Rome, Italy, 15th May 2026, CyberNewswire
Konni RAT Malware Campaign Spreads Via Malicious Word Files
Researchers caught a new campaign from the notorious Konni RAT malware exploiting malicious Word files. …
Red Hawk is an open source tool that is used for information gathering and certain…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Evilginx is framework that is able to steal user credentials through a man in the…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
DNSRecon is a python script used for DNS information gathering. DNS information about a target…
Dalfox is a fast, powerful parameter analysis and XSS scanner based on a DOM parser.…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
So what is this Lynis tool all about? Lynis is a security tool used for…
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of…
Sqlmap is an open source tool used to test the SQL injection vulnerabilities within web…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
Researchers caught a new campaign from the notorious Konni RAT malware exploiting malicious Word files. …
Given the continuous rise in active exploitation of the now-known CitrixBleed flaw, governments issued new …
