McLean, Virginia, United States, 15th January 2026, CyberNewsWire
Researchers have identified a new phishing attack where the hackers exploit the Google Docs Comment …
Cloakify Factory is a tool to transforms any file type into a list of harmless…
Zeus scanner is an open source tool used for reconnaissance and vulnerability assessments of web…
Morpheus is an open source framework that can launch multiple attacks on the network using…
Dnsx is a fast and multi-purpose DNS toolkit that allows you to run multiple probers…
Definition Whatweb is web scanner written in Ruby to identify and recognise technologies used by…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
CrackMapExec(CME) is a post exploitation tool that can be used for tasks like cracking administrative…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Researchers have identified a new phishing attack where the hackers exploit the Google Docs Comment …
A security researcher has explained how Java RMI services remain at risk of developing SSRF …
