Washington, DC, 4th February 2026, CyberNewsWire
Back in November, it was discovered that a backdoor injected in a custom firmware powering …
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
ARPwner is a GUI based tool that can perform tasks like ARP and DNS spoofing.…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Vega is a GUID based open source tool used for testing the security of web…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
What is WSL? Some of you may have noticed that I have been running my…
Evilgrade is a modular framework that takes over target machines by injecting fake updates in…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
Back in November, it was discovered that a backdoor injected in a custom firmware powering …
“Security company ESET reveals that it discovered a new group called TeleBots whose modus operandi is very …
