Austin, TX / USA, 14th January 2026, CyberNewsWire
Hackers May Exploit Microsoft PowerPoint For Malware Attacks
Microsoft Office tools, particularly, the Word, Excel, and PowerPoint, have always enticed criminal hackers due …
CMSeek is an open-source tool that analyzes the regex of websites in order to detect…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of…
What is Legion Legion is a semi-automated easy to use network penetration testing framework that…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
W3af is a GUI based framework that helps in auditing and identifying vulnerabilities in web…
What is BinGoo? Welcome to BinGoo, the all-in-one dorking tool written in bash. It uses…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Habu is an open source penetration testing toolkit that can perform various penetration testing tasks…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Austin, TX / USA, 14th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Microsoft Office tools, particularly, the Word, Excel, and PowerPoint, have always enticed criminal hackers due …
Recently, two researchers have demonstrated how an iPhone X vulnerability that could allow an attacker …
