Austin, TX, USA, 19th March 2026, CyberNewswire
CISA Warns Of Actively Exploited Vulnerability In Microsoft Outlook
Despite the fix being available, the delays in patching devices allowed the threat actors to …
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
So what is this tool all about? Golismero is an open source framework, used for…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
Today, we talk about SSLyze. SSLyze is a Python tool that can analyze the SSL…
Tmux is a terminal multiplexer: which in lamen terms means it is able to create…
Protect your Facebook Password Found this one while I was on Safari. Its a pretty…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
Galileo is a free web application auditing framework that can perform various penetration testing tasks,…
Evilginx is framework that is able to steal user credentials through a man in the…
Cl0neMast3r is a Python script that was coded to make your life easier. It allows the user…
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
Despite the fix being available, the delays in patching devices allowed the threat actors to …
Luxembourg, Luxembourg, 11th February 2025, CyberNewsWire
