Austin, Texas, United States, 9th April 2026, CyberNewswire
New BleedingTooth Bluetooth Vulnerability Targets Linux
Researchers have found a new vulnerability affecting Linux devices. Dubbed BleedingTooth, the Bluetooth vulnerability allows …
Webvulnscan is a web application scanner that automates vulnerability assessment tasks. The tool can automatically…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
I found this one while doings some research on BadUSBs and thought it would be…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
What is BinGoo? Welcome to BinGoo, the all-in-one dorking tool written in bash. It uses…
MassExploitConsole is a python based easy-to-use cli tool for executing exploits. It has a collection…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
The macro_pack is a tool for automating obfuscation in an MS document or VBS script…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Today’s cybersecurity landscape is at its most innovative yet complicated point. Risk leaders often face …
Researchers have found a new vulnerability affecting Linux devices. Dubbed BleedingTooth, the Bluetooth vulnerability allows …
London’s Hackney Council has recently disclosed a cyber attack. Its services went down following the …
