New York, NY, 14th January 2026, CyberNewsWire
This new phishing scam just goes to show that even (some) cyber criminals are not …
Leviathan is an open source toolkit that can be used for auditing networks and web…
Red Hawk is an open source tool that is used for information gathering and certain…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The…
What is Infection Monkey? Infection Monkey is an open-source breach and attack simulation tool for…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
The Evil Access Point (AP) attack has been around for a long time. There are…
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
Zeus scanner is an open source tool used for reconnaissance and vulnerability assessments of web…
New York, NY, 14th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
This new phishing scam just goes to show that even (some) cyber criminals are not …
In September 2016, two men were arrested for participating in the hacking of CIA Director …
