{"id":18746,"date":"2021-09-29T15:22:08","date_gmt":"2021-09-29T15:22:08","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=18746"},"modified":"2021-09-29T15:28:00","modified_gmt":"2021-09-29T15:28:00","slug":"pyhook","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pyhook\/","title":{"rendered":"PyHook : An Offensive API Hooking Tool Written In Python Designed To Catch Various Credentials Within The API Call"},"content":{"rendered":"\n<p><strong>PyHook<\/strong> is the python implementation of my&nbsp;SharpHook&nbsp;project, It uses various API hooks in order to give us the desired credentials.<\/p>\n\n\n\n<p>PyHook Uses frida to inject it&#8217;s dependencies into the target process<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/IlanKalendarov\/PyHook#supported-processes\"><\/a><strong>Supported Processes<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Process<\/th><th>API Call<\/th><th>Description<\/th><th>Progress<\/th><\/tr><\/thead><tbody><tr><td>mstsc<\/td><td><code><strong>CredUnPackAuthenticationBufferW<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>CredUnPackAuthenticationBufferW<\/strong><\/code>&nbsp;from mstsc and outputs username and password<\/td><td>DONE<\/td><\/tr><tr><td>runas<\/td><td><code><strong>CreateProcessWithLogonW<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>CreateProcessWithLogonW<\/strong><\/code>&nbsp;from runas and outputs username, password and a domain name.<\/td><td>DONE<\/td><\/tr><tr><td>PowerShell<\/td><td><code><strong>CreateProcessWithLogonW<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>CreateProcessWithLogonW<\/strong><\/code>&nbsp;from PowerShell and outputs username, password and a domain name (e.g &#8211;&nbsp;<code><strong>Start-Process cmd<\/strong> <strong>-Credential X<\/strong><\/code>).<\/td><td>DONE<\/td><\/tr><tr><td>cmd<\/td><td><code><strong>RtlInitUnicodeStringEx<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>RtlInitUnicodeStringEx<\/strong><\/code>&nbsp;from cmd and outputs data from specific filters (e.g &#8211; &#8220;-p&#8221;, &#8220;password&#8221; etc).<\/td><td>DONE<\/td><\/tr><tr><td>MobaXterm<\/td><td><code><strong>CharUpperBuffA<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>CharUpperBuffA<\/strong><\/code>&nbsp;from MobaXterm and outputs credentials for RDP and SSH logins.<\/td><td>DONE<\/td><\/tr><tr><td>explorer (UAC Prompt)<\/td><td><code><strong>CredUnPackAuthenticationBufferW<\/strong><\/code><\/td><td>Hooks&nbsp;<code><strong>CredUnPackAuthenticationBufferW<\/strong><\/code>&nbsp;from explorer and outputs username, password and a domain name.<\/td><td>DONE<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Demo<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-D-SlOzbfFoc\/YUyIvQz82fI\/AAAAAAAAK7w\/GcCmDfkzD4kh6NBzWbqwDeV8fErPB49tgCLcBGAsYHQ\/s1756\/Demo.gif\" alt=\"\" \/><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/IlanKalendarov\/PyHook\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>PyHook is the python implementation of my&nbsp;SharpHook&nbsp;project, It uses various API hooks in order to give us the desired credentials. PyHook Uses frida to inject it&#8217;s dependencies into the target process Supported Processes Process API Call Description Progress mstsc CredUnPackAuthenticationBufferW Hooks&nbsp;CredUnPackAuthenticationBufferW&nbsp;from mstsc and outputs username and password DONE runas CreateProcessWithLogonW Hooks&nbsp;CreateProcessWithLogonW&nbsp;from runas and outputs username, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":18754,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4237,4236,4235,2676],"class_list":["post-18746","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-api-call","tag-api-hooking-tool","tag-pyhook","tag-python"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PyHook : An Offensive API Hooking Tool Written In Python<\/title>\n<meta name=\"description\" content=\"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pyhook\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PyHook : An Offensive API Hooking Tool Written In Python\" \/>\n<meta property=\"og:description\" content=\"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pyhook\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-29T15:22:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-29T15:28:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"PyHook : An Offensive API Hooking Tool Written In Python Designed To Catch Various Credentials Within The API Call\",\"datePublished\":\"2021-09-29T15:22:08+00:00\",\"dateModified\":\"2021-09-29T15:28:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/\"},\"wordCount\":160,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\",\"keywords\":[\"API Call\",\"API Hooking Tool\",\"PyHook\",\"Python\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pyhook\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/\",\"name\":\"PyHook : An Offensive API Hooking Tool Written In Python\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\",\"datePublished\":\"2021-09-29T15:22:08+00:00\",\"dateModified\":\"2021-09-29T15:28:00+00:00\",\"description\":\"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pyhook\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PyHook : An Offensive API Hooking Tool Written In Python","description":"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pyhook\/","og_locale":"en_US","og_type":"article","og_title":"PyHook : An Offensive API Hooking Tool Written In