Rome, Italy, 15th May 2026, CyberNewswire
Another victim of a ransomware attack has surfaced online. The latest target is the audio …
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Today, we are going to talk about a powerful web application scanner named WAScan. WAScan…
Salsa-tools is a collection of three tools programmed with C# used to take over a…
Hacktronian is an open-source penetration testing framework designed for social engineering and multiple server…
Altair is a Python tool that can be used to scan for web related vulnerabilities,…
So what is this tool all about? Golismero is an open source framework, used for…
Sn1per is an automated scanner that can be used during a penetration test to enumerate…
cSploit is now considered EOL and is not being updated by the developers. Current version…
Reconnaissance is one of the first steps to conduct within a pen test engagement. During…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
Another victim of a ransomware attack has surfaced online. The latest target is the audio …
Joining the trail of cybersecurity victims from the health sector, the latest victim comes from …
