Researchers have observed an ongoing phishing attack that exploits Google Calendar to evade security filters.…
Sendika informs 256 people have already been declared dead, but the number could increase significantly. The…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Spiderfoot is an open-source tool used for reconnaissance. It is capable of gathering open-source information…
Wapiti is an open source tool that scans web applications for multiple vulnerabilities including data…
Empire is regarded as one of the most useful frameworks by many penetration testers. It…
This tool provides automated setup of rogue access points by setting up a DHCP server…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Kalitorify is a shell based script for Kali Linux. It uses iptables and TOR to…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
BadKarma is a GUI based network reconnaissance tool that can gather useful network information at…
Researchers have observed an ongoing phishing attack that exploits Google Calendar to evade security filters.…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
Mobile security is a topic increasingly on people’s minds in the modern day, and for…
Sendika informs 256 people have already been declared dead, but the number could increase significantly. The…
The vulnerabilities are considered critical and they’ve been assigned a priority rating of 1, which…