Latest Posts
Blocking the Sign-In with Google Prompt
The prompt has become an annoyance but, fortunately, blocking it is simple. I will first describe how it can be easily blocked using a custom …
I'm Back
It has been a long time since I updated the website or posted something but things will be different from now on. There are still …
Aurora Exploit ... Python Style
If you have been watching the news recently, you might have heard about the "Aurora" exploit. The exploit was used to compromise systems at Google, …
Unpatched Vulnerability in Adobe Reader and Acrobat
There is an unpatched vulnerability in the latest and earlier versions of Adobe Reader and Acrobat. I've added to the software section a program that …
Adobe Reader Exploit
I've added to the software section an exploit I wrote in the past that targets a vulnerability in Adobe Reader via the web to execute …
Yet Another Unpatched Vulnerability and PoC Exploit
An unpatched vulnerability in an ActiveX control (Microsoft Office Web Components) used by Internet Explorer is being actively exploited. My version of the exploit can …
An unpatched vulnerability in an ActiveX control (Microsoft MPEG2TuneRequest) used by Internet Explorer is being actively exploited. I've written my version of the exploit in …
Unpatched Vulnerability in Internet Explorer
A critical vulnerability in several versions of Internet Explorer is being actively exploited. The vulnerability has not been patched yet by Microsoft, which means that …
Python Wrapper for VMware
I posted a Python wrapper called vmpy that can be used to control a virtual machine directly from Python. The wrapper can be found here.
DLL Injection
I posted a tool called DLLInjector that can inject a DLL of your choosing into a running process. The tool can be found here.
Facebook Phish
You will then be redirected to the real login page on Facebook. Here is a screenshot of the fraudulent site: This might tell us that …
Storm and Fast Flux in Action
By simply clicking on the link and visiting the page, your system can get compromised as it will try to exploit vulnerabilities in the browser …
Social Phishing
Check out this very cool paper. It shows how the information posted by people on social networking websites like MySpace, Facebook, etc. can be used …