Atlanta, GA, United States, 20th January 2026, CyberNewsWire
A critical Linux vulnerability has been discovered by researchers at Qualys, the vulnerability (CVE-2017-1000367) could …
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Droopescan is a python based scanner that is used to scan the web applications that…
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
Nuclei is a tool that is used to send requests across the given target based…
Back again with more DNS enumeration tools. This one has been around for quite some…
Zeus scanner is an open source tool used for reconnaissance and vulnerability assessments of web…
Red Hawk is an open source tool that is used for information gathering and certain…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities,…
Evilginx is framework that is able to steal user credentials through a man in the…
Atlanta, GA, United States, 20th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Let’s be honest: a lot of us gloss over data dashboards, skimming for the “all …
A critical Linux vulnerability has been discovered by researchers at Qualys, the vulnerability (CVE-2017-1000367) could …
A Lithuanian cosmetic surgery clinic was recently the victim of a cyber-attack; exposing thousands of …
