bug-bounty499
xss278
rce117
bragging-post117
account-takeover105
open-source93
csrf85
authentication-bypass82
google81
stored-xss74
facebook69
exploit68
web-security65
privilege-escalation65
ai-agents63
access-control63
reflected-xss63
microsoft53
input-validation51
writeup49
sql-injection48
defi48
ssrf47
smart-contract47
cross-site-scripting47
tool46
information-disclosure44
ethereum44
privacy44
cve41
api-security41
web-application39
llm37
burp-suite36
opinion35
automation35
responsible-disclosure33
web333
vulnerability-disclosure33
html-injection33
smart-contract-vulnerability33
machine-learning32
code-generation31
waf-bypass31
infrastructure31
denial-of-service30
clickjacking29
oauth29
authentication29
remote-code-execution28
0
5/10
Researchers discovered KadNap, a botnet of 14,000+ Asus routers using Kademlia-based peer-to-peer distributed hash tables for decentralized command-and-control, making it highly resistant to traditional takedown methods while serving as infrastructure for the Doppelganger anonymous proxy service.
botnet
router-malware
peer-to-peer
kadmelia-dht
command-and-control
asus
takedown-resistant
doppelganger-proxy
distributed-hash-tables
anonymity-network
firmware-vulnerability
unpatched-vulnerability
KadNap
Black Lotus Labs
Lumen
Chris Formosa
Steve Rudd
Asus
Kademlia
Doppelganger
BitTorrent
IPFS