New York, NY, 14th January 2026, CyberNewsWire
New research called “Horus Scenario” published by Willem Westerhof, a Dutch security researcher from the …
Zeus scanner is an open source tool used for reconnaissance and vulnerability assessments of web…
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely…
Yuki Chan is an open source tool that automates some of the information gathering and…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Knock is a python based tool for enumerating subdomains on a targeted domain. You can…
I found this one while doings some research on BadUSBs and thought it would be…
We’re back again with another banger from Dan Miessler so if you liked the post…
Webpwn3r is a powerful scanning tool, written in Python, to detect remote command execution vulnerabilities,…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
New York, NY, 14th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
New research called “Horus Scenario” published by Willem Westerhof, a Dutch security researcher from the …
Tor clients and onion apps now protect towards many attacks by holding to a single …
