Researchers caught numerous security vulnerabilities riddling Cinterion cellular modems, exploiting which would threaten millions of …
We all know that sinking feeling when your computer decides to slow down and barely …
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
CMSeek is a python tool that is used to detect Content Management System (CMS) within…
Anyone here tired of dual booting to get into your Kali machine? Or configuring VMware…
TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post…
What is a Brakeman? in the 1800s a brakeman was a rail worker responsible for…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
What is a Browser in the Browser attack What’s up nerds! Mr.D0x has yet another…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
Researchers caught numerous security vulnerabilities riddling Cinterion cellular modems, exploiting which would threaten millions of …
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Your essential company data is vulnerable to various risks, including cyberattacks like ransomware and human …
We all know that sinking feeling when your computer decides to slow down and barely …
Police in northwestern German city of Verden have discovered a collection of 18 million stolen …