{"id":12190,"date":"2021-03-03T19:00:46","date_gmt":"2021-03-03T13:30:46","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=12190"},"modified":"2021-03-03T19:00:46","modified_gmt":"2021-03-03T13:30:46","slug":"horusec","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/horusec\/","title":{"rendered":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities"},"content":{"rendered":"\n<p><strong>Horusec <\/strong>is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages for analysis are: C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart. <\/p>\n\n\n\n<p>The tool has options to search for key leaks and security flaws in all files of your project, as well as in Git history. Horusec can be used by the developer through the CLI and by the DevSecOps team on CI \/CD mats. See in our <a href=\"https:\/\/horusec.io\/docs\">DOCUMENTATION<\/a> the complete list of tools and languages that we perform analysis.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-KGuF_3kzFwg\/YD6P-QJ-MGI\/AAAAAAAAIbI\/3YRWvXcuyrwI23FaXsZnWShvzOsRhM-QwCLcBGAsYHQ\/s2048\/horusec-complete-architecture.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Project Roadmap 2021<\/strong><\/p>\n\n\n\n<p>We started the project to aggregate within our company, but as the search grew more and more we chose to apply good practices and open it up for everyone to collaborate with this incredible project.<\/p>\n\n\n\n<p>In order to achieve our goals, we separated in some delivery phases:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Phase 0:<\/strong> Support for all horusec-cli features into <a href=\"https:\/\/github.com\/ZupIT\/horusec-vscode-plugin\">horusec-vscode<\/a> (Q1)<\/li><li><strong>Phase 1:<\/strong> Support for the Theia(VsCode Web) (Q1)<\/li><li><strong>Phase 2:<\/strong> Support to Flutter, Dart, Bash, Shell, Elixir, Cloujure e Scala in analysis (Q1)<\/li><li><strong>Phase 3:<\/strong> New service to manager vulnerabilities founds (Q2)<\/li><li><strong>Phase 4:<\/strong> Dependency analysis for all supported languages (Q3)<\/li><li><strong>Phase 5:<\/strong> SAST with MVP Semantic Analysis (Q4)<\/li><li><strong>Phase 6:<\/strong> DAST with MVP symbolic analysis (Q4)<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Getting Started<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Installing<\/strong><\/p>\n\n\n\n<p>To see more details how install go to <a href=\"https:\/\/github.com\/ZupIT\/horusec\/blob\/master\/horusec-cli#installing\">HERE<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check the installation<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>horusec version<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>For use horusec-cli and check your vulnerabilities<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>horusec start<\/strong><\/p>\n\n\n\n<p>or send with the authorization token to view the content analytically in the horusec admin panel.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>horusec start -a=&#8221;&lt;YOUR_TOKEN_AUTHORIZATION&gt;&#8221;<\/strong><\/p>\n\n\n\n<p>To acquire the authorization token and you can see your vulnerabilities analytically on our panel see more details <a href=\"https:\/\/github.com\/ZupIT\/horusec\/blob\/master\/horusec-cli#authorization\">HERE<\/a><\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>WARN:<\/strong> When horusec starts an analysis it creates a folder called <code>.horusec<\/code>. This folder serves as the basis for not changing your code. So we recommend that you add the line <code>.horusec<\/code> into your <code>.gitignore<\/code> file so that this folder does not need to be sent to your git server!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-e4DJZ5tOaZQ\/YD6PbLbIKFI\/AAAAAAAAIa8\/HO44P0Li5xYoIXeiisZdhLtzsc4UroGFgCLcBGAsYHQ\/s1918\/usage_horusec.gif\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Requirements for usage horusec-cli<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>docker<\/li><li>git(Mandatory if you are using search throughout the project&#8217;s git history)<\/li><\/ul>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Usage locally<\/strong><\/p>\n\n\n\n<p>For usage the horusec locally clone horusec in your local machine and run<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>make install<\/strong><\/p>\n\n\n\n<p>and run the <a href=\"https:\/\/github.com\/ZupIT\/horusec\/blob\/master\/horusec-cli#horusec-cli\">HORUSEC-CLI<\/a> to start the analysis<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Default Development account<\/strong><\/li><\/ul>\n\n\n\n<p>For usage complete feature of the horusec you can see enter using this default user generated by horusec for you usage.