Austin, Texas, United States, 9th April 2026, CyberNewswire
A group of Ukrainian nationalist hackers called Myrotvorets, leaked the personal details of many local …
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
Phishing is a classic favorite attack of hackers. Not only that it provides easy access…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
Back again with more DNS enumeration tools. This one has been around for quite some…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Web Screenshot – webscreenshot.py is a great tool which comes in handy when a penetration…
What is Infection Monkey? Infection Monkey is an open-source breach and attack simulation tool for…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Today’s cybersecurity landscape is at its most innovative yet complicated point. Risk leaders often face …
A group of Ukrainian nationalist hackers called Myrotvorets, leaked the personal details of many local …
A hacker group called “Spain Squad” was able to reactivate banned Twitter accounts. Hackers reactivated …
