Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
Spray365 : Makes Spraying Microsoft Accounts Through Two-Step Password Spraying Approach
R K
-
February 22, 2022
0
Kali Linux
SQLbit : Just Another Script For Automatize Boolean-Based Blind SQL Injectionsv
R K
-
February 22, 2022
0
Kali Linux
Mesh-Kridik : An Open-Source Security Checker That Performs Security Checks On...
R K
-
February 22, 2022
0
Kali Linux
Web Cache Vulnerability Scanner : A Go-based CLI Tool For Testing...
R K
-
February 22, 2022
0
Kali Linux
MUI : A GUI Plugin For Binary Ninja To Interact And...
R K
-
February 18, 2022
0
Kali Linux
Umay : IoT Malware Similarity Analysis Platform
R K
-
February 17, 2022
0
Kali Linux
MultiPotato : Another Potato to get SYSTEM via SeImpersonate privileges
R K
-
February 17, 2022
0
Kali Linux
TrojanSourceFinder : Help Find Trojan Source Vulnerability In Code
R K
-
February 17, 2022
0
Kali Linux
Mariana Trench : Security Focused Static Analysis Tool For Android And...
R K
-
February 15, 2022
0
Kali Linux
log4j-Scan : A Fully Automated, Accurate & Extensive Scanner For Finding...
R K
-
February 15, 2022
0
1
...
62
63
64
...
280
Page 63 of 280
APPLICATIONS
ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications
R K
-
June 7, 2018
WinPwn : Automation for Internal Windows Penetrationtest / AD-Security
R K
-
April 1, 2019
Blind SQL Bitshifting : A Blind SQL Injection Module That Uses Bitshfting To Calculate...
R K
-
July 20, 2019
Seth : Perform A MitM Attack & Extract Clear Text Credentials From RDP Connections
R K
-
June 20, 2019
HOT NEWS
How to Use the Linux find Command to Locate Files Like...
0xSnow
-
February 23, 2026
0
Linux
Managing files efficiently is a core skill for anyone working in Linux, whether you're a developer, system administrator, or cybersecurity professional. As systems grow,...