bug-bounty499
xss278
rce117
bragging-post117
account-takeover105
open-source93
csrf85
authentication-bypass82
google81
stored-xss74
facebook69
exploit68
web-security65
privilege-escalation65
ai-agents63
access-control63
reflected-xss63
microsoft53
input-validation51
writeup49
sql-injection48
defi48
ssrf47
smart-contract47
cross-site-scripting47
tool46
information-disclosure44
ethereum44
privacy44
cve41
api-security41
web-application39
llm37
burp-suite36
opinion35
automation35
responsible-disclosure33
web333
vulnerability-disclosure33
html-injection33
smart-contract-vulnerability33
machine-learning32
code-generation31
waf-bypass31
infrastructure31
denial-of-service30
clickjacking29
oauth29
authentication29
remote-code-execution28
0
4/10
KadNap, a takedown-resistant botnet infecting ~14,000 routers (primarily Asus models), uses a Kademlia-based peer-to-peer architecture with distributed hash tables for command-and-control evasion. The compromised devices are conscripted into the Doppelganger proxy service to anonymously tunnel cybercriminal traffic.
botnet
router-malware
asus
peer-to-peer
kademlia
dht
command-and-control
proxy-network
unpatched-vulnerabilities
cybercrime-infrastructure
takedown-resistant
black-lotus-labs
doppelganger
distributed-hash-tables
KadNap
Black Lotus Labs
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
Lumen
BitTorrent
IPFS