Austin, TX, USA, 19th March 2026, CyberNewswire
The iPhone is one of the most secure devices you can purchase these days, but …
What is this dumpster diving tool you speak of? The creator of this tool has…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
Uniscan is an open source tool capable of scanning web applications for critical vulnerabilities, such…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
I found this one while doings some research on BadUSBs and thought it would be…
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
Social Mapper is an open source tool that searches for profile information from social media…
Red Hawk is an open source tool that is used for information gathering and certain…
KillShot is a penetration testing tool that can be used to gather useful information and…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
The iPhone is one of the most secure devices you can purchase these days, but …
Hacking group named ‘Shadow Brokers‘ is very upset that no one seems to be bidding on …
