Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by Rajashekar Yasani
Rajashekar Yasani
6 POSTS
0 COMMENTS
http://www.kalilinuxtutorials.com
Rajashekar Yasani, security researcher, with a passion for open-source tools. Through these tutorials, he shares practical insights to empower security professionals in navigating modern cyber threats.
Exploitation Tools
Metasploit for Penetration Testing and Exploitation – 2024
Rajashekar Yasani
-
August 7, 2024
0
Cyber security
Hardening Kubernetes Security with Falco: Runtime Threat Detection
Rajashekar Yasani
-
October 6, 2019
0
Vulnerability Analysis
Exploring TheHive: Open-Source Incident Response Platform
Rajashekar Yasani
-
January 18, 2018
0
Cyber security
Mastering OSQuery: SQL-Powered Endpoint Monitoring
Rajashekar Yasani
-
June 8, 2017
0
Web Application Analysis
Getting Started with Wireshark: Network Traffic Analysis
Rajashekar Yasani
-
May 6, 2016
0
Pentesting Tools
Introduction to OpenVAS: Open-Source Vulnerability Scanning
Rajashekar Yasani
-
December 13, 2015
0
APPLICATIONS
ggshield : Detect secret in source code, scan your repo for leaks
R K
-
September 20, 2022
Sitrep : Extensible, Configurable Host Triage
R K
-
September 28, 2020
VXScan : Python3 Comprehensive Scanning Tool
R K
-
June 26, 2019
BugBountyScanner : A Bash Script & Docker Image For Bug Bounty Reconnaissance
R K
-
March 10, 2021
HOT NEWS
Sh00t : A Testing Environment for Manual Security Testers
R K
-
January 29, 2019
0
Kali Linux
Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy, a tough...