Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by Linumonk
Linumonk
76 POSTS
0 COMMENTS
TECH
exFAT: Advantages & Disadvantages of Extensible FAT
Linumonk
-
September 24, 2021
0
Cyber security
How to Reduce Human Error and Improve Compliance
Linumonk
-
September 24, 2021
0
Uncategorized
What Do You Need to Know About Programming before You Try...
Linumonk
-
September 20, 2021
0
Kali Linux
Kali Linux 2021.3 Released for NetHunter Smartwatch and With New Hacking...
Linumonk
-
September 15, 2021
0
Cyber security
A Career as an Ethical Hacker
Linumonk
-
September 11, 2021
0
Database Assessment
How to monitor and optimize an SQL database
Linumonk
-
September 11, 2021
0
Blog
How to ensure compliance in the workplace
Linumonk
-
September 8, 2021
0
Blog
Top 6 Front End Development Companies
Linumonk
-
September 5, 2021
0
Blog
How to Improve your Remote Debugging Game for Java
Linumonk
-
August 20, 2021
0
Blog
Public Records: Types, Risks, and Removal Tips
Linumonk
-
August 20, 2021
0
1
...
3
4
5
...
8
Page 4 of 8
APPLICATIONS
Utkuici – Nessus Automation
R K
-
October 11, 2022
ATFuzzer : Dynamic Analysis of AT Interface For Android Smartphones
R K
-
November 29, 2019
Mythic : A Collaborative, Multi-Platform, Red Teaming Framework
R K
-
July 2, 2021
code2prompt : Streamlining LLM Prompt Generation From Codebases
Varshini
-
January 28, 2025
HOT NEWS
The-XSS-Rat : A Comprehensive Guide To Cross-Site Scripting Tools And Strategies
Varshini
-
March 10, 2025
0
Cyber security
The-XSS-Rat, an experienced ethical hacker, provides valuable insights into the world of cross-site scripting (XSS) through comprehensive guides and strategies. This article will delve...