McLean, Virginia, United States, 15th January 2026, CyberNewsWire
New Haron Ransomware Bears Striking Resemblance To Avaddon
It hasn’t been long since the Avaddon ransomware gang went offline and released decryption keys. …
Social Mapper is an open source tool that searches for profile information from social media…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
TIDoS framework is a python based toolkit that performs a comprehensive audit of the web…
What is JFScan? JFScan is a great enumeration tool created by nullt3r written mainly in…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
A2SV is an open source tool used for scanning SSL vulnerabilities in web applications. A2SV…
KillShot is a penetration testing tool that can be used to gather useful information and…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
McLean, Virginia, United States, 15th January 2026, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Technology decisions cover more than servers and software. They’re about workflow, data security and how …
It hasn’t been long since the Avaddon ransomware gang went offline and released decryption keys. …
Heads up, WordPress admins! A couple of security vulnerabilities have been found in the WordPress …
