Rome, Italy, 13th May 2026, CyberNewswire
7 Years Old RCE Vulnerability Addressed In Kerio Control
A serious vulnerability existed in the Kerio Control security software that could allow code execution …
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
Malware showcase is a Github repository that contains examples of malware usage and behavior, this…
Social Mapper is an open source tool that searches for profile information from social media…
Routersploit is an open source framework used for exploiting vulnerabilities in embedded devices like routers.…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Kalitorify is a shell based script for Kali Linux. It uses iptables and TOR to…
cSploit is now considered EOL and is not being updated by the developers. Current version…
DumpsterFire is an open-source tool made by blue team member to edit create and control…
Reconnoitre is a tool that was created to automate routine actions within the OSCP lab…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
Back again with more DNS enumeration tools. This one has been around for quite some…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Rome, Italy, 13th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
AI coding tools have allowed engineering teams to double their output, and 64% of organizations …
A serious vulnerability existed in the Kerio Control security software that could allow code execution …
A recent ruling from the US court comes in as a noteworthy setback for the …
