{"id":12417,"date":"2021-04-08T20:32:59","date_gmt":"2021-04-08T15:02:59","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=12417"},"modified":"2021-04-08T20:32:59","modified_gmt":"2021-04-08T15:02:59","slug":"kics","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kics\/","title":{"rendered":"Kics : Find Security Vulnerabilities &#038; Compliance Issues"},"content":{"rendered":"\n<p>Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with <strong>KICS<\/strong> by Checkmarx.<\/p>\n\n\n\n<p>KICS stands for Keeping Infrastructure as Code Secure, it is open source and is a must-have for any cloud native project.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Supported Platforms<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-EV9dGxIzzVQ\/YGzQ360ihcI\/AAAAAAAAIq8\/GdNqGchdmIshsLXAee_HKhOe83MyLrwEgCLcBGAsYHQ\/s430\/Capture.PNG\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p>Support of other solutions and additional cloud providers are on the <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/roadmap.md\">roadmap<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Getting Started<\/strong><\/p>\n\n\n\n<p>Setting up and using KICS is super-easy.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>First, see how to <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/getting-started.md\">install and get KICS running<\/a>.<\/li><li>Then explore KICS <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/results.md\">output results format<\/a> and quickly fix the issues detected.<\/li><\/ul>\n\n\n\n<p>Interested in more advanced stuff?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Deep dive into KICS <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/queries.md\">queries<\/a>.<\/li><li>Understand how to <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/integrations.md\">integrate<\/a> KICS in your favourite CI\/CD pipelines.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How it Works?<\/strong><\/p>\n\n\n\n<p>What makes KICS really powerful and popular is its built-in extensibility. This extensibility is achieved by:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Fully customizable and adjustable heuristics rules, called <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/queries.md\">queries<\/a>. These can be easily edited, extended and added.<\/li><li>Robust but yet simple <a href=\"https:\/\/github.com\/Checkmarx\/kics\/blob\/master\/docs\/architecture.md\">architecture<\/a>, which allows quick addition of support for new Infrastructure as Code solutions.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Release Process<\/strong><\/p>\n\n\n\n<p>KICS release process is quite simple. We have nightly builds that will pack and pre-release all changes merged into master. The nightly release will have a &#8220;nightly&#8221; prefix with the last commit hash code. We have binaries available for both Windows and Linux, as well a Docker image in <a href=\"https:\/\/hub.docker.com\/r\/checkmarx\/kics\">DockerHub<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/Checkmarx\/kics\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx. KICS stands for Keeping Infrastructure as Code Secure, it is open source and is a must-have for any cloud native project. Supported Platforms Support of other solutions and additional cloud providers are on the roadmap. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16736,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","fifu_image_alt":"Kics : Find Security Vulnerabilities & Compliance Issues","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1807,3560],"class_list":["post-12417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-kics","tag-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kics : Find Security Vulnerabilities &amp; Compliance Issues<\/title>\n<meta name=\"description\" content=\"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kics : Find Security Vulnerabilities &amp; Compliance Issues\" \/>\n<meta property=\"og:description\" content=\"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kics\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-08T15:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Kics : Find Security Vulnerabilities &#038; Compliance Issues\",\"datePublished\":\"2021-04-08T15:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/\"},\"wordCount\":217,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\",\"keywords\":[\"Kics\",\"Vulnerabilities\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kics\/\",\"name\":\"Kics : Find Security Vulnerabilities & Compliance Issues\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\",\"datePublished\":\"2021-04-08T15:02:59+00:00\",\"description\":\"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kics : Find Security Vulnerabilities & Compliance Issues","description":"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kics\/","og_locale":"en_US","og_type":"article","og_title":"Kics : Find Security Vulnerabilities & Compliance Issues","og_description":"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS","og_url":"https:\/\/kalilinuxtutorials.com\/kics\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-04-08T15:02:59+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kics\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kics\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Kics : Find Security Vulnerabilities &#038; Compliance