Facebook
Instagram
Twitter
Youtube
Sign in
Home
Tech today
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Tech today
Apple
Geeks
Linux
Linux
Analyzing Directory Size Linux Tools Explained
Linux
Understanding Disk Usage with du Command
Linux
How to Check Directory Size in Linux
Linux
Essential Commands for Linux User Listing
Linux
Command-Line Techniques for Listing Linux Users
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by Varshini
Varshini
1344 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Vulnerability Analysis
Splunk RCE – PoC: In-Depth Analysis and Exploitation Methodology
Varshini
-
November 20, 2023
0
Cyber security
CVE Half-Day Watcher
Varshini
-
November 17, 2023
0
Information Gathering
WhatsApp OSINT Tool: Revolutionizing Digital Investigations
Varshini
-
November 17, 2023
0
Android Security
Compose StyleSheet: Revolutionizing UI Design in Jetpack Compose
Varshini
-
November 15, 2023
0
Cyber security
ZMap 4.0.0 RC1 – Revolutionizing Network Scanning With Multi-Port Support And...
Varshini
-
November 15, 2023
0
Cyber security
Titan – VMProtect Devirtualizer
Varshini
-
November 15, 2023
0
Cyber security
NoVmp – Unlocking VMProtect x64 With VTIL-Powered Devirtualization
Varshini
-
November 14, 2023
0
Cyber security
No-Consolation – Executing Unmanaged PEs Inline And Without Console Allocation
Varshini
-
November 14, 2023
0
Cyber security
InvisibilityCloak – A Game-Changer In C# Post-Exploitation Tools
Varshini
-
November 14, 2023
0
Cyber security
Awesome-BEC – Unveiling A Comprehensive Resource For Business Email Compromise Investigations
Varshini
-
November 14, 2023
0
1
...
118
119
120
...
135
Page 119 of 135
APPLICATIONS
XSpear : Powerfull XSS Scanning & Parameter Analysis
R K
-
August 7, 2019
ProjectOpal : Stealth Post-Exploitation Framework For WordPress
R K
-
March 31, 2020
Redirector Installation – A Comprehensive Guide For Red Team Operations
Varshini
-
September 25, 2024
BinAbsInspector : Vulnerability Scanner For Binaries
R K
-
July 7, 2022
HOT NEWS
Best WordPress Appointment Booking Plugins
Pricilla
-
June 5, 2021
0
Blog
WordPress is the most opted CMS around the world. As per stats, around 63.8% of CMS websites use WordPress. Why? Well, there are countless choices...