IE8 Zero-day Flaw Identified in October 2013 Goes Public Today
May 21st, 2014 | 🕒
TTS Demo A Critical zero-day Internet Explorer vulnerability, which was discovered by Peter 'corelanc0d3r' Van Eeckhoutte in October 2013 just
May 21st, 2014 | 🕒
TTS Demo A Critical zero-day Internet Explorer vulnerability, which was discovered by Peter 'corelanc0d3r' Van Eeckhoutte in October 2013 just
May 21st, 2014 | 🕒
Convert Text to Speech If you have an eBay Account then you should change your password immediately, because the World's
May 21st, 2014 | 🕒
iSpeech.org A recent Angler Exploit Campaign has been spotted by the Cisco researcher spiked since April 23, targeting Microsoft’s Silverlight
May 21st, 2014 | 🕒
https://www.ispeech.org/text.to.speech A 30 second demo of how PGP encrypted email works with Lavaboom. Bill emails Felix with his personal information
May 21st, 2014 | 🕒
Text to SpeechDesenmascara.me is a tool yet in it’s early PoC stage but fully functional. The goal of this tool
May 21st, 2014 | 🕒
iSpeech Overview Liffy is a tool written in Python designed to exploit local file inclusion vulnerabilities using three different techniques
May 21st, 2014 | 🕒
https://www.ispeech.org Devin Cook guest lectures on Return Oriented Programming on x86 (32bit) in Linux with demonstration. Exploit Mitigations such as
May 21st, 2014 | 🕒
iSpeechthe latest release of SET v6.0 codename “Rebellion” is available https://github.com/trustedsec/social-engineer-toolkit/. This version expands on many of the attack vectors
Gloss