{"id":20250,"date":"2021-11-18T05:55:53","date_gmt":"2021-11-18T05:55:53","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=20250"},"modified":"2021-11-18T05:55:57","modified_gmt":"2021-11-18T05:55:57","slug":"scarce-apache2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/","title":{"rendered":"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting Websites That Have CVE-2021-41773 Vulnerability In Public"},"content":{"rendered":"\n<p><strong>Scarce-Apache2 <\/strong>tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver, ScaRCE can run too for executing Remote Command Injections at the webservers that found from the scanning method (Only if the&nbsp;<strong>MOD_CGI<\/strong>&nbsp;is Enabled at the targeted webserver). This tool works with the provided Single target or Mass Target from a file list. Only use this tool for&nbsp;<strong><code>Bug Hunting<\/code>\/&nbsp;<code>Pentesting Purposes<\/code><\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiVpUDzPSlTP-lGEwpCg_eSMOtpbvl8gYsInzpUXCIFtxwbUL6ZNCyQiMrP_nqeEEI2OVWuGKmtcpcsFstO4t9coDe2vD2oA0OhwxJl_MHpwZF2Q2LLipkYRHpEPrefylh6XlRdLz5svP9aUcak-cAUq7n5PM4AmNPUCkn6RhjOtFMYlse7eiDTU1DT=s643\" alt=\"\" width=\"647\" height=\"319\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background wp-block-list\"><li><strong>git clone https:\/\/github.com\/HightechSec\/scarce-apache2<\/strong><\/li><li><strong>cd scarce-apache2<\/strong><\/li><li><strong>bash scarce.sh<\/strong><\/li><li><\/li><\/ul>\n\n\n\n<p>or you can install in your system like this<\/p>\n\n\n\n<ul class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background wp-block-list\"><li><strong>git clone https:\/\/github.com\/HightechSec\/scarce-apache2<\/strong><\/li><li><strong>cd scarce-apache2<\/strong><\/li><li><strong>sudo cp scarce.sh \/usr\/bin\/scarce &amp;&amp; sudo chmod +x \/usr\/bin\/scarce<\/strong><\/li><li><strong>$ scarce<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Menu&#8217;s<ul><li>Menu&nbsp;<code><strong>1<\/strong><\/code>&nbsp;is for scanning LFI Vulnerability from a provided file that contains the&nbsp;<code><strong>list of the target url<\/strong><\/code>&nbsp;or a provided&nbsp;<strong><code>single target url<\/code>.<\/strong><\/li><li>Menu&nbsp;<code><strong>2<\/strong><\/code>&nbsp;is for scanning RCE Vulnerability from a provided file that contains the&nbsp;<code><strong>list of the target url<\/strong><\/code>&nbsp;or a provided&nbsp;<strong><code>single target url<\/code>.<\/strong><\/li><li>Menu&nbsp;<code><strong>3<\/strong><\/code>&nbsp;is for Executing RCE from a provided&nbsp;<code><strong>single target url<\/strong><\/code>. This will work for the&nbsp;<code><strong>Maybe Vuln<\/strong><\/code>&nbsp;Results or sometimes with a&nbsp;<code><strong>500<\/strong> Error Response<\/code>.<\/li><\/ul><\/li><li>URL Format<ul><li>Use&nbsp;<code><strong>http:\/\/<\/strong><\/code>&nbsp;like&nbsp;<code><strong>http:\/\/example.com<\/strong><\/code>&nbsp;or&nbsp;<code><strong>https:\/\/<\/strong><\/code>&nbsp;like&nbsp;<code><strong>https:\/\/example.com<\/strong><\/code>&nbsp;for the url formatting at Single Target usages<\/li><li>For Url or IP that has been provided from a&nbsp;<code><strong>List<\/strong><\/code>,&nbsp;<strong>Don&#8217;t Use<\/strong>&nbsp;the URL Formatting like eg:<ul><li>https:\/\/target.com<\/li><li>http:\/\/hackerone.com<\/li><li>https:\/\/bugcrowd.com<\/li><\/ul><\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/HightechSec\/scarce-apache2#requirements\"><\/a><strong>Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>curl<\/li><li>bash<\/li><li>git<\/li><\/ul>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/HightechSec\/scarce-apache2\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver, ScaRCE can run too for executing Remote Command Injections at the webservers that found from the scanning method (Only if the&nbsp;MOD_CGI&nbsp;is Enabled at the targeted webserver). This tool works with the provided Single target or Mass Target from a file list. Only [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":20258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4438,4440,4439,4437],"class_list":["post-20250","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-bug-hunting","tag-cve-2021-41773","tag-pentesting-targeting","tag-scarce-apache2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting<\/title>\n<meta name=\"description\" content=\"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting\" \/>\n<meta property=\"og:description\" content=\"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-18T05:55:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-18T05:55:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting Websites That Have CVE-2021-41773 Vulnerability In Public\",\"datePublished\":\"2021-11-18T05:55:53+00:00\",\"dateModified\":\"2021-11-18T05:55:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\"},\"wordCount\":257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\",\"keywords\":[\"Bug Hunting\",\"CVE-2021-41773\",\"Pentesting Targeting\",\"Scarce-Apache2\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\",\"name\":\"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\",\"datePublished\":\"2021-11-18T05:55:53+00:00\",\"dateModified\":\"2021-11-18T05:55:57+00:00\",\"description\":\"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771\",\"width\":\"771\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting","description":"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/","og_locale":"en_US","og_type":"article","og_title":"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting","og_description":"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.","og_url":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-11-18T05:55:53+00:00","article_modified_time":"2021-11-18T05:55:57+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting Websites That Have CVE-2021-41773 Vulnerability In Public","datePublished":"2021-11-18T05:55:53+00:00","dateModified":"2021-11-18T05:55:57+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/"},"wordCount":257,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","keywords":["Bug Hunting","CVE-2021-41773","Pentesting Targeting","Scarce-Apache2"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/","url":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/","name":"Scarce-Apache2 : A Framework For Bug Hunting Or Pentesting Targeting","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","datePublished":"2021-11-18T05:55:53+00:00","dateModified":"2021-11-18T05:55:57+00:00","description":"Scarce-Apache2 tool can scan websites with CVE-2021-41773 Vulnerability that are affecting Apache2 Webserver.