Austin, TX, USA, 19th March 2026, CyberNewswire
ANY.RUN Discovers Tricky Phishing Attack Using Fake CAPTCHA
Phishing campaigns relentlessly continue to evolve, utilizing innovative tricks to deceive users. ANY.RUN, the interactive …
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Here we have a compilation of tools by InfoSecMatter that is used for scanning open…
Many times when you want to perform an exploitation to a windows target, you need…
Dirhunt is a python tool that can quickly search directories on target domains to find…
BLACKEYE is a LAN phishing tool that can clone more than 30 networks templates to…
I found this one while doings some research on BadUSBs and thought it would be…
Final Recon is a useful tool for gathering data about a target from open source…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy…
Austin, TX, USA, 19th March 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Database security breaches can have devastating consequences for businesses, exposing sensitive data, damaging reputations, and …
Phishing campaigns relentlessly continue to evolve, utilizing innovative tricks to deceive users. ANY.RUN, the interactive …
After the recent Defender VPN update, Microsoft users will receive warnings when interacting with unsafe …
