Washington, DC, 4th February 2026, CyberNewsWire
New Terrapin Attack Demonstrates SSH Vulnerabilities
Researchers have devised a new attack strategy, called “Terrapin,” that exploits vulnerabilities in the SSH …
Powershell-RAT is a Python and Powershell script tool that has been made to help a pen…
Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities,…
MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The…
Back again with more DNS enumeration tools. This one has been around for quite some…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
I found this one while doings some research on BadUSBs and thought it would be…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
Security company NCC Group have released an open source tool for penetration testing named Singularity,…
Evilginx is framework that is able to steal user credentials through a man in the…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
Researchers have devised a new attack strategy, called “Terrapin,” that exploits vulnerabilities in the SSH …
Microsoft’s security team researchers discovered numerous security vulnerabilities in the Perforce Helix Core Server platform. …
