Washington, DC, 4th February 2026, CyberNewsWire
The Trojan was first spotted in February 2013 and over a dozen new versions have …
I came across this python script that can perform SSH login bruteforce attacks and decided…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
Protect your Facebook Password Found this one while I was on Safari. Its a pretty…
Raccoon is an offensive security tool known for reconnaissance and information gathering. The tool can…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
So what is this tool all about? Golismero is an open source framework, used for…
Anyone here tired of dual booting to get into your Kali machine? Or configuring VMware…
Yuki Chan is an open source tool that automates some of the information gathering and…
Dnsx is a fast and multi-purpose DNS toolkit that allows you to run multiple probers…
Evilginx is framework that is able to steal user credentials through a man in the…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Washington, DC, 4th February 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Let’s be honest: a lot of us gloss over data dashboards, skimming for the “all …
The Trojan was first spotted in February 2013 and over a dozen new versions have …
Here is a compilation of some of the top 5 single hacking attacks in recent …
