Cisco recently fixed a high-severity vulnerability in Cisco IOS Software for Catalyst 6000 Series Switches, which could lead to a denial…
Xerosploit is a penetration testing toolbox whose objective is to perform man-in-the-middle attacks. It brings different modules that permit to…
In this Kali Linux Tutorial, we show you how to use Xerxes in launching a DOS attack. DDOS tools are…
Cisco published a security advisory that fixes multiple vulnerabilities with Cisco Small Business Switches. The vulnerabilities allow an unauthenticated remote…
New Critical vulnerability found in both Android/iOS WhatsApp version Let hackers sending a specially crafted MP4 file to WhatsApp user and…
Cisco released new security updates for multiple software products such as Cisco ASA, FMC, and FTD Software that affects 18…
Exclusive research found 9 critical system-level Android VoIP Zero-day vulnerabilities that allow attackers to perform malicious operations, including denying voice…
Microsoft issued an emergency patch for Internet Explorer RCE 0-day vulnerability that allows attackers to execute arbitrary code remotely to…
Internet Systems Consortium (ISC) published security updates for vulnerabilities in BIND DNS software that allows an remote attacker to cause…
Inviteflood is a tool to perform SIP/SDP INVITE message flooding over UDP/IP to perform DOS Attack. This tool can be utilized to…