Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
AF-ShellHunter : Auto Shell Lookup
R K
-
October 28, 2021
0
Kali Linux
Covert-Tube : Youtube As Covert-Channel – Control Systems Remotely And Execute...
R K
-
October 28, 2021
0
Kali Linux
Qu1cksc0pe : All-in-One Static Malware Analysis Tool
R K
-
October 27, 2021
0
Kali Linux
GitOops : All Paths Lead To Clouds
R K
-
October 27, 2021
0
Kali Linux
BruteLoops : Protocol Agnostic Online Password Guessing API
R K
-
October 26, 2021
0
Kali Linux
FUSE : A Penetration Testing Tool For Finding File Upload Bugs
R K
-
October 26, 2021
0
Kali Linux
LinuxCatScale : Incident Response Collection And Processing Scripts With Automated Reporting...
R K
-
October 26, 2021
0
Kali Linux
Azur3Alph4 : A PowerShell Module That Automates Red-Team Tasks For Ops...
R K
-
October 26, 2021
0
Kali Linux
ForgeCert : “Golden” Certificates
R K
-
October 26, 2021
0
Kali Linux
Rdesktop : Open Source Client for Microsoft’s RDP protocol
R K
-
October 26, 2021
0
1
...
75
76
77
...
280
Page 76 of 280
APPLICATIONS
Amass : In-Depth DNS Enumeration and Network Mapping
R K
-
June 4, 2019
Understanding CVE-2024-12084 And Its Exploitation
Varshini
-
February 5, 2025
O365Spray : Username Enumeration And Password Spraying Tool Aimed At Microsoft O365
R K
-
February 8, 2022
10000 H1 Disclosed Reports : Comprehensive Insights From A 5000-Report Analysis
Varshini
-
February 4, 2025
HOT NEWS
No-Consolation – Executing Unmanaged PEs Inline And Without Console Allocation
Varshini
-
November 14, 2023
0
Cyber security
This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console (i.e. spawning conhost.exe). Features Supports 64 and...