As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
There’s a lot that’s new in Apple’s just-released iPhone 6, but one feature hasn’t changed:…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Nuclei is a tool that is used to send requests across the given target based…
I came across this python script that can perform SSH login bruteforce attacks and decided…
Security company NCC Group have released an open source tool for penetration testing named Singularity,…
Yuki Chan is an open source tool that automates some of the information gathering and…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Vega is a GUID based open source tool used for testing the security of web…
With Sherlock you can search across a vast number of social platforms for a username.…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
AutoRecon is an enumeration tool that performs automated enumeration with multi-threaded capabilities. It is purposely…
As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
With virtually every aspect of your business in digital form now, it is far past…
There’s a lot that’s new in Apple’s just-released iPhone 6, but one feature hasn’t changed:…
A 4chan user has created an ominous countdown site that hints at the release of…