Rome, Italy, 15th May 2026, CyberNewswire
A new malware threat is in the wild exhibiting evasive properties to escape detection. Identified …
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
XSStrike is an open source tool that detects Cross Site Scripting vulnerabilities and exploits them. …
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
Social Mapper is an open source tool that searches for profile information from social media…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
ARPwner is a GUI based tool that can perform tasks like ARP and DNS spoofing.…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
DNSRecon is a python script used for DNS information gathering. DNS information about a target…
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
A new malware threat is in the wild exhibiting evasive properties to escape detection. Identified …
Researchers have reported multiple bugs dubbed “ExtraReplica” affecting Microsoft Azure. Exploiting the vulnerabilities could allow …
