Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
Hacking Tools
ScrapeServ : A Versatile URL-to-Screenshots Web Scraping Tool
Applications
Zellij : A Versatile Terminal Multiplexer
software
Helix : A Deep Dive Into The Modern Terminal-Based Text Editor
Applications
Tauri : A Lightweight Framework For Desktop Applications
Applications
Zed : The Future Of Code Collaboration And AI Integration
All
Android
Apple
Apple
MLX-VLM : A Comprehensive Tool For Vision Language Models On Mac
Geeks
Linux
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Kali Linux Tools
Delta : A Powerful Syntax-Highlighting Pager For Git And Command-Line Workflows
Database Assessment
Limbo : The Modern Evolution Of SQLite
Applications
Bottom : Your Ultimate Guide To Mastering System Monitoring Across Platforms
Applications
Applications
Zellij : A Versatile Terminal Multiplexer
Applications
Cot : A Modern Web Framework For Rust
Applications
Tauri : A Lightweight Framework For Desktop Applications
Applications
Lapce : The Cutting-Edge, Rust-Built Code Editor For Modern Developers
Applications
Zed : The Future Of Code Collaboration And AI Integration
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Home
Authors
Posts by Varshini
Varshini
1197 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Cyber security
SharpRDPHijack : A .NET Utility For RDP Session Hijacking
Varshini
-
December 31, 2024
0
Exploitation Tools
SharpExecute : Advanced Techniques For Stealth .NET Execution And CLR Manipulation
Varshini
-
December 31, 2024
0
Linux
BlackPill : A Comprehensive Overview Of A Stealthy Linux Rootkit
Varshini
-
December 30, 2024
0
Pentesting Tools
RustScan : Revolutionizing Port Scanning With Speed And Extensibility
Varshini
-
December 30, 2024
0
Linux
uutils Coreutils : A Comprehensive Guide To The Cross-Platform GNU Reimplementation...
Varshini
-
December 30, 2024
0
Database Assessment
SQLx : The Asynchronous, Safe, And Flexible SQL Library For Rust
Varshini
-
December 30, 2024
0
software
Pyxel : A Complete Guide To The Python-Based Game Engine
Varshini
-
December 27, 2024
0
Cyber security
Shadowsocks : The Ultimate Guide To Features, Installation, And Configuration
Varshini
-
December 27, 2024
0
Windows
Syscall Tables : Evolution From NT5 To NT11
Varshini
-
December 27, 2024
0
Applications
GitButler : Revolutionizing Branch Management With Virtual Branches
Varshini
-
December 26, 2024
0
1
...
23
24
25
...
120
Page 24 of 120
APPLICATIONS
gophish : Open-Source Phishing Toolkit
R K
-
September 23, 2022
MEC : massExploitConsole For Concurrent Exploiting
R K
-
January 16, 2019
Five Benefits That Will Convince You to Integrate Your Systems
Balaji N
-
September 3, 2019
S3Reverse : Format Of Various S3 Buckets
R K
-
April 30, 2020
HOT NEWS
Callstack Spoofing + Indirect Syscalls POC – Unmasking Evasion Techniques In...
Varshini
-
November 10, 2023
0
Cyber security
This project consists of a simple C++ self-Injecting dropper focused on EDR evasion POC. To implement it, I have combined the use of Windows Thread...