The Latest Exploits/Vulnerabilities

Exploit Discussion

Find the Best Exploits/Vulnerabilities from 2017 here:


Another MongoDB Hack Leaks Two Million Recordings Of Kids

Another MongoDB Hack Leaks Two Million Recordings Of Kids

No surprises here, but there’s been another big MongoDB hack and from the looks of it, it’s been owned for quite some time. This time 2 million records from over 820,000 accounts have been leaked due to yet another default MongoDB installation with no authentication listening on the public IP address. The terrible part is, […]

Topic: Database Hacking, Exploits/Vulnerabilities
ShellNoob - Shellcode Writing Toolkit

ShellNoob – Shellcode Writing Toolkit

ShellNoob is a Python-based Shellcode writing toolkit which removes the boring and error-prone manual parts from creating your own shellcodes. Do note this is not a shellcode generator or intended to replace Metasploit’s shellcode generator, it’s designed to automate the manual parts of shellcode creation like format conversion, compilation and testing, dealing with syscalls and […]

Topic: Exploits/Vulnerabilities, Hacking Tools
crackle - Crack Bluetooth Smart Encryption (BLE)

crackle – Crack Bluetooth Smart Encryption (BLE)

crackle is a tool to crack Bluetooth Smart Encryption (BLE), it exploits a flaw in the pairing mechanism that leaves all communications vulnerable to decryption by passive eavesdroppers. crackle can guess or very quickly brute force the TK (temporary key) used in the pairing modes supported by most devices (Just Works and 6-digit PIN). With […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Networking Hacking
160,000 Network Printers Hacked

160,000 Network Printers Hacked

It’s a pretty simple hack (in a rather grey-hat fashion), but it’s getting a LOT of media coverage and 160,000 network printers hacked just goes to show once again the whole Internet of Things chapter we are entering is pretty scary. Definitely a neat hack tho, utilising the mass scanning power of Zmap and scanning […]

Topic: Exploits/Vulnerabilities, Hardware Hacking, Networking Hacking
OWASP VBScan - vBulletin Vulnerability Scanner

OWASP VBScan – vBulletin Vulnerability Scanner

OWASP VBScan short for vBulletin Vulnerability Scanner is an open-source project in Perl programming language to detect VBulletin CMS vulnerabilities and analyse them. Features VBScan currently has the following: Compatible with Windows, Linux & OSX Up to date exploit database Full path disclosure Firewall detect & bypass Version check Upgrade config finder Random user agent […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Web Hacking
p0wnedShell - PowerShell Runspace Post Exploitation Toolkit

p0wnedShell – PowerShell Runspace Post Exploitation Toolkit

p0wnedShell is an offensive PowerShell Runspace Post Exploitation host application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a PowerShell run space environment (.NET). It has a lot of offensive PowerShell modules and binaries included making the process of Post Exploitation easier. What the author tried was […]

Topic: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking