Rome, Italy, 15th May 2026, CyberNewswire
Passwords are everywhere. We use them to unlock phones, computers, websites, encrypted disks, encrypted files… …
Powershell-RAT is a Python and Powershell script tool that has been made to help a pen…
What is WSL? Some of you may have noticed that I have been running my…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
Vega is a GUID based open source tool used for testing the security of web…
Tmux is a terminal multiplexer: which in lamen terms means it is able to create…
MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Leviathan is an open source toolkit that can be used for auditing networks and web…
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
What Is Sparta? Sparta, created by SECFORCE is the ultimate tool for recon and network…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
Passwords are everywhere. We use them to unlock phones, computers, websites, encrypted disks, encrypted files… …
In the next few tutorials I will explain how to use the different Websploit modules. …
