Rome, Italy, 13th May 2026, CyberNewswire
Trafficstealer Exploits Container APIs for Malicious Redirections
Researchers caught Trafficstealer actively abusing Docker Container APIs to redirect users to malicious websites. The …
Cloakify Factory is a tool to transforms any file type into a list of harmless…
I found this one while doings some research on BadUSBs and thought it would be…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
cSploit is now considered EOL and is not being updated by the developers. Current version…
What is WSL? Some of you may have noticed that I have been running my…
Here we have a compilation of tools by InfoSecMatter that is used for scanning open…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
Morpheus is an open source framework that can launch multiple attacks on the network using…
RapidScan is a python based scanning tool used for analyzing vulnerabilities in web applications. The…
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
Brosec is an open source terminal based tool to help all the security professionals generate…
W3af is a GUI based framework that helps in auditing and identifying vulnerabilities in web…
Rome, Italy, 13th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
AI coding tools have allowed engineering teams to double their output, and 64% of organizations …
Researchers caught Trafficstealer actively abusing Docker Container APIs to redirect users to malicious websites. The …
Researchers have warned Android users of a new malware that steals two-factor authentication (2FA) codes …
