Rome, Italy, 15th May 2026, CyberNewswire
The Tor Project released today version 6.0.5 of the Tor Browser which fixes a critical …
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
cSploit is now considered EOL and is not being updated by the developers. Current version…
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection…
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
With Sherlock you can search across a vast number of social platforms for a username.…
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
Brosec is an open source terminal based tool to help all the security professionals generate…
XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. …
Evilginx is framework that is able to steal user credentials through a man in the…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
The Tor Project released today version 6.0.5 of the Tor Browser which fixes a critical …
In Windows you can turn your PC into a wireless hotspot, thus allowing you to share its …
