#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
Facebook
Instagram
Twitter
Youtube
Tutorial
Home
Tech today
Apple
Geeks
Linux
Applications
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Search
Tutorial
Home
Tech today
Apple
Accessories
Test Post
Geeks
Linux
Linux
How to Send POST Requests Using curl in Linux
Linux
What Does chmod 777 Mean in Linux
Linux
How to Undo and Redo in Vim or Vi
Linux
How to Unzip and Extract Files in Linux
Linux
Analyzing Directory Size Linux Tools Explained
Applications
Applications
MQTT Security: Securing IoT Communications
Applications
Playwright-MCP : A Powerful Tool For Browser Automation
Applications
Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs
Applications
MCP Server For Obsidian : Enhancing AI Integration
More
Windows Phone
Android
iPhone
Accessories
Bluetooth
Kali Linux Tutorials
Home
Authors
Posts by R K
R K
2797 POSTS
0 COMMENTS
Kali Linux
Latma : Lateral movement analyzer tool
R K
-
February 20, 2023
0
Kali Linux
PowerHuntShares : Audit Script Designed In Inventory, Analyze, And Report Excessive...
R K
-
February 20, 2023
0
Kali Linux
KRIe :To Detect Linux Kernel Runtime Integrity Exploits With eBPF
R K
-
February 19, 2023
0
Kali Linux
Bkcrack : Crack legacy zip encryption with Biham and Kocher’s known...
R K
-
February 18, 2023
0
Kali Linux
SQLiDetector : Simple Python Script Supported With BurpBouty Profile To Detect...
R K
-
February 18, 2023
0
Kali Linux
Popeye – A Kubernetes Cluster Sanitizer And Reports Potential Issues
R K
-
February 18, 2023
0
Kali Linux
Tai-e : A New Efficient Static Analysis Framework For Java
R K
-
February 17, 2023
0
Kali Linux
DragonCastle : A PoC That Combines AutodialDLL Lateral Movement Technique
R K
-
February 16, 2023
0
Kali Linux
Ghauri : Automates The Process Of Detecting And Exploiting SQL Injection...
R K
-
February 16, 2023
0
Kali Linux
APTRS : Automated Penetration Testing Reporting System
R K
-
February 16, 2023
0
1
...
11
12
13
...
280
Page 12 of 280
APPLICATIONS
CRT : CrowdStrike Reporting Tool for Azure
R K
-
March 14, 2022
CVE-2024-29849 : The Veeam Backup Enterprise Manager Authentication Bypass
Varshini
-
June 17, 2024
AcuAutomate: Streamlining Pentesting and Bug Hunting with Advanced Acunetix Integration
Varshini
-
December 12, 2023
ZeebSploit: Web Scanner Exploitation Information Gathering
R K
-
April 12, 2019
HOT NEWS
Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol
R K
-
June 12, 2018
0
Kali Linux
Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery...