New York, NY, 14th January 2026, CyberNewsWire
Researchers have found a new tactic from threat actors to ensure continued access to compromised …
Morpheus is an open source framework that can launch multiple attacks on the network using…
Leviathan is an open source toolkit that can be used for auditing networks and web…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Cl0neMast3r is a Python script that was coded to make your life easier. It allows the user…
DumpsterFire is an open-source tool made by blue team member to edit create and control…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Cloakify Factory is a tool to transforms any file type into a list of harmless…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
Phishing is a classic favorite attack of hackers. Not only that it provides easy access…
New York, NY, 14th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Researchers have found a new tactic from threat actors to ensure continued access to compromised …
Microsoft has recently announced support for securing Google Cloud Projects with its Defender for Cloud. …
