Austin, Texas, United States, 9th April 2026, CyberNewswire
Serious Argo CD Vulnerability Could Allow Admin Access To The Attackers
A major security vulnerability existed in the Kubernetes continuous delivery tool Argo CD. Exploiting this …
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
Red Hawk is an open source tool that is used for information gathering and certain…
Photon is a relatively fast crawler designed for automating OSINT (Open Source Intelligence) with a…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
Final Recon is a useful tool for gathering data about a target from open source…
So what is this Osueta script all about? Osueta is a powerful python script used…
Galileo is a free web application auditing framework that can perform various penetration testing tasks,…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Today’s cybersecurity landscape is at its most innovative yet complicated point. Risk leaders often face …
A major security vulnerability existed in the Kubernetes continuous delivery tool Argo CD. Exploiting this …
The Microsoft-owned social networking giant LinkedIn has stepped up to welcome further security improvements. Specifically, …
