As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
Gmail can be hacked despite having Google’s Two-Factor Authentication,but it was made to prevent the…
What is a Brakeman? in the 1800s a brakeman was a rail worker responsible for…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
East is a Python based security framework toolkit. It acts as a HTTP server and…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. …
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Salsa-tools is a collection of three tools programmed with C# used to take over a…
Final Recon is a useful tool for gathering data about a target from open source…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Protect your Facebook Password Found this one while I was on Safari. Its a pretty…
Damn Small XSS Scanner (DSXS) is a great tool for finding cross site scripting vulnerabilities,…
NoSQLMap is an open source python based tool, designed to audit and automate injection attacks…
As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
With virtually every aspect of your business in digital form now, it is far past…
Gmail can be hacked despite having Google’s Two-Factor Authentication,but it was made to prevent the…
Steven C. Frucci,a Circuit Court judge in Virginia in has stated that police can now force…