SINGAPORE, Singapore, 17th February 2026, CyberNewswire
Days after the cyber-attack, Red Cross has now come up with an official update about …
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Kalitorify is a shell based script for Kali Linux. It uses iptables and TOR to…
Brosec is an open source terminal based tool to help all the security professionals generate…
I found this one while doings some research on BadUSBs and thought it would be…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
So what is this Lynis tool all about? Lynis is a security tool used for…
CMSeek is a python tool that is used to detect Content Management System (CMS) within…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
The Evil Access Point (AP) attack has been around for a long time. There are…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
SINGAPORE, Singapore, 17th February 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
The internet can be a scary place. Every day, I hear stories about people getting …
Days after the cyber-attack, Red Cross has now come up with an official update about …
The potent Android trojan BRATA has acquired new capabilities its latest variant. Researchers found the …
