Threat Intelligence Automation
Cyber Threat Intelligence (CTI) is a framework and technology that generates intelligence…
OWASP – Open Web Application Security Project
The Open Web Application Security Project (OWASP) has compiled a list of…
Why Companies Should Care More About Credential Breach?
Phishing attacks and stolen credentials are becoming more common in the world…
SocialFish – Let’s Go Phishing
SocialFish is an open-source phishing tool, integrated with another open source tool…
Astsu – A network scanner tool
A network scanner tool, developed in Python 3 using scapy. How it…
Elasticsearch Data Breach – Genealogy Software Maker Exposes Data on 60,000 Users
A US tech company that manages popular family tree software has exposed…
Emotet Botnet is Back!
Emotet, one of today's most prominent malware botnets, has come back to…
Microsoft July 2020 Patch Tuesday fixes 123 vulnerabilities
This month, Redmond fixed 123 security flaws across 13 products. None of…
Pentest Tools Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for…
Router Exploitation Framework – RouterSploit
The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.…