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/scarce-apache2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/scarce-apache2\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","width":"771","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjzdRloPfyoYc_MidcrBG-mlL_8sXhDCTQ-dLkvKXWik-hoqDu-3fvxNZNjjSPwNjCnqNhsWmmjMujuwRIToYzG5XNG_insA7n5yj9F8fQbIsvuYA8ivor8yqKElYRXzUsoivggQpC0gVpdaTD2fDSQKqcuzisgj6rCj1uVgpqJVTB_x-4j2SDO6AcA=s771","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":28004,"url":"https:\/\/kalilinuxtutorials.com\/mongoaudit\/","url_meta":{"origin":20250,"position":0},"title":"Mongoaudit &#8211; An Audit and Pentesting Tool for MongoDB Databases","author":"Febi","date":"January 17, 2023","format":false,"excerpt":"Databases typically store sensitive data or data that is important for the company. Mongoaudit helps to audit several technical aspects of running a MongoDB instance and get it properly secured. Usage and Audience Mongoaudit is commonly used for Application security or Database security.\u00a0 Target users for this tool are pentesters,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Mongoaudit","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1309,"url":"https:\/\/kalilinuxtutorials.com\/fakeimageexploiter-exploit-targets\/","url_meta":{"origin":20250,"position":1},"title":"Use a Fake image.jpg &#8216;FakeImageExploiter&#8217; to Exploit Targets","author":"R K","date":"May 18, 2018","format":false,"excerpt":"FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target (triggers agent.zip download). When the casualty runs our executable, our photo will be downloaded and opened in the default picture watcher, our malicious payload will be\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-2.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-2.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-2.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/05\/1-2.png?resize=700%2C400 2x"},"classes":[]},{"id":35578,"url":"https:\/\/kalilinuxtutorials.com\/apache-http-server-vulnerability-testing-tool\/","url_meta":{"origin":20250,"position":2},"title":"Apache HTTP Server Vulnerability Testing Tool","author":"Varshini","date":"January 2, 2025","format":false,"excerpt":"This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs. The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks. Features\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigqWvI4h-ucv7uZqUHCtsHxXR1fa6q0JqLIwI53zBCFhqWxTItL3BhGLRa-YA-_9kGSvCq9HbZHmozH_oWkgXZTlO0y94ui660oWzHYiD_JWiU49ewrUymnxAgNDExPs6yJ_ZZ7QWGt8uYzdOwYOObsUDs8sdIhh2a9kSDUrDVaFql7tttHcy8x2KdAn0j\/s1600\/Wez%27s%20Terminal-1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37187,"url":"https:\/\/kalilinuxtutorials.com\/log4jscanner\/","url_meta":{"origin":20250,"position":3},"title":"Log4jScanner : A Comprehensive Tool For Vulnerability Detection","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"Log4jScanner is a powerful tool designed to help penetration testers identify Log4j-related vulnerabilities, specifically CVE-2021-44228 and CVE-2021-45046, in web applications. It is primarily used for black box testing on given subdomains, making it an essential asset for security professionals and bug bounty hunters. Key Features Fast & MultiThreaded: Log4jScanner is\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Log4jScanner-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34435,"url":"https:\/\/kalilinuxtutorials.com\/cve-2024-38077\/","url_meta":{"origin":20250,"position":4},"title":"CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025","author":"Varshini","date":"August 14, 2024","format":false,"excerpt":"Earlier this year, we conducted an in-depth analysis of the Windows Remote Desktop Services. Multiple vulnerabilities were discovered, and all related vulnerabilities (56 cases) have been reported to Microsoft. Among them were several Preauth RCE vulnerabilities (Unauthenticated non-sandboxed 0-click RCE) in the Remote Desktop Licensing Service. These vulnerabilities can be\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2702,"url":"https:\/\/kalilinuxtutorials.com\/phishing-frenzy-phishing-framework\/","url_meta":{"origin":20250,"position":5},"title":"Phishing Frenzy &#8211; Ruby on Rails Phishing Framework","author":"R K","date":"September 19, 2018","format":false,"excerpt":"Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the project is to streamline the phishing process while still providing clients the best realistic phishing campaign possible. Also ReadCangibrina \u2013 A Fast & Powerfull Dashboard\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/Phishing-Frenzy.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20250","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=20250"}],"version-history":[{"count":8,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20250\/revisions"}],"predecessor-version":[{"id":20579,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20250\/revisions\/20579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/20258"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=20250"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=20250"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=20250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}