Rome, Italy, 13th May 2026, CyberNewswire
Evil Extractor Infostealer Targets Windows In Recent Phishing Campaign
Researchers observed malicious use of a self-claimed educational tool, “Evil Extractor,” for stealing data. They …
Brutex is a shell based open source tool to make your work faster. It combines…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
Webpwn3r is a powerful scanning tool, written in Python, to detect remote command execution vulnerabilities,…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Sn1per is an automated scanner that can be used during a penetration test to enumerate…
So you have been tasked with performing a penetration test of the internet-facing systems of…
Tulpar is an open source penetration testing tool that can find web application vulnerabilities such…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Winpayloads is a python based tool which combines some of the Powershell Empire features along…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Rome, Italy, 13th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
AI coding tools have allowed engineering teams to double their output, and 64% of organizations …
Researchers observed malicious use of a self-claimed educational tool, “Evil Extractor,” for stealing data. They …
Researchers found active exploitation of the Eval PHP WordPress plugin to deploy backdoors on target …
