Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
Linux
How to Use the Linux find Command to Locate Files Like a Pro
Linux
How to Check Open Ports in Linux Using netstat, ss, and lsof
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by Varshini
Varshini
1340 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Cyber security
CLay – Enhancing Web Security hrough Deceptive Reverse Proxies
Varshini
-
July 26, 2024
0
Cyber security
Entraspray – Enhancing Password Spraying Tools For Microsoft Azure Security
Varshini
-
July 26, 2024
0
Hacking Tools
IAT-Tracer V2 : Streamlining API Function Tracing For Enhanced Cybersecurity
Varshini
-
July 25, 2024
0
Cyber security
Gouge – The Essential Burp Suite Extension For URL Extraction
Varshini
-
July 25, 2024
0
Cyber security
Microsoft-Analyzer-Suite (Community Edition) : A Deep Dive Into Analyzing Microsoft 365...
Varshini
-
July 25, 2024
0
Hacking Tools
Cloud_Enum – Advancing Cloud Security Through Multi-Cloud OSINT Tools
Varshini
-
July 24, 2024
0
Cyber security
EDRPrison – Advanced Evasion Techniques Using Legitimate WFP Drivers
Varshini
-
July 24, 2024
0
Cyber security
Using Hardware -Based Exploits : A Comprehensive Guide To Braktooth, Internalblue,...
Varshini
-
July 23, 2024
0
Cyber security
Manual Exploits – Assessing Device Security Through Direct Interaction
Varshini
-
July 23, 2024
0
Exploitation Tools
Workflow – Comprehensive Guide To Using BlueToolkit For Bluetooth Vulnerability Testing
Varshini
-
July 23, 2024
0
1
...
61
62
63
...
134
Page 62 of 134
APPLICATIONS
Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell
0xSnow
-
August 30, 2025
Re2Pcap : Create PCAP file From Raw HTTP Request Or Response In Seconds
R K
-
February 11, 2020
RedELK – Essential Naming Requirements For Deployment
Varshini
-
July 15, 2024
CloudGrep – Efficient Direct Search For Logs In Cloud Storage
Varshini
-
October 10, 2023
HOT NEWS
Limelighter : A Tool For Generating Fake Code Signing Certificates Or...
R K
-
October 29, 2021
0
Kali Linux
Limelighter is a tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid...