Austin, TX, USA, 19th March 2026, CyberNewswire
MAC address spoofing is a technique for temporarily changing your Media Access Control (MAC) address …
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
CMSeek is an open-source tool that analyzes the regex of websites in order to detect…
Here we have a compilation of tools by InfoSecMatter that is used for scanning open…
Leviathan is an open source toolkit that can be used for auditing networks and web…
Photon is a relatively fast crawler designed for automating OSINT (Open Source Intelligence) with a…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
Dalfox is a fast, powerful parameter analysis and XSS scanner based on a DOM parser.…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
So what is this tool all about? Golismero is an open source framework, used for…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
MAC address spoofing is a technique for temporarily changing your Media Access Control (MAC) address …
The new Google Assistant that powers search on Pixel devices and Google Home has a …
