Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
PCILeech – Direct Memory Access (DMA) Attack Software
R K
-
August 2, 2018
0
Kali Linux
Mercure – Tool For Security Managers Who Want To Train Their...
R K
-
August 1, 2018
0
Kali Linux
GoldenEye – GoldenEye Layer 7 DoS Test Tool
R K
-
August 1, 2018
0
Kali Linux
ReelPhish – A Real-Time Two-Factor Phishing Tool
R K
-
August 1, 2018
0
Kali Linux
OWTF – Offensive Web Testing Framework Great Tools & Make Pen...
R K
-
July 31, 2018
0
Kali Linux
WTF – A Personal Information Dashboard For Your Terminal
R K
-
July 31, 2018
0
Kali Linux
IP-Biter : The Hacker-friendly E-Mail Tracking Framework
R K
-
July 28, 2018
0
Kali Linux
URH : Universal Radio Hacker To Investigate Wireless Protocols Like A...
R K
-
July 27, 2018
0
Kali Linux
Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks
R K
-
July 26, 2018
0
Kali Linux
EvilOSX – An Evil Remote Administration Tool For MacOS / OS...
R K
-
July 26, 2018
0
1
...
266
267
268
...
280
Page 267 of 280
APPLICATIONS
Cryptondie : A Ransomware Developed For Study Purposes
R K
-
October 4, 2019
Live-Forensicator : Powershell Script To Aid Incidence Response And Live Forensics
R K
-
May 24, 2022
Sh00t : A Testing Environment for Manual Security Testers
R K
-
January 29, 2019
NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell
R K
-
February 22, 2020
HOT NEWS
Iroh : The Future Of Decentralized Networking Technology
Varshini
-
February 19, 2025
0
Cyber security
Iroh is a Rust-based library designed to simplify peer-to-peer (P2P) networking by enabling direct connections between devices. It leverages public key-based addressing, bypassing traditional...