Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by R K
R K
2800 POSTS
0 COMMENTS
Kali Linux
Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in...
R K
-
March 1, 2019
0
Kali Linux
SALT – SLUB ALlocator Tracer for the Linux Kernel
R K
-
February 28, 2019
0
Kali Linux
Reko : A General Purpose Decompiler
R K
-
February 28, 2019
0
Kali Linux
PHP : Security Check List 2019
R K
-
February 27, 2019
0
Kali Linux
Beef : The Browser Exploitation Framework Project
R K
-
February 26, 2019
0
Kali Linux
SecLists : Security Tester’s Companion For Security Assessments
R K
-
February 26, 2019
0
Kali Linux
WAF ByPass : Firewall Bypass Script Based On DNS History Records
R K
-
February 25, 2019
0
Kali Linux
Pompem : Tool For Exploits & Vulnerability in Database
R K
-
February 25, 2019
0
Kali Linux
Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...
R K
-
February 21, 2019
0
Kali Linux
DCOMrade : Powershell script for enumerating vulnerable DCOM Applications
R K
-
February 21, 2019
0
1
...
240
241
242
...
280
Page 241 of 280
APPLICATIONS
ProtoBurp++: Elevating Protobuf Security Research
Varshini
-
September 26, 2023
These Three Tips Can Help you to Protect from Phishing Attacks
Linumonk
-
November 12, 2019
CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organisation
R K
-
May 26, 2019
JWTXploiter : A Tool To Test Security Of Json Web Token
R K
-
September 6, 2021
HOT NEWS
Summarized Defender For Endpoint Antivirus Detection By Endpoint
Varshini
-
February 3, 2025
0
Cyber security
Microsoft Defender for Endpoint provides comprehensive endpoint security by leveraging advanced detection, investigation, and response capabilities. One of its powerful features is the ability...