Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
EVABS : An Open Source Android Application That Is Intentionally Vulnerable
R K
-
August 29, 2019
0
Kali Linux
4CAN : Open Source Security Tool to Find Security Vulnerabilities in...
R K
-
August 28, 2019
0
Kali Linux
AIL Framework : Analysis Information Leak Framework
R K
-
August 28, 2019
0
Kali Linux
Airgeddon : This Is A Multi-Use Bash Script For Linux Systems...
R K
-
August 27, 2019
0
Kali Linux
Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency
R K
-
August 27, 2019
0
Kali Linux
IPRotate : Extension For Burp Suite Which Uses AWS API Gateway...
R K
-
August 27, 2019
0
Kali Linux
LdapDomainDump : Active Directory Information Dumper via LDAP
R K
-
August 26, 2019
0
Kali Linux
Covenant : A .NET Command & Control Framework That Aims To...
R K
-
August 26, 2019
0
Kali Linux
AutoRDPwn : The Shadow Attack Framework
R K
-
August 25, 2019
0
Kali Linux
PoshC2 : Python Server for PoshC2
R K
-
August 24, 2019
0
1
...
202
203
204
...
280
Page 203 of 280
APPLICATIONS
OSSEM : Open Source Security Events Metadata
R K
-
April 13, 2020
Monitor Smartphone usage with Cocospy Keylogger
Linumonk
-
April 18, 2019
Cicd-Goat : A Deliberately Vulnerable CI/CD Environment
R K
-
November 11, 2022
Ghost : An Android Post-Exploitation Framework
R K
-
December 22, 2020
HOT NEWS
Ghauri : A Powerful SQL Injection Detection And Exploitation Tool
Varshini
-
February 21, 2025
0
Database Assessment
Ghauri is a cutting-edge, cross-platform tool designed to automate the detection and exploitation of SQL injection vulnerabilities in web applications. Developed by Nasir Khan...