Rome, Italy, 15th May 2026, CyberNewswire
Critical Zoom Vulnerability Leaked Sensitive Data About Zoom Meetings
After a brief hiatus, it seems Zoom has come on the radar of security researchers …
I came across this python script that can perform SSH login bruteforce attacks and decided…
Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines…
Net Creds is a free tool that sniffs passwords and hashes from a network interface.…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Salsa-tools is a collection of three tools programmed with C# used to take over a…
TIDoS framework is a python based toolkit that performs a comprehensive audit of the web…
Web Screenshot – webscreenshot.py is a great tool which comes in handy when a penetration…
This tool provides automated setup of rogue access points by setting up a DHCP server…
Today LHN have been looking at Airgeddon, on initial inspection it seems to be a…
4CAN V2 is a Raspberry Pi project created by the Cisco team in order to…
DumpsterFire is an open-source tool made by blue team member to edit create and control…
XAttacker is a perl tool capable of scanning and auto-exploiting vulnerabilities in web applications. By…
Rome, Italy, 15th May 2026, CyberNewswire
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
Data breaches and ransomware incidents are often discussed as if they begin with a sophisticated …
After a brief hiatus, it seems Zoom has come on the radar of security researchers …
A serious vulnerability existed in SWARCO Traffic Systems. Exploiting the vulnerability could allow an attacker …
