Rome, Italy, 15th May 2026, CyberNewswire
Red Hawk is an open source tool that is used for information gathering and certain …
NoSQLMap is an open source python based tool, designed to audit and automate injection attacks…
Thinking someone is spying on you is one of the most unsettling feelings ever, I…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
This tool provides automated setup of rogue access points by setting up a DHCP server…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Sitadel is a python based web application scanner. It’s flexible and has many different scanning…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
cSploit is now considered EOL and is not being updated by the developers. Current version…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
Red Hawk is an open source tool that is used for information gathering and certain …
Members of Parliament at the UK have recently pointed out the country’s lack of leadership …
