Austin, Texas, United States, 9th April 2026, CyberNewswire
Security researchers were able to bypass the iPhone X’s Face ID system using a specially crafted mask
Bkav (security firm) said that it was able to bypass the iPhone X’s Face ID …
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Evilginx is framework that is able to steal user credentials through a man in the…
Leviathan is an open source toolkit that can be used for auditing networks and web…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Brosec is an open source terminal based tool to help all the security professionals generate…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Uniscan is an open source tool capable of scanning web applications for critical vulnerabilities, such…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
AI coding tools have allowed engineering teams to double their output, and 64% of organizations …
Bkav (security firm) said that it was able to bypass the iPhone X’s Face ID …
The tool itself is impressive enough, serving as the backbone of the CIA’s malware processes, …