Issues","datePublished":"2021-04-08T15:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kics\/"},"wordCount":217,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","keywords":["Kics","Vulnerabilities"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kics\/","url":"https:\/\/kalilinuxtutorials.com\/kics\/","name":"Kics : Find Security Vulnerabilities & Compliance Issues","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","datePublished":"2021-04-08T15:02:59+00:00","description":"Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kics\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-lCfmtobBNEk\/YGzRKn0uLqI\/AAAAAAAAIrE\/kiJIp82_evckBkEKVWRo_PYk3EKH7OkWACLcBGAsYHQ\/s728\/kics-black%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":27008,"url":"https:\/\/kalilinuxtutorials.com\/kics-2\/","url_meta":{"origin":12417,"position":0},"title":"kics : Find security vulnerabilities, compliance issues, and infrastructure misconfigurations","author":"R K","date":"September 16, 2022","format":false,"excerpt":"KICS, which stands for Keeping Infrastructure as Code Secure, is an essential component of every cloud-native project and is open source. Use KICS by Checkmarx to identify security flaws, legal compliance problems, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code. How it Works KICS's built-in extensibility is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtBN_X6UrAQUh5yvttS2CWTcqfGBEJEmm7Dsxdj36EOQUbPOGVaPWoj0uvVVxuqe8ohQ_lg3Weud4SSzMLeZFZhqyEzONeANhpEbhhFfJJMTDRLyIjTmYiG8lVQOBF1eivm8dhq-kN08qKTB5lxPRvkV_-XSAMsxfJHKx47dW3kcnqHNrTVew8H7ry\/s400\/kics_hat_color_new%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":37318,"url":"https:\/\/kalilinuxtutorials.com\/audits-portfolio\/","url_meta":{"origin":12417,"position":1},"title":"Audits Portfolio : Tools And Functions","author":"Varshini","date":"March 27, 2025","format":false,"excerpt":"In the realm of blockchain and Web3 security, audits play a crucial role in ensuring the integrity and reliability of decentralized systems. An audits portfolio typically includes a variety of tools and methodologies designed to identify vulnerabilities, assess risks, and enhance the security posture of smart contracts and blockchain applications.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Audits-Portfolio.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36034,"url":"https:\/\/kalilinuxtutorials.com\/aigoat\/","url_meta":{"origin":12417,"position":2},"title":"AIGoat : A Deliberately Vulnerable AI Infrastructure","author":"Varshini","date":"February 3, 2025","format":false,"excerpt":"AI-Goat is an innovative open-source platform designed to address the growing need for hands-on training in AI security. Developed by Orca Security, it provides a deliberately vulnerable AI infrastructure hosted on AWS, simulating real-world environments to highlight security risks associated with machine learning (ML) systems. By focusing on the OWASP\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AIGoat-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30344,"url":"https:\/\/kalilinuxtutorials.com\/zeuscloud\/","url_meta":{"origin":12417,"position":3},"title":"ZeusCloud: The Next-Gen Open Source Cloud Security Solution","author":"Varshini","date":"September 18, 2023","format":false,"excerpt":"The field of cloud computing is growing quickly, and security threats and problems have grown at the same rate. ZeusCloud is a new open-source cloud security tool that is made to deal with the risks and weaknesses of today. ZeusCloud is a game-changer because it has a full set of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCH4_7oh7OTjdwdLELyaAuC90pc1BWEQ2tzBvT2xYO9mqeIyyGUNvQkVcEskQdwuqXHyOGNe5nbOry4sib5g97_LQ61h3_SwGY3TqU-ccGC2rcMMRUbD1kSCs3FS2CMaBtAqhDN_jfQ8BeDAeuI4P3R3cprjLhMtfQlEkasJenhow7Ji04dRcdzgOcFA\/s16000\/zeuscloud.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36196,"url":"https:\/\/kalilinuxtutorials.com\/web-hacking-and-bug-bounty-tricks\/","url_meta":{"origin":12417,"position":4},"title":"Web Hacking And Bug Bounty Tricks : Tools And Techniques","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"Web hacking and bug bounty hunting involve identifying vulnerabilities in web applications to enhance their security. This field combines reconnaissance, vulnerability exploitation, and secure coding practices. Below is a detailed overview of tools and techniques commonly used in web hacking. Reconnaissance And OSINT Techniques Reconnaissance is the first step in\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Web-Hacking-And-Bug-Bounty-Tricks.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36737,"url":"https:\/\/kalilinuxtutorials.com\/locksmith\/","url_meta":{"origin":12417,"position":5},"title":"Locksmith : A Tool For Securing Active Directory Certificate Services","author":"Varshini","date":"February 27, 2025","format":false,"excerpt":"Locksmith is a specialized tool designed to identify and remediate vulnerabilities in Active Directory Certificate Services (AD CS). AD CS is a Microsoft Windows Server role that provides Public Key Infrastructure (PKI) for managing digital certificates, which are used for authentication, encryption, and secure communication. Misconfigurations in AD CS can\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Locksmith-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=12417"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/12417\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16736"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=12417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=12417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=12417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}