bug-bounty529
xss295
rce173
google160
facebook137
exploit133
malware131
microsoft121
account-takeover121
bragging-post119
privilege-escalation108
authentication-bypass94
open-source93
cve93
csrf89
access-control77
stored-xss75
phishing73
web-security66
ai-agents66
reflected-xss63
writeup57
apple57
input-validation52
browser52
information-disclosure51
ssrf51
reverse-engineering50
sql-injection50
smart-contract49
defi48
cross-site-scripting48
privacy47
tool47
ethereum46
ai-security45
api-security44
supply-chain43
ctf41
vulnerability-disclosure40
lfi40
dos39
web339
remote-code-execution38
llm38
opinion37
burp-suite37
race-condition37
web-application37
credential-theft36
0
5/10
Researchers discovered KadNap, a botnet of 14,000+ Asus routers using Kademlia-based peer-to-peer distributed hash tables for decentralized command-and-control, making it highly resistant to traditional takedown methods while serving as infrastructure for the Doppelganger anonymous proxy service.
botnet
router-malware
peer-to-peer
kadmelia-dht
command-and-control
asus
takedown-resistant
doppelganger-proxy
distributed-hash-tables
anonymity-network
firmware-vulnerability
unpatched-vulnerability
KadNap
Black Lotus Labs
Lumen
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
BitTorrent
IPFS