{"id":22406,"date":"2022-03-04T12:53:01","date_gmt":"2022-03-04T12:53:01","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=22406"},"modified":"2022-03-04T12:53:04","modified_gmt":"2022-03-04T12:53:04","slug":"raven","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/raven\/","title":{"rendered":"Raven : Advanced Cyber Threat Map (Simplified, Customizable, Responsive)"},"content":{"rendered":"\n<p><strong>Raven <\/strong>&#8211; Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries, ~100,000 cities, and can be used in an isolated environment&nbsp;<strong>without external lookups!<\/strong>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Uses D3.js (Not Anime.js)<\/li><li>Active threat map (Live and replay)<\/li><li>IP, country, city, and port info for each attack<\/li><li>Attacks stats for countries (Only known attacks)<\/li><li>Responsive interface (Move, drag, zoom in and out)<\/li><li>Customize options for countries and cites<\/li><li>247 countries are listed on the interface (Not 174)<\/li><li>Optimized worldmap for faster rendering<\/li><li>Includes IP lookup, port information<\/li><li>Random simulation (IP, country, city)<\/li><li>Can be used online or offline (Static)<\/li><li>Theme picker module<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/qeeqbox\/raven#data\"><\/a><strong>Data<\/strong><\/p>\n\n\n\n<p>You have different options&nbsp;<strong><code>ip<\/code>,&nbsp;<code>name<\/code><\/strong>, and&nbsp;<code><strong>coordinates<\/strong><\/code><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><code><strong>ip<\/strong><\/code>&nbsp;private or public ip -&gt; any of these IPs -&gt;&nbsp;<code><strong>0.0.0.0<\/strong><\/code>&nbsp;or&nbsp;<code><strong>8.8.8.8<\/strong><\/code>&nbsp;as&nbsp;<code><strong>{'from':'0.0.0.0','to':'8.8.8.8'}<\/strong><\/code><\/li><li><code><strong>name<\/strong><\/code>&nbsp;city,state,country -&gt; any of these formats work -&gt;&nbsp;<code><strong>seattle,wa,us<\/strong><\/code>&nbsp;or&nbsp;<code><strong>0,us<\/strong><\/code>&nbsp;as&nbsp;<code><strong>{'from':'seattle,wa,us','to':'0,in'}<\/strong><\/code><\/li><li><code><strong>coordinates<\/strong><\/code>&nbsp;Latitude and Longitude as&nbsp;<code><strong>{'from':['-11.074920','-51.648929'],'to':['51.464957','-107.583864']}<\/strong><\/code><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-left has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/qeeqbox\/raven#method-1---embed-it-and-interact-with-it\"><\/a><strong>Method 1 &#8211; Embed it and interact with it<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">\/\/<strong>You only need to embed this iframe in your project.<br>&lt;iframe id=&#8221;raven-iframe&#8221; src=&#8221;src\/raven.html&#8221; frameborder=&#8221;0&#8243; width=&#8221;100%&#8221; height=&#8221;100%&#8221; scrolling=&#8221;auto&#8221;&gt;<br>\/\/Then, run the initialization script with your custom settings &#8211; That&#8217;s all!<br>script type=&#8221;text\/javascript&#8221;&gt;<br>document.getElementById(&#8216;raven-iframe&#8217;).addEventListener(&#8220;load&#8221;, function() {<br>var raven_options = {<br>&#8216;world_type&#8217;: null,<br>&#8216;selected_countries&#8217;: [],<br>&#8216;remove_countries&#8217;: [&#8216;aq&#8217;],<br>&#8216;height&#8217;: window.innerHeight,<br>&#8216;width&#8217;: window.innerWidth,<br>&#8216;backup_background_color&#8217;: &#8216;#212222&#8217;,<br>&#8216;orginal_country_color&#8217;: &#8216;#737373&#8217;,<br>&#8216;clicked_country_color&#8217;: &#8216;#6c4242&#8217;,<br>&#8216;selected_country_color&#8217;: &#8216;#ff726f&#8217;,<br>&#8216;attack_output&#8217;: true,<br>&#8216;global_timeout&#8217;: 2000,<br>&#8216;global_stats_limit&#8217;: 10,<br>&#8216;db_length&#8217;: 1000,<br>&#8216;location&#8217;: &#8216;scripts&#8217;,<br>&#8216;panels&#8217;: [&#8216;multi-output&#8217;, &#8216;single-output&#8217;,&#8217;tooltip&#8217;, &#8216;random&#8217;, &#8216;insert&#8217;,&#8217;taskbar&#8217;],<br>&#8216;disable&#8217;: [],<br>&#8216;verbose&#8217;: true<br>}<br>window[&#8216;raven&#8217;] = document.getElementById(&#8216;raven-iframe&#8217;).contentWindow.raven<br>window[&#8216;raven&#8217;].init_all(raven_options)<br>window[&#8216;raven&#8217;].init_world()<br>});<br>\/\/After that, you