McLean, Virginia, United States, 15th January 2026, CyberNewsWire
Note: This tutorial is only for educational purpose and do this at your own risk. …
Salsa-tools is a collection of three tools programmed with C# used to take over a…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Powershell-RAT is a Python and Powershell script tool that has been made to help a pen…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
Sqlmap is an open source tool used to test the SQL injection vulnerabilities within web…
Web Screenshot – webscreenshot.py is a great tool which comes in handy when a penetration…
What is BinGoo? Welcome to BinGoo, the all-in-one dorking tool written in bash. It uses…
Brutex is a shell based open source tool to make your work faster. It combines…
Back again with more DNS enumeration tools. This one has been around for quite some…
MassBleed is an open source tool used for scanning SSL vulnerabilities in web applications. The…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
Many times when you want to perform an exploitation to a windows target, you need…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Note: This tutorial is only for educational purpose and do this at your own risk. …
Researchers have discovered a new malaware – Linux.Lady which converts Linux based PCs into Crypto-Currency …
