Cybersecurity Updates & Tools
Followed by 250k+ Followers
Facebook
Instagram
X
Youtube
Sign in
Home
Cyber security
OSINT
Linux
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Home
Cyber security
OSINT
Linux
How To
LAMP Stack Ubuntu 26.04 Installation Guide
How To
How to Change User Password in Ubuntu Quickly and Securely
How To
Ubuntu Server Setup Guide for Beginners in 2026
How To
How to Install LEMP Stack on Ubuntu 26.04 for Beginners
How To
How to Install Java on Ubuntu 24.04 Easily in 2026
News
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by Varshini
Varshini
1340 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Cyber security
Crime Data Explorer : An In-Depth Look At FBI’s Open Crime...
Varshini
-
June 28, 2024
0
Cyber security
XMGoat – Mastering Azure Security Through Hands-On Attack Scenario
Varshini
-
June 27, 2024
0
Vulnerability Analysis
VulnNodeApp – Exploring Web Vulnerabilities With A Node.js Educational Tool
Varshini
-
June 27, 2024
0
Cyber security
Hfinger – Fingerprinting Malware HTTP Requests
Varshini
-
June 27, 2024
0
Pentesting Tools
CloudBrute – Unleashing Automated Security Testing Across Multiple Cloud Platforms
Varshini
-
June 27, 2024
0
Information Gathering
Ashok – The Ultimate Reconnaissance Toolkit For Penetration Testers
Varshini
-
June 27, 2024
0
Exploitation Tools
IconJector – Exploiting Windows Explorer With DLL Injection Through Icon Changes
Varshini
-
June 26, 2024
0
Post Exploitation
SharpGraphView – A Modular Toolkit For Advanced Azure Cloud Attacks
Varshini
-
June 26, 2024
0
Hacking Tools
Gungnir : Monitoring Certificate Transparency In Real-Time
Varshini
-
June 26, 2024
0
Exploitation Tools
Binary Exploitation Notes – Techniques, Resources, And More
Varshini
-
June 26, 2024
0
1
...
69
70
71
...
134
Page 70 of 134
APPLICATIONS
QRLJacking : A New Social Engineering Attack Vector
R K
-
April 14, 2019
Delta Lake : Enhancing Data Lakes With ACID Transactions And Performance Optimization
Varshini
-
February 10, 2025
Tscopy : Tool to parse the NTFS $MFT file to locate and copy specific...
R K
-
May 8, 2021
What Features Make Modern Day Games Stand Out?
Pricilla
-
May 12, 2021
HOT NEWS
Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks...
Varshini
-
December 20, 2023
0
Cyber security
This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud Vision API. The code...