Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2796 POSTS
0 COMMENTS
Kali Linux
Vproxy – Forward HTTP/S Traffic To Proxy Instance
R K
-
August 7, 2018
0
Kali Linux
The Android Application Developer Guide: Converting an iOS App to Android
R K
-
August 6, 2018
0
Kali Linux
Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native...
R K
-
August 6, 2018
0
Kali Linux
MacSubstrate – Tool For Interprocess Code Injection On macOS
R K
-
August 5, 2018
0
Kali Linux
Fluxion – Remake Of Linset By VK496 With Less Bugs &...
R K
-
August 5, 2018
0
Kali Linux
RidRelay – Easy Way To Get Domain Usernames While On An...
R K
-
August 4, 2018
0
Kali Linux
WindowsSpyBlocker – Block Spying & Tracking On Windows
R K
-
August 3, 2018
0
Kali Linux
IDB – Tool To Simplify Some Common Tasks For iOS Pentesting...
R K
-
August 3, 2018
0
Kali Linux
Shodanwave – Tool For Exploring & Obtaining Information From Cameras
R K
-
August 2, 2018
0
Kali Linux
PCILeech – Direct Memory Access (DMA) Attack Software
R K
-
August 2, 2018
0
1
...
265
266
267
...
280
Page 266 of 280
APPLICATIONS
SysReptor – An Offensive Security Reporting Tool
Varshini
-
August 29, 2023
QRLJacking : A New Social Engineering Attack Vector
R K
-
April 14, 2019
Notionterm : Embed Reverse Shell In Notion Pages
R K
-
July 15, 2022
IdentYWAF : Blind WAF Identification Tool
R K
-
January 30, 2019
HOT NEWS
TrickDump – Evading Detection With Advanced Memory Dump Techniques
Varshini
-
August 13, 2024
0
Cyber security
TrickDump dumps the lsass process without creating a Minidump file, generating instead 3 JSON and 1 ZIP file with the memory region dumps. In...