Atlassian Bamboo remote code execution exploit that leverages the java deserialization vulnerability as noted in CVE-2015-6576.
607a629353c90b0d484735e431ce673d9f7f7ae92d4516f5a50546cb0b881ca6
The encryption scheme used by Mikrotik's Webfig terminal software as seen on the RB750GL running RouterOS version 6.18 is susceptible to offline brute force attacks that allow a third party to recover login credentials (username and password) as well as full decryption of the terminal session. Full write up and proof of concept tools are included in this archive.
d0d1affb518b37657fed9af631a57aa3813a11d020ea75cb33748ab31aba0ae0
Network Leak Finder is a collection of small Perl scripts that detects connectivity between network segments. It is mostly useful to detect leaks in large organizations that have private network segments physically separated or firewalled from the Internet.
dc97597188f017613ab2b39f6c6da83a4f198d6ab814b13504c993ba1995e6d1