McLean, Virginia, United States, 15th January 2026, CyberNewsWire
Android banking trojans have once again flooded the Google Play Store to target users by …
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
cSploit is now considered EOL and is not being updated by the developers. Current version…
Final Recon is a useful tool for gathering data about a target from open source…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Evilginx is framework that is able to steal user credentials through a man in the…
Red Hawk is an open source tool that is used for information gathering and certain…
Evilgrade is a modular framework that takes over target machines by injecting fake updates in…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Android banking trojans have once again flooded the Google Play Store to target users by …
Researchers have discovered a new cryptocurrency-related malware campaign in the wild. Identified as “SpyAgent, this …
