Facebook
Instagram
Twitter
Youtube
Sign in
KaliLinux
Tech today
Android
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Sign in
Welcome!
Log into your account
your username
your password
Forgot your password?
Password recovery
Recover your password
your email
Search
Sign in / Join
Events
Guides
Advertise
Buy Now
Facebook
Instagram
Twitter
Youtube
Sign in
Welcome! Log into your account
your username
your password
Forgot your password? Get help
Password recovery
Recover your password
your email
A password will be e-mailed to you.
Kali Linux Tutorials
KaliLinux
Tech today
Database Assessment
Polars : A High-Performance DataFrame Library
Hacking Tools
Lightpanda : Revolutionizing Headless Browsing For Modern Web Automation
Applications
Modrinth : A Comprehensive Overview Of Tools And Functions
software
Deno : The Next Generation JavaScript Runtime For Modern Web Development
Applications
ScrapeGraphAI : Revolutionizing Web Scraping With LLM And Graph Logic
All
Android
Apple
Geeks
Linux
Linux
Axum : A High-Performance Web Framework For Rust
Applications
SAND : Decoupling Sanitization From Fuzzing For Low Overhead
Applications
Neovide : Revolutionizing Text Editing With Rust And Neovim
Applications
Nixpacks : Streamlining Application Deployment With Nix And Docker
Linux
Atuin : Revolutionizing Shell History With Enhanced Search And Secure Sync
Applications
Applications
Dioxus : Revolutionizing Cross-Platform Development With Rust
Applications
Modrinth : A Comprehensive Overview Of Tools And Functions
Applications
Monorepos : Benefits, Challenges, And Essential Tools For Scalable Development
Applications
ScrapeGraphAI : Revolutionizing Web Scraping With LLM And Graph Logic
Applications
SAND : Decoupling Sanitization From Fuzzing For Low Overhead
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Home
Authors
Posts by Varshini
Varshini
1078 POSTS
0 COMMENTS
http://kalilinuxtutorials.com
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.
Linkedin
Cyber security
Dangerzone – Safely Convert Risky Documents Into Secure PDFs
Varshini
-
October 19, 2023
0
Exploitation Tools
Nord Stream – Uncovering Secrets With A CICD Exploitation Toolkit
Varshini
-
October 18, 2023
0
Tutorials
Ghidra Script Mastery – Managing And Automating With GhidraScripts For Golang
Varshini
-
October 18, 2023
0
Cyber security
CVE-2023-36723 – Windows Sandbox Directory Creation Vulnerability
Varshini
-
October 18, 2023
0
Cyber security
The Elastic Container Project – Streamlining Security Research With A Quick...
Varshini
-
October 17, 2023
0
Cyber security
Coerced Potato – Windows Privilege Escalation
Varshini
-
October 17, 2023
0
Cyber security
G3nius Tools Sploit – Your Ultimate Guide To Advanced Penetration Testing
Varshini
-
October 16, 2023
0
Hacking Tools
RustHound : A Cross-Platform BloodHound Collector Tool
Varshini
-
October 16, 2023
0
Cyber security
POSTDump – Evading Detection And Safely Dumping LSASS Memory
Varshini
-
October 16, 2023
0
Cyber security
Guide-CEH-Practical-Master – Tools, Techniques And Exam Mastery
Varshini
-
October 13, 2023
0
1
...
97
98
99
...
108
Page 98 of 108
APPLICATIONS
Eyeballer : Convolutional Neural Network For Analyzing Pentest
R K
-
August 20, 2019
BootStomp – A Bootloader Vulnerability Bug Finder
R K
-
August 20, 2018
How to Detect and Prevent Brute Force Attacks?
Linumonk
-
November 1, 2021
Curate – A tool for fetching archived URLs
R K
-
July 9, 2018
HOT NEWS
IDB – Tool To Simplify Some Common Tasks For iOS Pentesting...
R K
-
August 3, 2018
0
Kali Linux
IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line version of the tool,...