kalilinuxtools

RedELK – Essential Naming Requirements For Deployment

In the complex landscape of RedELK deployment, adhering to precise naming requirements is crucial for operational success. This article delves…

8 months ago

Kdrill – Unveiling Rootkit Intrusions In Windows 64-Bit Systems

Kdrill is a tool to analyze the kernel land of Windows 64b systems (tested from Windows 7 to Windows 11).…

8 months ago

LogHunter – A Revolutionary Tool For Session Detection via Event Logs

Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN). I was once doing a very…

8 months ago

APKscan – Mastering Android Security Analysis

APKs (Android Package Kits) often leak secrets due to over-reliance on security through obscurity. Developers sometimes leave sensitive information such as API keys, tokens, and credentials hidden…

8 months ago

Akto.io – Comprehensive Security Testing And Inventory Management

Akto is an instant, open source API security platform that takes only 60 secs to get started. Akto is used…

8 months ago

CCC : Cyberspace Under Siege – Understanding Crime, Espionage, And Conflict

This is a short graduate course providing an introduction to the areas of crime, espionage and conflicts in cyberspace. The…

8 months ago

Freeway – A Comprehensive Guide To WiFi Penetration Testing With Python

"Freeway" is a Python-based tool designed to enhance WiFi penetration testing and network security. Utilizing the capabilities of Scapy, it…

8 months ago

ADSpider : Advanced Real-Time Monitoring Of Active Directory Changes

Tool for monitor Active Directory changes in real time without getting all objects. Instead of this it use replication metadata…

8 months ago

VMware vCenter : CVE-2024-37081 Proof Of Concept

Este repositorio contiene una prueba de concepto (PoC) para la vulnerabilidad CVE-2024-37081 en VMware vCenter. La vulnerabilidad se debe a…

8 months ago

DetectItEasy With Python – A Comprehensive Guide

DetectItEasy-Python is a powerful tool designed to streamline file scanning and analysis using Python bindings. This article guides you through…

8 months ago