Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by R K
R K
2800 POSTS
0 COMMENTS
Kali Linux
Dc-sonar : Functionality For Analyzing AD Domains For Security Risks Related...
R K
-
February 23, 2023
0
Kali Linux
THE YARALYZER : Visually Inspect And Force Decode YARA And Regex...
R K
-
February 23, 2023
0
Kali Linux
SSTImap : Penetration Testing Tool For SSTI Detection And Exploitation
R K
-
February 22, 2023
0
Kali Linux
BlueHound : Tool That Helps Blue Teams Pinpoint The Security Issues
R K
-
February 21, 2023
0
Kali Linux
GUAC: Graph for Understanding Artifact Composition
R K
-
February 21, 2023
0
Kali Linux
Get-AppLockerEventlog : To Extract All The Log Relatives To AppLocker
R K
-
February 21, 2023
0
Kali Linux
Latma : Lateral movement analyzer tool
R K
-
February 20, 2023
0
Kali Linux
PowerHuntShares : Audit Script Designed In Inventory, Analyze, And Report Excessive...
R K
-
February 20, 2023
0
Kali Linux
KRIe :To Detect Linux Kernel Runtime Integrity Exploits With eBPF
R K
-
February 19, 2023
0
Kali Linux
Bkcrack : Crack legacy zip encryption with Biham and Kocher’s known...
R K
-
February 18, 2023
0
1
...
10
11
12
...
280
Page 11 of 280
APPLICATIONS
Java Deserialization Cheat Sheet – Detecting And Exploiting Vulnerabilities
Varshini
-
October 3, 2024
Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener
R K
-
November 3, 2018
POSTDump – Evading Detection And Safely Dumping LSASS Memory
Varshini
-
October 16, 2023
Ph0neutria : Malware Zoo Builder That Sources Samples Straight From The Wild
R K
-
May 15, 2019
HOT NEWS
TruffleHog Burp Suite Extension : Enhancing Security With Automated Secret Detection
Varshini
-
March 13, 2025
0
Cyber security
The TruffleHog Burp Suite Extension is a powerful tool designed to scan HTTP traffic within Burp Suite for over 800 types of secrets, including...