-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hmm, I'm noticing a pattern.
Warning: don't download exploits from any sites that have an 'o' replaced with a '0'! The 0 obviously makes them less secure, or something. [EMAIL PROTECTED] wrote: > Hackers may be at risk! > > It has come to our attention that a large amount of public > security exploits/software have been modified and re-posted > to legitimate trusted information sites for public downloads. > > We have recently came across 5 exploits that have had a shellcode > modification > after legit verification of trusted download sites. > > The following information security sites have listed a number of > modified exploits: > > unl0ck security research > g0tfault security > m00 security > -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.9.15 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFC544DfqSf2EkP4p4RAq1iAJwLcdKzebJtb8nsJ9vbMr1cAXLDYwCffAwX ncwv02cySQDLh/tYaEuMmzI= =eUHO -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/