As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
Exploit-db have recently released a local privilege escalation POC as shown in the code example…
Yuki Chan is an open source tool that automates some of the information gathering and…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection…
So what is this Osueta script all about? Osueta is a powerful python script used…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
BadKarma is a GUI based network reconnaissance tool that can gather useful network information at…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
RapidScan is a python based scanning tool used for analyzing vulnerabilities in web applications. The…
As attackers threaten key utility facilities, CISA warns water and waste facilities to protect online…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
With virtually every aspect of your business in digital form now, it is far past…
Exploit-db have recently released a local privilege escalation POC as shown in the code example…
A team of Chinese hackers names Pangu have released an untethered jailbreak for iOS 7.1…