Latest Exploits/Vulnerabilities

Exploit Discussion

Find the Best Exploits/Vulnerabilities from 2017 here:


DJI Firmware Hacking Removes Drone Flight Restrictions

DJI Firmware Hacking Removes Drone Flight Restrictions

Drones have been taking over the world, everyone with a passing interest in making videos has one and DJI firmware hacking gives you the ability to remove all restrictions (no-fly zones, height and distance) which under most jurisdictions is illegal (mostly EU and FAA for the US). It’s an interesting subject, and also a controversial […]

Topic: Exploits/Vulnerabilities, Hardware Hacking, Legal Issues
GnuPG Crypto Library libgcrypt Cracked Via Side-Channel

GnuPG Crypto Library libgcrypt Cracked Via Side-Channel

Some clever boffins including Internet software pioneer djb have gotten libgcrypt cracked via a Side-Channel attack which has to do with the direction of a sliding window carried out in the library. Patches have already been released so update your Linux servers ASAP, even though honestly it seems like a fairly theoretical attack (this side-channel […]

Topic: Cryptography, Exploits/Vulnerabilities
Winpayloads - Undetectable Windows Payload Generation

Winpayloads – Undetectable Windows Payload Generation

Winpayloads is a tool to provide undetectable Windows payload generation with some extras running on Python 2.7. It provides persistence, privilege escalation, shellcode invocation and much more. The tool uses metasploits meterpreter shellcode, injects the users IP and port into the shellcode and writes a python file that executes the shellcode using ctypes. This is […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking
TheFatRat - Massive Exploitation Tool

TheFatRat – Massive Exploitation Tool

TheFatRat is an easy-to-use Exploitation Tool that can help you to generate backdoors and post exploitation attacks like browser attack DLL files. This tool compiles malware with popular payloads and then the compiled malware can be executed on Windows, Linux, Mac OS X and Android. The malware that is created with this tool also has […]

Topic: Exploits/Vulnerabilities, Hacking Tools