Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by R K
R K
2800 POSTS
0 COMMENTS
Kali Linux
UploadScanner : HTTP file upload scanner for Burp Proxy
R K
-
September 4, 2018
0
Kali Linux
Darling – Darwin/Mac OS Emulation Layer For Linux
R K
-
September 4, 2018
0
Kali Linux
GhostTunnel – Backdoor Transmission Method That Can Be Used In An...
R K
-
September 4, 2018
0
Kali Linux
Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits
R K
-
September 3, 2018
0
Kali Linux
Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail
R K
-
September 3, 2018
0
Kali Linux
Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms
R K
-
September 2, 2018
0
Kali Linux
Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248
R K
-
September 2, 2018
0
Kali Linux
SQLMap – SQL Injection & Database Automatic Takeover Tool
R K
-
August 29, 2018
0
Kali Linux
Ducky Exploit – Arduino Rubber Ducky Framework
R K
-
August 29, 2018
0
Kali Linux
BillCipher – Information Gathering tool for a Website or IP address
R K
-
August 29, 2018
0
1
...
261
262
263
...
280
Page 262 of 280
APPLICATIONS
hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis
Varshini
-
December 11, 2024
Mali GPU Kernel LPE – Unveiling Root Access Exploits In Google Pixel Devices
Varshini
-
March 15, 2024
FreeVulnSearch : Script to Query Vulnerabilities via the cve-search.org API
R K
-
March 21, 2019
Redherd Framework : A Collaborative And Serverless Framework
R K
-
December 8, 2021
HOT NEWS
PCILeech – Direct Memory Access (DMA) Attack Software
R K
-
August 2, 2018
0
Kali Linux
PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...