Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
software
Tokio : Unleashing Asynchronous Power In Rust For Network Applications
Tech today
Conduwuit : Pioneering A New Era In Matrix Homeservers
Cyber security
LLM Lies : Hallucinations Are Not Bugs, But Features As Adversarial Examples
Applications
Nitrux 3.8 Released With Linux Kernel 6.12 And MESA 3D Graphics Library
Linux
Linux 6.13-rc1 Released : What’s New!
All
Android
Apple
Geeks
Linux
Linux
Atuin : Revolutionizing Shell History With Enhanced Search And Secure Sync
Linux
Kata Containers : Bridging The Gap Between Containers And Virtual Machines
Cyber security
Exploring Kernel Vulnerabilities : A Deep Dive Into io_uring Buffer Management
Cyber security
100 Days Of Rust 2025 : From Incident Response To Linux System Programming
Applications
Wez’s Terminal : A Rust-Powered GPU-Accelerated Terminal Emulator
Applications
Applications
Biome : The Ultimate Toolchain For Web Development
Applications
Monolith : The Ultimate Tool For Compiling Entire Web Pages Into Single HTML Files
Applications
Monolith : The Ultimate Tool For Storing Entire Web Pages As Single HTML Files
Applications
Mountpoint For Amazon S3 : Enhancing File System Integration For Effective Storage Management
Applications
Wez’s Terminal : A Rust-Powered GPU-Accelerated Terminal Emulator
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Home
Authors
Posts by Varshini
Varshini
1039 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Phishing
Browser Autofill Phishing – The Hidden Dangers And Security Risks
Varshini
-
January 20, 2025
0
Cyber security
Terminal GPT (tgpt) – Your Direct CLI Gateway To ChatGPT 3.5
Varshini
-
January 20, 2025
0
Vulnerability Analysis
garak, LLM Vulnerability Scanner : The Comprehensive Tool For Assessing Language...
Varshini
-
January 17, 2025
0
Post Exploitation
Vermilion : Mastering Linux Post-Exploitation For Red Team Success
Varshini
-
January 17, 2025
0
Exploitation Tools
AD-CS-Forest-Exploiter : Mastering Security Through PowerShell For AD CS Misconfiguration
Varshini
-
January 17, 2025
0
Hacking Tools
Usage Of Tartufo – A Comprehensive Guide To Securing Your Git...
Varshini
-
January 17, 2025
0
software
Loco : A Rails-Inspired Framework For Rust Developers
Varshini
-
January 16, 2025
0
Applications
Monolith : The Ultimate Tool For Storing Entire Web Pages As...
Varshini
-
January 16, 2025
0
Applications
Mountpoint For Amazon S3 : Enhancing File System Integration For Effective...
Varshini
-
January 16, 2025
0
Malware
LitterBox : The Ultimate Sandbox Environment For Malware Testing And Red...
Varshini
-
January 13, 2025
0
1
...
4
5
6
...
104
Page 5 of 104
APPLICATIONS
Colorlight-RisCV-RS : Hacking Chinese LED Displays With Rust, RISC-V, And Open-Source FPGA Tools
Varshini
-
May 9, 2024
How Can I Find Someone’s Location Online?
Pricilla
-
April 25, 2021
Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel
R K
-
March 17, 2020
Lynis 3.0.0 – Security Auditing Tool for Unix/Linux Systems
R K
-
July 16, 2020
HOT NEWS
Penta : Open Source All-In-One CLI Tool To Automate Pentesting
R K
-
October 11, 2019
0
Kali Linux
Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info found on...