Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s
R K
-
December 5, 2018
0
Kali Linux
Miasm – Reverse Engineering Framework In Python
R K
-
December 4, 2018
0
Kali Linux
MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool
R K
-
December 4, 2018
0
Kali Linux
Trape – People Tracker On The Internet
R K
-
November 30, 2018
0
Kali Linux
Skiptracer – OSINT Python Webscaping Framework
R K
-
November 29, 2018
0
Kali Linux
Janusec – Golang Based Application Security Solution Which Provides WAF
R K
-
November 29, 2018
0
Kali Linux
Sheepl – Creating Realistic User Behaviour For Supporting Tradecraft Development Within...
R K
-
November 28, 2018
0
Kali Linux
ZIP File Raider – Burp Extension for ZIP File Payload Testing
R K
-
November 28, 2018
0
Kali Linux
NodeJsScan – Static Security Code Scanner For Node.js Applications
R K
-
November 27, 2018
0
Kali Linux
Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...
R K
-
November 27, 2018
0
1
...
248
249
250
...
280
Page 249 of 280
APPLICATIONS
Jscythe : Force Any Node.Js/Electron/V8 Based Process To Execute Arbitrary Javascript Code
R K
-
November 13, 2022
A Career as an Ethical Hacker
Linumonk
-
September 11, 2021
Ghost – Unmasking The Intricacies Of A Remote Access Trojan
Varshini
-
January 23, 2024
Yarasafe : SAFE Embeddings To Match Functions In Yara
R K
-
January 26, 2020
HOT NEWS
AutoRDPwn : The Shadow Attack Framework
R K
-
August 25, 2019
0
Kali Linux
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature by Microsoft)...