Rome, Italy, 13th May 2026, CyberNewswire
Common ports, such as TCP port 80 (HTTP), may be locked down — but other …
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
Get ready to git this cloned as soon as possible, MHDDoS. This Distributed Denial of…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Dirhunt is a python tool that can quickly search directories on target domains to find…
Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by…
Rome, Italy, 13th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
AI coding tools have allowed engineering teams to double their output, and 64% of organizations …
Common ports, such as TCP port 80 (HTTP), may be locked down — but other …
Information security professionals should know the common security weaknesses that hackers and malicious users first …
