Rome, Italy, 15th May 2026, CyberNewswire
Serious Argo CD Vulnerability Could Allow Admin Access To The Attackers
A major security vulnerability existed in the Kubernetes continuous delivery tool Argo CD. Exploiting this …
What is a Browser in the Browser attack What’s up nerds! Mr.D0x has yet another…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
Tplmap is a python tool that can find code injection and Server Side Templates Injection…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
I found this one while doings some research on BadUSBs and thought it would be…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
A major security vulnerability existed in the Kubernetes continuous delivery tool Argo CD. Exploiting this …
The Microsoft-owned social networking giant LinkedIn has stepped up to welcome further security improvements. Specifically, …
