A malicious campaign is actively targeting Ethereum developers in the wild. The campaign targets the…
According to an advisory posted by Graham Cluley on ESET’s We Live Security blog, it all…
Webpwn3r is a powerful scanning tool, written in Python, to detect remote command execution vulnerabilities,…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Brosec is an open source terminal based tool to help all the security professionals generate…
Uniscan is an open source tool capable of scanning web applications for critical vulnerabilities, such…
Security company NCC Group have released an open source tool for penetration testing named Singularity,…
Powershell-RAT is a Python and Powershell script tool that has been made to help a pen…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Dnsx is a fast and multi-purpose DNS toolkit that allows you to run multiple probers…
Nmap Automator is a great tool for initial port scans of a given ip address.…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
A malicious campaign is actively targeting Ethereum developers in the wild. The campaign targets the…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
In an increasingly data-driven world, the ability to collect, analyze, and utilize information is a…
According to an advisory posted by Graham Cluley on ESET’s We Live Security blog, it all…
According to Trend Micro, the Word vulnerability has been leveraged in targeted attacks against government…