Rome, Italy, 15th May 2026, CyberNewswire
Hackers May Exploit Microsoft PowerPoint For Malware Attacks
Microsoft Office tools, particularly, the Word, Excel, and PowerPoint, have always enticed criminal hackers due …
Wifi Pumpkin is a security audit framework used to test the security of wifi against…
Social Mapper is an open source tool that searches for profile information from social media…
cSploit is now considered EOL and is not being updated by the developers. Current version…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
Nmap Automator is a great tool for initial port scans of a given ip address.…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Get ready to git this cloned as soon as possible, MHDDoS. This Distributed Denial of…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
Microsoft Office tools, particularly, the Word, Excel, and PowerPoint, have always enticed criminal hackers due …
Recently, two researchers have demonstrated how an iPhone X vulnerability that could allow an attacker …
