Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Tech today
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Tech today
Apple
Geeks
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
Applications
Applications
MQTT Security: Securing IoT Communications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
SShuttle: Where Transparent Proxy Meets VPN Meets SSH
R K
-
March 22, 2020
0
Kali Linux
Lazydocker : The Lazier Way To Manage Everything Docker
R K
-
March 22, 2020
0
Kali Linux
Pypykatz : Mimikatz Implementation In Pure Python
R K
-
March 21, 2020
0
Kali Linux
Token Reverser : Word List Generator To Crack Security Tokens
R K
-
March 20, 2020
0
Kali Linux
ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid...
R K
-
March 20, 2020
0
Kali Linux
AWSGen.py : AWS S3 Bucket Name Generator (beta v.)
R K
-
March 19, 2020
0
Kali Linux
Jeopardize : A Low Cost Threat Intelligence&Response Tool
R K
-
March 19, 2020
0
Kali Linux
Tea : SSH-Client Worm
R K
-
March 19, 2020
0
Windows
Microsoft WinUI : Windows UI Library Roadmap
R K
-
March 18, 2020
0
Kali Linux
Zelos : A Comprehensive Binary Emulation Platform
R K
-
March 18, 2020
0
1
...
163
164
165
...
280
Page 164 of 280
APPLICATIONS
JSshell – A JavaScript Reverse Shell For Exploiting XSS Remotely Or Finding Blind XSS
R K
-
June 20, 2020
Learn Rust, One Exercise At A Time
Varshini
-
September 20, 2024
Words Scraper : Selenium Based Web Scraper To Generate Passwords List
R K
-
June 21, 2020
GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment
R K
-
September 4, 2018
HOT NEWS
Introduction To Cryptography – The Vigenère Cipher : Racking The Code...
Varshini
-
February 6, 2024
0
Cyber security
In my first cryptography blogpost I introduced some definitions and concepts, one of them was the concept of substitution ciphers. In short, those ciphers substitute plaintext tokens...