Cary, North Carolina, USA, 18th December 2025, CyberNewsWire
VoltPillager Attack Can Manipulate Intel CPUs’ Secure SGX Enclaves
Recently, researchers presented their study about the PLATYPUS attack that could steal data from the …
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
ARPwner is a GUI based tool that can perform tasks like ARP and DNS spoofing.…
I found this one while doings some research on BadUSBs and thought it would be…
Spiderfoot is an open source tool used for reconnaissance purpose. The tool is capable of…
Yuki Chan is an open source tool that automates some of the information gathering and…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
Tulpar is an open source penetration testing tool that can find web application vulnerabilities such…
CMSeek is an open-source tool that analyzes the regex of websites in order to detect…
Here we have a compilation of tools by InfoSecMatter that is used for scanning open…
Spiderfoot is an open-source tool used for reconnaissance. It is capable of gathering open-source information…
Cary, North Carolina, USA, 18th December 2025, CyberNewsWire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
For Managed Service Providers (MSPs), minutes may even define success or failure. Many a time …
Recently, researchers presented their study about the PLATYPUS attack that could steal data from the …
Cisco has recently addressed serious vulnerabilities affecting its Webex video conferencing app. Exploiting the bugs …
