Rome, Italy, 15th May 2026, CyberNewswire
Lorenz Ransomware – One More Threat To the Enterprise Security
One more security threat has emerged in the ransomware ecosystem targeting businesses. Identified as Lorenz, …
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
TIDoS framework is a python based toolkit that performs a comprehensive audit of the web…
I found this one while doings some research on BadUSBs and thought it would be…
BeRoot is a post-exploitation tool to check for common misconfigurations which can allow an attacker…
Leviathan is an open source toolkit that can be used for auditing networks and web…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Evilginx is framework that is able to steal user credentials through a man in the…
Ffuf – Fuzz Faster U Fool is a great tool used for fuzzing. It has…
Here we have a compilation of tools by InfoSecMatter that is used for scanning open…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
Today I have a tool that exploits insecure file shares and allows penetration testers to…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
One more security threat has emerged in the ransomware ecosystem targeting businesses. Identified as Lorenz, …
Apple’s Find My network feature that serves as a way of device tracking could also …