<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>WARN:<\/strong> We do dns validation for account creation, so remember to use a valid email. For tests accounts we accept <a href=\"mailto:...@example.com\">&#8230;@example.com<\/a> as a valid dns.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>email: dev@example.com   <br>password: Devpass0* <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Requirements for use complete horusec locally<\/strong><ul><li>docker<\/li><li>git<\/li><li>docker-compose\/helm<\/li><li>golang<\/li><li>rabbitmq<\/li><li>postgres<\/li><li>account-of-email (optional)<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Horusec manager<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Separate repositories by companies<\/li><li>Manage users who have access to your company (users must be pre-registered on horusec to be invited to a pre-existing company)<\/li><li>Manage the repositories available in your company for analysis<\/li><li>Manage users who have access to company repositories<\/li><li>Manage your access tokens for the specific repository (required to identify which repository this analysis belongs to and save to our system)<\/li><li>Visually view all existing vulnerabilities in your company and\/or its repository<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/ZupIT\/horusec\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages for analysis are: C#, Java, Kotlin, Python, Ruby, Golang, Terraform, Javascript, Typescript, Kubernetes, PHP, C, HTML, JSON, Dart. The tool has options to search for key leaks and security flaws in all files [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16679,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","fifu_image_alt":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1535,2327,3560],"class_list":["post-12190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-horusec","tag-open-source-2","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/horusec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/horusec\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-03T13:30:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities\",\"datePublished\":\"2021-03-03T13:30:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/\"},\"wordCount\":528,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\",\"keywords\":[\"Horusec\",\"Open Source\",\"Vulnerabilities\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/horusec\/\",\"name\":\"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\",\"datePublished\":\"2021-03-03T13:30:46+00:00\",\"description\":\"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/horusec\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities","description":"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/horusec\/","og_locale":"en_US","og_type":"article","og_title":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities","og_description":"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages","og_url":"https:\/\/kalilinuxtutorials.com\/horusec\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-03-03T13:30:46+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/horusec\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/horusec\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities","datePublished":"2021-03-03T13:30:46+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/horusec\/"},"wordCount":528,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","keywords":["Horusec","Open Source","Vulnerabilities"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/horusec\/","url":"https:\/\/kalilinuxtutorials.com\/horusec\/","name":"Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","datePublished":"2021-03-03T13:30:46+00:00","description":"Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/horusec\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/horusec\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-yF0HEMq2od0\/YD6QPy-0ItI\/AAAAAAAAIbU\/QmYLvUJW_KkFQ-7gdvASp0JQxwUSUBC_ACLcBGAsYHQ\/s728\/horusec_logo%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":34382,"url":"https:\/\/kalilinuxtutorials.com\/tca\/","url_meta":{"origin":12190,"position":0},"title":"TCA &#8211; A Comprehensive Toolkit For Code Analysis And Quality Assurance","author":"Varshini","date":"August 12, 2024","format":false,"excerpt":"Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36270,"url":"https:\/\/kalilinuxtutorials.com\/secora\/","url_meta":{"origin":12190,"position":1},"title":"SeCoRA : Revolutionizing Secure Code Review With AI","author":"Varshini","date":"February 10, 2025","format":false,"excerpt":"SeCoRA (Secure Code Review AI Agent) is an advanced AI-powered tool designed to enhance the security of software codebases by identifying and remediating vulnerabilities. Built with Python 3.12+ and licensed under MIT, SeCoRA leverages state-of-the-art language models to perform static analysis, detect interconnected risks, and provide actionable security recommendations. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/SeCoRA-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24013,"url":"https:\/\/kalilinuxtutorials.com\/code-analysis\/","url_meta":{"origin":12190,"position":2},"title":"Code Analysis : Static Code Analysis","author":"R K","date":"April 20, 2022","format":false,"excerpt":"Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKZZ5I5hR01lSdpb7Kweo0ElrIBN8xdRuHNlcs1NPcWsB_ZPO9ecQnDHHFECgAy-bQkS-YhSg4r0sBJDfSQmnUK-bMHMuWY6xaJdjHwY5At5M1H3PZgzF-RTNmqf7rwEB07-cl0ltc5L1Dh4YWY4PgLr4KyfkkK39qituRHLxpIcY0BGxwdLt6w_VW\/s728\/68747470733a2f2f74656e63656e742e6769746875622e696f2f436f6465416e616c797369732f6d656469612f4c6f676f2e737667-svg.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKZZ5I5hR01lSdpb7Kweo0ElrIBN8xdRuHNlcs1NPcWsB_ZPO9ecQnDHHFECgAy-bQkS-YhSg4r0sBJDfSQmnUK-bMHMuWY6xaJdjHwY5At5M1H3PZgzF-RTNmqf7rwEB07-cl0ltc5L1Dh4YWY4PgLr4KyfkkK39qituRHLxpIcY0BGxwdLt6w_VW\/s728\/68747470733a2f2f74656e63656e742e6769746875622e696f2f436f6465416e616c797369732f6d656469612f4c6f676f2e737667-svg.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKZZ5I5hR01lSdpb7Kweo0ElrIBN8xdRuHNlcs1NPcWsB_ZPO9ecQnDHHFECgAy-bQkS-YhSg4r0sBJDfSQmnUK-bMHMuWY6xaJdjHwY5At5M1H3PZgzF-RTNmqf7rwEB07-cl0ltc5L1Dh4YWY4PgLr4KyfkkK39qituRHLxpIcY0BGxwdLt6w_VW\/s728\/68747470733a2f2f74656e63656e742e6769746875622e696f2f436f6465416e616c797369732f6d656469612f4c6f676f2e737667-svg.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhKZZ5I5hR01lSdpb7Kweo0ElrIBN8xdRuHNlcs1NPcWsB_ZPO9ecQnDHHFECgAy-bQkS-YhSg4r0sBJDfSQmnUK-bMHMuWY6xaJdjHwY5At5M1H3PZgzF-RTNmqf7rwEB07-cl0ltc5L1Dh4YWY4PgLr4KyfkkK39qituRHLxpIcY0BGxwdLt6w_VW\/s728\/68747470733a2f2f74656e63656e742e6769746875622e696f2f436f6465416e616c797369732f6d656469612f4c6f676f2e737667-svg.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31324,"url":"https:\/\/kalilinuxtutorials.com\/top-penetration-testing-software-tools-essential-for-security-assessments\/","url_meta":{"origin":12190,"position":3},"title":"Top Penetration Testing Software &amp; Tools &#8211; Essential for Security Assessments","author":"Varshini","date":"November 22, 2023","format":false,"excerpt":"This article offers a comprehensive overview of the nine most commonly utilized penetration testing tools in the cybersecurity domain. The utilization of tools such as Netsparker, Wireshark, and Kali Linux is crucial in the process of identifying vulnerabilities across diverse digital environments. Each tool provides distinct functionalities for conducting web\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32288,"url":"https:\/\/kalilinuxtutorials.com\/android-security-awesome\/","url_meta":{"origin":12190,"position":4},"title":"Android Security Awesome : Securing the Android Ecosystem &#8211; A Comprehensive Resource Guide","author":"Varshini","date":"March 12, 2024","format":false,"excerpt":"In the ever-evolving landscape of mobile technology, Android security remains a paramount concern for developers, researchers, and users alike. 'Android Security Awesome' is a comprehensive guide that aggregates an array of tools, academic resources, publications, and insights into exploits, vulnerabilities, and bugs within the Android ecosystem. This collection aims to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglosJOinQNBiPwfkA1zF2yze2WRUcQdBZE0QrLklZ_TfqPXO7XbVeDeyzFPdXZfhsOgHOqMAddvdH4M9faZEJ38nMhfQioDNHVOfhiPkq-q0Ixx8TL5Reaf0WR4W8upr_qxH4x-NnZ9BWf6cKeebhyNh5xNzEMfeNGrARz_6kS4cL1jBAym2C6pnSwmfsR\/s16000\/Android%20Security%20Awesome.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36050,"url":"https:\/\/kalilinuxtutorials.com\/understanding-vulnerability-and-its-tools-in-cybersecurity\/","url_meta":{"origin":12190,"position":5},"title":"Understanding Vulnerability And Its Tools In Cybersecurity","author":"Varshini","date":"February 4, 2025","format":false,"excerpt":"In cybersecurity, a vulnerability refers to a flaw or weakness in a system, application, or network that attackers can exploit to gain unauthorized access or cause harm. These vulnerabilities can stem from coding errors, unpatched software, misconfigurations, or even human errors. Identifying and addressing vulnerabilities is critical to maintaining robust\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Understanding-Vulnerability-And-Its-Tools-In-Cybersecurity.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12190"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12190\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16679"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12190"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}