New York, NY, 14th January 2026, CyberNewsWire
New Log4j Attack Vector Exploits WebSocket To Trigger RCE – Update to Log4j 2.17.0
Shedding light on alternative exploit strategies for the chaotic Log4j vulnerability, researchers have devised a …
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Uniscan is an open source tool capable of scanning web applications for critical vulnerabilities, such…
Sn1per is an automated scanner that can be used during a penetration test to enumerate…
Leviathan is an open source toolkit that can be used for auditing networks and web…
Altair is a Python tool that can be used to scan for web related vulnerabilities,…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
CMSeek is a python tool that is used to detect Content Management System (CMS) within…
Cr3dOv3r is an open source tool that helps in finding credentials reuse attack for any…
Wifi Pumpkin is a security audit framework used to test the security of wifi against…
Empire is regarded as one of the most useful frameworks by many penetration testers. It…
Habu is an open source penetration testing toolkit that can perform various penetration testing tasks…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
New York, NY, 14th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Shedding light on alternative exploit strategies for the chaotic Log4j vulnerability, researchers have devised a …
The terrible Log4j bug mayhem goes on as the Belgium Defense Ministry has emerged as …
