As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
Armenian hackers from Monte Melkonian Cyber Army – (MMCA) tend to be back activity with…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
RapidScan is a python based scanning tool used for analyzing vulnerabilities in web applications. The…
Pythem is a python framework used for performing various security tests on networks and web…
Vega is a GUID based open source tool used for testing the security of web…
I found this one while doings some research on BadUSBs and thought it would be…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
With virtually every aspect of your business in digital form now, it is far past…
Armenian hackers from Monte Melkonian Cyber Army – (MMCA) tend to be back activity with…
Google goes for Security Key- A Simplified Version of its Two-Factor Authentication.Logging in to Gmail…