McLean, Virginia, United States, 15th January 2026, CyberNewsWire
MacOS Zero-Day Vulnerability Allowed Keylogging and Screengrabs
Google researchers discovered zero-day affecting macOS devices that could allow recording keystrokes or screen grabs. …
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
DNSRecon is a python script used for DNS information gathering. DNS information about a target…
Cr3dOv3r is an open source tool that helps in finding credentials reuse attack for any…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
Zarp is a powerful tool used for scanning and attacking networks. The tool is capable…
TheFatRat is an easy to use tool which helps in generating backdoors, system exploitation, post…
What is a Browser in the Browser attack What’s up nerds! Mr.D0x has yet another…
Galileo is a free web application auditing framework that can perform various penetration testing tasks,…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
So what is this phishing tool all about? Blackeye is tool scripted in shell to…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
Google researchers discovered zero-day affecting macOS devices that could allow recording keystrokes or screen grabs. …
Phishing attacks keep surfacing online with innovative ways to trick users. The latest phishing campaign …
