Empire – Open Source Post-Exploitation Agent Tool

Empire is regarded as one of the most useful frameworks by many penetration testers. It has many different powershell and

Read more

Blazy – Open Source Modern Login Brute-forcer

I know what you are thinking, bruteforce doesn’t work anymore in many cases. However, Blazy is not just another brute-force

Read more

Veil-Framework – Open Source Tool to Bypass Common Anti-Virus Solutions

Based on python, the Veil-Framework is one of the most popular tools for Anti-Virus evasion. You can generate many different

Read more

mitmAP – An Open Source Tool to Create a Fake Access Point and Sniff Data

The Evil Access Point (AP) attack has been around for a long time. There are several ways to create this

Read more

Xerosploit – Open Source Toolkit For Man In The Middle Attacks

Xerosploit is a python-based toolkit for creating efficient Man In The Middle attacks which combines the power of bettercap and

Read more

Systemd Vulnerability In Linux Could Trigger Remote Attacks And System Crashes

A researcher has discovered another security flaw affecting Linux systems. The flaw existing in Systemd that could allow an attacker

Read more

Serious Vulnerability Discovered In X.Org Server Affects Major Linux and BSD Variants

An Indian researcher discovered an important local privilege escalation vulnerability that poses a security threat to most Linux distros and

Read more

Different Vendors Confirm The Impact Of LibSSH Flaw On Their Products

Update: The following statement has been added since the initial release of this story Turns out, F5 Networks products are

Read more

Mutagen Astronomy – Linux Vulnerability Hits CentOS, Debian, and Red Hat Distros

Researchers have discovered a critical vulnerability that allegedly affects multiple Linux distros. The vulnerability named Mutagen Astronomy allows an attacker

Read more
Do NOT follow this link or you will be banned from the site!