Washington, DC, 4th February 2026, CyberNewsWire
We’re back again with another banger from Dan Miessler so if you liked the post …
Final Recon is a useful tool for gathering data about a target from open source…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
Httpx is a fast and multi-purpose HTTP toolkit that allows the user to run multiple…
What is a Browser in the Browser attack What’s up nerds! Mr.D0x has yet another…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
Spiderfoot is an open-source tool used for reconnaissance. It is capable of gathering open-source information…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
When organizations think about cybersecurity threats, attention often goes to external attackers. Yet a significant …
We’re back again with another banger from Dan Miessler so if you liked the post …
Heads up, Android users! Researchers have found a new Android malware in the wild that …
