SINGAPORE, Singapore, 17th February 2026, CyberNewswire
CredShields Leads OWASP Smart Contract Top 10 2026 as Governance and Access Failures Drive Onchain Risk
SINGAPORE, Singapore, 17th February 2026, CyberNewswire
Evilgrade is a modular framework that takes over target machines by injecting fake updates in…
DumpsterFire is an open-source tool made by blue team member to edit create and control…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities,…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
ARPwner is a GUI based tool that can perform tasks like ARP and DNS spoofing.…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
W3af is a GUI based framework that helps in auditing and identifying vulnerabilities in web…
I came across this python script that can perform SSH login bruteforce attacks and decided…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
I found this one while doings some research on BadUSBs and thought it would be…
SINGAPORE, Singapore, 17th February 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Securing a hybrid cloud environment can be complex. As workloads move to on-premises data centers …
SINGAPORE, Singapore, 17th February 2026, CyberNewswire
Washington, DC, 4th February 2026, CyberNewsWire
