Apple recently addressed two zero-day vulnerabilities affecting its Intel-based Macs. Alongside releasing the fixes, the …
Researchers at Newcastle University have identified a major vulnerability in Visa’s contactless cards that could …
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
Dalfox is a fast, powerful parameter analysis and XSS scanner based on a DOM parser.…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Phishing is a classic favorite attack of hackers. Not only that it provides easy access…
Dirhunt is a python tool that can quickly search directories on target domains to find…
ARPwner is a GUI based tool that can perform tasks like ARP and DNS spoofing.…
Wifiphisher is an open source framework that can be utilised for red team engagements for…
Apple recently addressed two zero-day vulnerabilities affecting its Intel-based Macs. Alongside releasing the fixes, the …
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
As mobile devices like smartphones and tablets become increasingly ubiquitous, mobile security is more important …
Researchers at Newcastle University have identified a major vulnerability in Visa’s contactless cards that could …
Fredrik Neij – known online as “TiAMO”, third and the last founder of the popular …