Austin, TX, USA, 19th March 2026, CyberNewswire
Android Application “Fortnite” Vulnerable to Man-in-the-Disk Attack
Google Security Researchers discovered a Man-in-the-Disk (MitD) which allows other applications to Hijack Fortnite app’s …
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Security company NCC Group have released an open source tool for penetration testing named Singularity,…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
NoSQLMap is an open source python based tool, designed to audit and automate injection attacks…
CMSeek is an open-source tool that analyzes the regex of websites in order to detect…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
The fsociety hacking tools pack is a penetration testing framework that consists of many of…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
What is Legion Legion is a semi-automated easy to use network penetration testing framework that…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
East is a Python based security framework toolkit. It acts as a HTTP server and…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
Google Security Researchers discovered a Man-in-the-Disk (MitD) which allows other applications to Hijack Fortnite app’s …
Iran’s Cobalt Dickens group target universities worldwide, North Korea’s Lazarus group blamed for Cosmos Bank …