Python","og_description":"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.","og_url":"https:\/\/kalilinuxtutorials.com\/pyhook\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-09-29T15:22:08+00:00","article_modified_time":"2021-09-29T15:28:00+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"PyHook : An Offensive API Hooking Tool Written In Python Designed To Catch Various Credentials Within The API Call","datePublished":"2021-09-29T15:22:08+00:00","dateModified":"2021-09-29T15:28:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/"},"wordCount":160,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","keywords":["API Call","API Hooking Tool","PyHook","Python"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pyhook\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/","url":"https:\/\/kalilinuxtutorials.com\/pyhook\/","name":"PyHook : An Offensive API Hooking Tool Written In Python","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","datePublished":"2021-09-29T15:22:08+00:00","dateModified":"2021-09-29T15:28:00+00:00","description":"PyHook is the python implementation of my\u00a0SharpHook\u00a0project, It uses various API hooks in order to give us the desired credentials.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pyhook\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pyhook\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-Q5uKz6NQnwE\/YVSFkHRgBXI\/AAAAAAAAK-w\/SNo1Gcn1uPQCsoI40AilzekJ7XMHIH1qwCLcBGAsYHQ\/s728\/maxresdefault.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":7427,"url":"https:\/\/kalilinuxtutorials.com\/rdpthief-passwords-mstsc-exe-api-hooking\/","url_meta":{"origin":18746,"position":0},"title":"RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking","author":"R K","date":"November 25, 2019","format":false,"excerpt":"RDPThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the clear-text credentials and save them to a file. An aggressor script accompanies it, which is responsible for managing the state, monitoring for new processes and injecting the shellcode in mstsc.exe.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/F77eODhkJ80\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":12006,"url":"https:\/\/kalilinuxtutorials.com\/censys-python\/","url_meta":{"origin":18746,"position":1},"title":"Censys-Python : An Easy-To-Use &#038; Lightweight API Wrapper For The Censys Search Engine","author":"R K","date":"December 29, 2020","format":false,"excerpt":"Censys-Python is an easy-to-use and lightweight API wrapper for the Censys Search Engine (censys.io). Python 3.6+ is currently supported. Getting Started The library can be installed using pip. $ pip install censys To configure your credentials run censys config or set both CENSYS_API_ID and CENSYS_API_SECRET environment variables. $ censys config\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6050,"url":"https:\/\/kalilinuxtutorials.com\/slurp-evaluate-the-security-s3-buckets\/","url_meta":{"origin":18746,"position":2},"title":"Slurp : Evaluate The Security Of S3 Buckets","author":"R K","date":"August 4, 2019","format":false,"excerpt":"Slurp is a Blackbox\/whitebox S3 bucket enumerator. Overview Credit to all the vendor packages that made this tool possible.This is a security tool; it's meant for pen-testers and security professionals to perform audits of s3 buckets. Features Scan via domain(s); you can target a single domain or a list of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3273,"url":"https:\/\/kalilinuxtutorials.com\/cloudbunny-real-ip-server\/","url_meta":{"origin":18746,"position":3},"title":"CloudBunny &#8211; CloudBunny Is A Tool To Capture The Real IP Of The Server","author":"R K","date":"November 25, 2018","format":false,"excerpt":"CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool we used three search engines to search domain information: Shodan, Censys and Zoomeye. CloudBunny is a tool to capture the origin server that uses a WAF\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5914,"url":"https:\/\/kalilinuxtutorials.com\/git-hound-exposed-keys-across-github\/","url_meta":{"origin":18746,"position":4},"title":"Git Hound &#8211; Find Exposed Keys Across GitHub Using Code Search Keywords","author":"R K","date":"July 23, 2019","format":false,"excerpt":"Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system. This differs from other OSINT GitHub scanners by searching keywords across GitHub rather than targeting specific repositories, exposing a fundamentally different set of results.\u00a0 GitRob\u00a0is an excellent tool that\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31562,"url":"https:\/\/kalilinuxtutorials.com\/photo-location-finder\/","url_meta":{"origin":18746,"position":5},"title":"Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks and Labels in Images","author":"Varshini","date":"December 20, 2023","format":false,"excerpt":"This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud Vision API. The code takes a JSON configuration file that contains the API key and credentials file path for the Google Cloud Vision API, as well as other optional parameters,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=18746"}],"version-history":[{"count":8,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18746\/revisions"}],"predecessor-version":[{"id":18958,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/18746\/revisions\/18958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/18754"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=18746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=18746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=18746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}