McLean, Virginia, United States, 15th January 2026, CyberNewsWire
Sony Music Entertainment has issued an apology after a hack on its Twitter account led …
Many times when you want to perform an exploitation to a windows target, you need…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
cSploit is now considered EOL and is not being updated by the developers. Current version…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Thinking someone is spying on you is one of the most unsettling feelings ever, I…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
What is GRR? This incident response framework is an open source tool used for live…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
I found this one while doings some research on BadUSBs and thought it would be…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Aquatone is a tool programmed by go-lang to inspect domains/check their status and also provide…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Sony Music Entertainment has issued an apology after a hack on its Twitter account led …
Raptor WAF is a simple web application firewall made in C, using KISS principle, to …
