Washington, DC, 4th February 2026, CyberNewsWire
Hacker hijack Chromecasts to promote PewDiePie and a hacker group threatens to release stolen 9/11 …
Zarp is a powerful tool used for scanning and attacking networks. The tool is capable…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Tplmap is a python tool that can find code injection and Server Side Templates Injection…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Evilgrade is a modular framework that takes over target machines by injecting fake updates in…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
Hacker hijack Chromecasts to promote PewDiePie and a hacker group threatens to release stolen 9/11 …
A look at the largest cybersecurity, hacking, and privacy headlines of 2018 on episode 192 …
