Washington, DC, 4th February 2026, CyberNewsWire
Google Elaborates On Campaigns Exploiting A Now-Patched Zimbra Zero-Day
Months after ensuring that the patch actually works, Google has now disclosed more details about …
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Wifiphisher is an open source framework that can be utilised for red team engagements for…
What is BinGoo? Welcome to BinGoo, the all-in-one dorking tool written in bash. It uses…
Cr3dOv3r is an open source tool that helps in finding credentials reuse attack for any…
AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely…
I came across this python script that can perform SSH login bruteforce attacks and decided…
Photon is a relatively fast crawler designed for automating OSINT (Open Source Intelligence) with a…
What is GRR? This incident response framework is an open source tool used for live…
Morpheus is an open source framework that can launch multiple attacks on the network using…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
Months after ensuring that the patch actually works, Google has now disclosed more details about …
Intel recently released a critical security fix for a newly discovered vulnerability affecting its CPUs. …
