Rome, Italy, 15th May 2026, CyberNewswire
HackDHS Bug Bounty Program Now Includes Log4j Bug Reports
The US Department of Homeland Security has expanded the scope of the HackDHS bug bounty …
Turbolist3r is a subdomain enumeration tool which can identify subdomain takeovers. It is heavily based…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Dirhunt is a python tool that can quickly search directories on target domains to find…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Red Hawk is an open source tool that is used for information gathering and certain…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Pythem is a python framework used for performing various security tests on networks and web…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
What is WSL? Some of you may have noticed that I have been running my…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
The US Department of Homeland Security has expanded the scope of the HackDHS bug bounty …
A researcher from Google Project Zero Team discovered a site isolation bypass vulnerability affecting the …
