Austin, TX, USA, 19th March 2026, CyberNewswire
2026 Study from Panorays: 85% of CISOs Can’t See Third-Party Threats Amid Increasing Supply Chain Attacks
New York, NY, 14th January 2026, CyberNewsWire
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Altair is a Python tool that can be used to scan for web related vulnerabilities,…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion.…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
What is Infection Monkey? Infection Monkey is an open-source breach and attack simulation tool for…
Spiderfoot is an open-source tool used for reconnaissance. It is capable of gathering open-source information…
The Operative Framework tool can be used within a red team/social engineering engagement to collect…
Thinking someone is spying on you is one of the most unsettling feelings ever, I…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
NoSQLMap is an open source python based tool, designed to audit and automate injection attacks…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
New York, NY, 14th January 2026, CyberNewsWire
Austin, TX / USA, 14th January 2026, CyberNewsWire
