Instagram
Linkedin
Twitter
Kali Linux Tutorials
Cybersecurity
Apple
Geeks
Linux
Bash Scripting
Applications
More
Search
Kali Linux Tutorials
Kali Linux Tutorials
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Bash Scripting
How to Bash Append to File: A Simple Guide for Beginners
Bash Scripting
Mastering the Bash Case Statement with Simple Examples
Bash Scripting
How to Check if a File Exists in Bash – Simply Explained
Bash Scripting
Bash Arrays Explained Simply: Beginner’s Guide with Examples
Bash Scripting
Bash For Loop Examples Explained Simply for Beginners
All
Bash Scripting
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Authors
Posts by Varshini
Varshini
1344 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Kali Linux
Installation Instructions And Folder Setup For Gcpwn On Kali Linux
Varshini
-
September 12, 2024
0
Cyber security
Dependency-Track 4.11.2 : Enhancements, Fixes, And Security Updates
Varshini
-
September 12, 2024
0
Cyber security
Dependency-Track 4.11.4 : Enhancements, Bug Fixes, And Security Updates
Varshini
-
September 12, 2024
0
Vulnerability Analysis
Dependency-Track 4.11.5 : Updates And Changes
Varshini
-
September 12, 2024
0
Pentesting Tools
OWASP Noir – A Comprehensive Guide To Advanced Source Code Analysis...
Varshini
-
September 11, 2024
0
Web Application Security
WAF Bypass Tool – A Comprehensive Guide To Enhancing Web Application...
Varshini
-
September 11, 2024
0
Exploitation Tools
Shwmae – Exploiting Windows Hello Security Protocols
Varshini
-
September 11, 2024
0
Pentesting Tools
PentestGPT – A Comprehensive Guide To Local And Hosted Deployment
Varshini
-
September 10, 2024
0
Cyber security
ScubaGear – Ensuring Microsoft 365 Security Compliance
Varshini
-
September 10, 2024
0
Cyber security
GhostStrike – The Shadows Of Advanced Cybersecurity Operations
Varshini
-
September 10, 2024
0
1
...
50
51
52
...
135
Page 51 of 135
APPLICATIONS
Biome : The Ultimate Toolchain For Web Development
Varshini
-
January 30, 2025
Gotanda : Browser Web Extension For OSINT
R K
-
December 27, 2021
SharpKiller – A Deep Dive Into Bypassing AMSI For Enhanced PowerShell Capabilities
Varshini
-
October 30, 2023
WindowSpy : A Cobalt Strike Beacon Object File Meant For Targetted User Surveillance
R K
-
May 18, 2023
HOT NEWS
chntpw – Windows Password, Account Forensics & Change User Password
Ravi Sankar
-
June 18, 2018
0
Forensics
chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to...