Austin, Texas, United States, 9th April 2026, CyberNewswire
Critical Zoom Vulnerability Leaked Sensitive Data About Zoom Meetings
After a brief hiatus, it seems Zoom has come on the radar of security researchers …
Knock is a python based tool for enumerating subdomains on a targeted domain. You can…
Dalfox is a fast, powerful parameter analysis and XSS scanner based on a DOM parser.…
I found this one while doings some research on BadUSBs and thought it would be…
Photon is a relatively fast crawler designed for automating OSINT (Open Source Intelligence) with a…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
What is Legion Legion is a semi-automated easy to use network penetration testing framework that…
SniffAir is an open source tool made for sophisticated wireless attacks and data capture, it…
Getallurls (gau) fetches known URLs from AlienVault’s, the Wayback Machine, and Common Crawl for any…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
So what is this subfinder tool all about? Subfinder is a subdomain discovery tool that…
Red Hawk is an open source tool that is used for information gathering and certain…
Austin, Texas, United States, 9th April 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Today’s cybersecurity landscape is at its most innovative yet complicated point. Risk leaders often face …
After a brief hiatus, it seems Zoom has come on the radar of security researchers …
A serious vulnerability existed in SWARCO Traffic Systems. Exploiting the vulnerability could allow an attacker …
