Instagram
Linkedin
Twitter
KaliLinux
Cybersecurity
Apple
Geeks
Linux
Applications
More
Search
Kali Linux Tutorials
KaliLinux
Cybersecurity
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Cyber security
SMM : From Social Media To System Management Mode
Applications
MCP Server For Obsidian : Enhancing AI Integration
Cyber security
wa-tunnel – TCP Tunneling Through Whatsapp
Applications
Deepfake Apps : How They Function And Their Applications
Apple
Apple
JBDev : A Tool For Jailbreak And TrollStore Development
Apple
Nyxian : A Low-Level Scripting Language For iOS
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
Apple
IPATool : A Comprehensive Guide To Managing iOS Apps
Apple
Trigon : A Revolutionary Kernel Exploit For iOS
Geeks
Linux
Cyber security
Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation
Applications
AMDVLK : The Power Of Vulkan On AMD GPUs For Linux
Cyber security
eBPF File Creation Blocker : Enhancing Linux Security
Applications
Zellij : A Versatile Terminal Multiplexer
Linux
Starship : Revolutionizing Terminal Experiences Across Shells
Applications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
Applications
Deepfake Apps : How They Function And Their Applications
Apple
AppStore Troller : Overcoming iOS Compatibility Barriers For App Downloads
More
Home
Tags
Kali linux
Tag: kali linux
Information Gathering
Netdiscover – Live Host Identification
Ravi Sankar
-
March 24, 2017
0
Kali Linux
Update Nmap in Kali Linux
Ravi Sankar
-
December 23, 2015
0
Database Assessment
SQLMAP – Introduction & Automation of SQLi
Ravi Sankar
-
November 29, 2015
0
Stress Testing
macof
Ravi Sankar
-
September 22, 2015
0
Blog
More Core Changes in Kali Sana (V 2.0)
Ravi Sankar
-
August 19, 2015
0
Blog
First Look at Kali Linux 2.0
Ravi Sankar
-
August 13, 2015
0
Sniffing/Spoofing
parasite6 – Redirect all IPv6 traffic through your attacker machine
Ravi Sankar
-
July 15, 2015
0
Sniffing/Spoofing
fake_router6
Ravi Sankar
-
July 7, 2015
0
Tutorials
Bluelog
Ravi Sankar
-
May 29, 2015
0
1
...
3
4
5
Page 5 of 5
APPLICATIONS
Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force
R K
-
March 19, 2021
Chroma : Powering LLM Apps With An Efficient Embedding Database
Varshini
-
January 28, 2025
Seeker V1.1.9 – Accurately Locate Smartphones Using Social Engineering
R K
-
November 20, 2019
C2concealer : Command Line Tool That Generates Randomized C2 Malleable Profiles For Use In...
R K
-
June 28, 2022
HOT NEWS
No-Consolation – Executing Unmanaged PEs Inline And Without Console Allocation
Varshini
-
November 14, 2023
0
Cyber security
This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console (i.e. spawning conhost.exe). Features Supports 64 and...