Instagram
Linkedin
Twitter
Kali Linux Tutorials
Cybersecurity
Apple
Geeks
Linux
Bash Scripting
Applications
More
Search
Kali Linux Tutorials
Kali Linux Tutorials
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Bash Scripting
How to Bash Append to File: A Simple Guide for Beginners
Bash Scripting
Mastering the Bash Case Statement with Simple Examples
Bash Scripting
How to Check if a File Exists in Bash – Simply Explained
Bash Scripting
Bash Arrays Explained Simply: Beginner’s Guide with Examples
Bash Scripting
Bash For Loop Examples Explained Simply for Beginners
All
Bash Scripting
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
Put2Win – Script To Automatize Shell Upload By PUT HTTP Method...
R K
-
September 30, 2018
0
Kali Linux
UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...
R K
-
September 30, 2018
0
Kali Linux
Mail Security Testing – Framework For Mail Security & Filtering Solutions
R K
-
September 28, 2018
0
Kali Linux
SocialBox – A Bruteforce Attack Framework[ Facebook , Gmail , Instagram...
R K
-
September 27, 2018
0
Kali Linux
SharpSploit – A .NET Post-Exploitation Library Written in C#
R K
-
September 27, 2018
0
Kali Linux
Joomscan – OWASP Joomla Vulnerability Scanner Project
R K
-
September 27, 2018
0
Kali Linux
Exploit CVE-2017-6079 – Blind Command Injection In Edgewater Edgemarc Devices Exploit
R K
-
September 26, 2018
0
Kali Linux
DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s
R K
-
September 26, 2018
0
Kali Linux
Vboxdie Cracker – Virtual Box Disk Image Encryption Password Cracker
R K
-
September 25, 2018
0
Kali Linux
Singularity – A DNS Rebinding Attack Framework
R K
-
September 25, 2018
0
1
...
256
257
258
...
280
Page 257 of 280
APPLICATIONS
B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis
R K
-
October 10, 2019
Red-Kube : Red Team K8S Adversary Emulation Based On Kubectl
R K
-
May 30, 2021
CVE-2023-6553 Exploit V2
Varshini
-
December 27, 2023
Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques
Varshini
-
March 15, 2024
HOT NEWS
Print-My-Shell : Process Of Generating Various Reverse Shells
R K
-
April 30, 2020
0
Kali Linux
Print-My-Shell is a python script, wrote to automate the process of generating various reverse shells based on PayloadsAllTheThings and Pentestmonkey reverse shell cheat sheets. Using...