can plot any data you want<br>raven.add_to_data_to_table(&#8216;name&#8217;,{&#8216;from&#8217;:&#8217;seattle,wa,us&#8217;,&#8217;to&#8217;:&#8217;delhi,in&#8217;},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:null}},2000,[&#8216;line&#8217;,&#8217;multi-output&#8217;,&#8217;single-output&#8217;])<br><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data (functions)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>raven.add_marker_by_name() \/\/Plot info by country or city name<br>raven.add_marker_by_ip() \/\/Plot data by IP address<br>raven.add_marker_by_coordinates() \/\/Plot data by coordinates<br>marker_object \/\/An object {&#8216;from&#8217;:&#8221;,&#8217;to&#8217;:&#8221;&#8221;} see examples<br>colors_object \/\/An object {&#8216;line: {&#8216;from&#8217;: &#8221;#FF0000&#8242;,&#8217;to&#8217;: &#8216;FF0000&#8217;}} this the color of the line between 2 points &#8211; (if null, then a random color will be picked)<br>timeout \/\/Animation time out<br>options = [] \/\/A list of options such as animation marker<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data (As line, from -&gt; to)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>raven.add_marker_by_name({&#8216;from&#8217;:&#8217;seattle,wa,us&#8217;,&#8217;to&#8217;:&#8217;delhi,in&#8217;},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:null}},2000,[&#8216;line&#8217;])<br>raven.add_marker_by_ip({&#8216;from&#8217;:&#8217;0.0.0.0&#8242;,&#8217;to&#8217;:&#8217;0.0.0.0:53&#8242;},{&#8216;line&#8217;:{&#8216;from&#8217;:&#8217;#FF0000&#8242;,&#8217;to&#8217;:&#8217;#FF0000&#8242;}},1000,[&#8216;line&#8217;])<br>raven.add_marker_by_coordinates({&#8216;from&#8217;:[&#8216;-11.074920&#8242;,&#8217;-51.648929&#8242;],&#8217;to&#8217;:[&#8216;51.464957&#8242;,&#8217;-107.583864&#8242;]},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:&#8217;#FFFF00&#8242;}},1000,[&#8216;line&#8217;])<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data (As point)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\">raven.add_marker_by_name({&#8216;from&#8217;:&#8217;portland,or,us&#8217;,&#8217;to&#8217;:null},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:null}},2000,[&#8216;point&#8217;])<br>raven.add_marker_by_ip({&#8216;from&#8217;:&#8217;8.8.8.8&#8242;,&#8217;to&#8217;:null},{&#8216;line&#8217;:{&#8216;from&#8217;:&#8217;#FF0000&#8242;,&#8217;to&#8217;:&#8217;#FF0000&#8242;}},1000,[&#8216;point&#8217;])<br><strong>raven.add_marker_by_coordinates({&#8216;from&#8217;:[&#8216;-11.074920&#8242;,&#8217;-51.648929&#8242;],&#8217;to&#8217;:null},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:&#8217;#FFFF00&#8242;}},1000,[&#8216;point&#8217;])<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data + adding it to the output table (function)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>raven.add_to_data_to_table() \/\/Plot info and add them to the output table<br>method \/\/Name, IP or coordinates<br>marker_object \/\/An object {&#8216;from&#8217;:&#8221;,&#8217;to&#8217;:&#8221;&#8221;} see examples<br>colors_object \/\/An object {&#8216;line: {&#8216;from&#8217;: &#8221;#FF0000&#8242;,&#8217;to&#8217;: &#8216;FF0000&#8217;}} this the color of the line between 2 points &#8211; (if null, then a random color will be picked)<br>timeout \/\/Animation time out<br>options = [] \/\/A list of options such as animation marker &#8216;line&#8217;, and plot place &#8216;multi-output&#8217; or &#8216;single-out&#8217; table or both<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data +<\/strong> <strong>adding it to the output table (As line, from -&gt; to)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>raven.add_to_data_to_table(&#8216;name&#8217;,{&#8216;from&#8217;:&#8217;seattle,wa,us&#8217;,&#8217;to&#8217;:&#8217;delhi,in&#8217;},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:null}},2000,[&#8216;line&#8217;,&#8217;multi-output&#8217;,&#8217;single-output&#8217;])<br>raven.add_to_data_to_table(&#8216;ip&#8217;,{&#8216;from&#8217;:&#8217;0.0.0.0&#8242;,&#8217;to&#8217;:&#8217;0.0.0.0:3389&#8242;},{&#8216;line&#8217;:{&#8216;from&#8217;:&#8217;#FF0000&#8242;,&#8217;to&#8217;:&#8217;#FF0000&#8242;}},1000,[&#8216;line&#8217;,&#8217;multi-output&#8217;])<br>raven.add_to_data_to_table(&#8216;coordinates&#8217;,{&#8216;from&#8217;:[&#8216;-11.074920&#8242;,&#8217;-51.648929&#8242;],&#8217;to&#8217;:[&#8216;51.464957&#8242;,&#8217;-107.583864&#8242;]},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:&#8217;#FFFF00&#8242;}},1000,[&#8216;line&#8217;,&#8217;single-output&#8217;])<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data + adding it to the output table (As point)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>raven.add_to_data_to_table(&#8216;name&#8217;,{&#8216;from&#8217;:&#8217;seattle,wa,us&#8217;,&#8217;to&#8217;:&#8217;delhi,in&#8217;},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:null}},2000,[&#8216;line&#8217;,&#8217;multi-output&#8217;,&#8217;single-output&#8217;])<br>raven.add_to_data_to_table(&#8216;ip&#8217;,{&#8216;from&#8217;:&#8217;0.0.0.0&#8242;,&#8217;to&#8217;:&#8217;0.0.0.0:3389&#8242;},{&#8216;line&#8217;:{&#8216;from&#8217;:&#8217;#FF0000&#8242;,&#8217;to&#8217;:&#8217;#FF0000&#8242;}},1000,[&#8216;line&#8217;,&#8217;multi-output&#8217;])<br>raven.add_to_data_to_table(&#8216;coordinates&#8217;,{&#8216;from&#8217;:[&#8216;-11.074920&#8242;,&#8217;-51.648929&#8242;],&#8217;to&#8217;:[&#8216;51.464957&#8242;,&#8217;-107.583864&#8242;]},{&#8216;line&#8217;:{&#8216;from&#8217;:null,&#8217;to&#8217;:&#8217;#FFFF00&#8242;}},1000,[&#8216;line&#8217;,&#8217;single-output&#8217;])<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Method 2 &#8211; Embed it, and use websocket for plotting<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Raven Map<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>You only need to embed this iframe in your project.<br>iframe id=&#8221;raven-iframe&#8221; src=&#8221;src\/raven.html&#8221; frameborder=&#8221;0&#8243; width=&#8221;100%&#8221; height=&#8221;100%&#8221; scrolling=&#8221;auto&#8221;&gt;<br>script type=&#8221;text\/javascript&#8221;&gt;<br>document.getElementById(&#8216;raven-iframe&#8217;).addEventListener(&#8220;load&#8221;, function() {<br>var raven_options = {<br>&#8216;world_type&#8217;: null,<br>&#8216;selected_countries&#8217;: [],<br>&#8216;remove_countries&#8217;: [&#8216;aq&#8217;],<br>&#8216;height&#8217;: window.innerHeight,<br>&#8216;width&#8217;: window.innerWidth,<br>&#8216;backup_background_color&#8217;: &#8216;#212222&#8217;,<br>&#8216;orginal_country_color&#8217;: &#8216;#737373&#8217;,<br>&#8216;clicked_country_color&#8217;: &#8216;#6c4242&#8217;,<br>&#8216;selected_country_color&#8217;: &#8216;#ff726f&#8217;,<br>&#8216;attack_output&#8217;: true,<br>&#8216;global_timeout&#8217;: 2000,<br>&#8216;global_stats_limit&#8217;: 10,<br>&#8216;db_length&#8217;: 1000,<br>&#8216;location&#8217;: &#8216;scripts&#8217;,<br>&#8216;panels&#8217;: [&#8216;single-output&#8217;],<br>&#8216;disable&#8217;: [&#8216;multi-output&#8217;,&#8217;tooltip&#8217;, &#8216;random&#8217;, &#8216;insert&#8217;,&#8217;taskbar&#8217;,&#8217;move_to_country&#8217;],<br>&#8216;websocket&#8217;:{&#8216;server&#8217;:&#8217;ws:\/\/localhost:5678&#8242;,<br>&#8216;request_timeout&#8217;:3000},<br>&#8216;verbose&#8217;: false<br>}<br>window[&#8216;raven&#8217;] = document.getElementById(&#8216;raven-iframe&#8217;).contentWindow.raven<br>window[&#8216;raven&#8217;].init_all(raven_options)<br>window[&#8216;raven&#8217;].init_world()<br>window[&#8216;raven&#8217;].fetch_data_from_server()<br>});<br><\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data &#8211; Send the json object using Websocket ws:\/\/localhost:5678<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>{<br>&#8220;function&#8221;:&#8221;marker&#8221;,<br>&#8220;method&#8221;: &#8220;ip&#8221;,<br>&#8220;object&#8221;: {<br>&#8220;from&#8221;: &#8220;0.0.0.0&#8221;,<br>&#8220;to&#8221;: &#8220;0.0.0.0&#8221;<br>},<br>&#8220;color&#8221;: {<br>&#8220;line&#8221;: {<br>&#8220;from&#8221;: &#8220;#977777&#8221;,<br>&#8220;to&#8221;: &#8220;#17777&#8221;,<br>}<br>},<br>&#8220;timeout&#8221;: 1000,<br>&#8220;options&#8221;: [<br>&#8220;line&#8221;,<br>&#8220;single-output&#8221;,<br>&#8220;multi-output&#8221;<br>]<br>}<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Plotting data and add to table &#8211; Send the json object using Websocket ws:\/\/localhost:5678<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>{<\/strong><br>&#8220;<strong>function&#8221;:&#8221;table&#8221;,<br>&#8220;method&#8221;: &#8220;name&#8221;,<br>&#8220;object&#8221;: {<br>&#8220;from&#8221;: &#8220;0,us&#8221;,<br>&#8220;to&#8221;: &#8220;0,br&#8221;<br>},<br>&#8220;color&#8221;: {<br>&#8220;line&#8221;: {<br>&#8220;from&#8221;: &#8220;#977777&#8221;,<br>&#8220;to&#8221;: &#8220;#17777&#8221;,<br>}<br>},<br>&#8220;timeout&#8221;: 1000,<br>&#8220;options&#8221;: [<br>&#8220;line&#8221;,<br>&#8220;single-output&#8221;,<br>&#8220;multi-output&#8221;<br>]<br>}<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Run simulation (Isolated)<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo d<\/strong>ocker build -t simulation . &amp;&amp; sudo docker run -p 5678:5678 -p 8080:8080 -it simulation<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/qeeqbox\/raven\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Raven &#8211; Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries, ~100,000 cities, and can be used in an isolated environment&nbsp;without external lookups!. Features Uses D3.js (Not Anime.js) Active threat map (Live and replay) IP, country, city, and port info for each attack Attacks stats for countries [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22423,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4785,4784],"class_list":["post-22406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-advanced-cyber-threat-map","tag-raven"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Raven : Advanced Cyber Threat Map (Simplified, Customizable).<\/title>\n<meta name=\"description\" content=\"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/raven\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Raven : Advanced Cyber Threat Map (Simplified, Customizable).\" \/>\n<meta property=\"og:description\" content=\"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/raven\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-04T12:53:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-04T12:53:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Raven : Advanced Cyber Threat Map (Simplified, Customizable, Responsive)\",\"datePublished\":\"2022-03-04T12:53:01+00:00\",\"dateModified\":\"2022-03-04T12:53:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/\"},\"wordCount\":938,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\",\"keywords\":[\"Advanced Cyber Threat Map\",\"Raven\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/raven\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/raven\/\",\"name\":\"Raven : Advanced Cyber Threat Map (Simplified, Customizable).\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\",\"datePublished\":\"2022-03-04T12:53:01+00:00\",\"dateModified\":\"2022-03-04T12:53:04+00:00\",\"description\":\"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/raven\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Raven : Advanced Cyber Threat Map (Simplified, Customizable).","description":"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/raven\/","og_locale":"en_US","og_type":"article","og_title":"Raven : Advanced Cyber Threat Map (Simplified, Customizable).","og_description":"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.","og_url":"https:\/\/kalilinuxtutorials.com\/raven\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-04T12:53:01+00:00","article_modified_time":"2022-03-04T12:53:04+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/raven\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/raven\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Raven : Advanced Cyber Threat Map (Simplified, Customizable, Responsive)","datePublished":"2022-03-04T12:53:01+00:00","dateModified":"2022-03-04T12:53:04+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/raven\/"},"wordCount":938,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","keywords":["Advanced Cyber Threat Map","Raven"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/raven\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/raven\/","url":"https:\/\/kalilinuxtutorials.com\/raven\/","name":"Raven : Advanced Cyber Threat Map (Simplified, Customizable).","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","datePublished":"2022-03-04T12:53:01+00:00","dateModified":"2022-03-04T12:53:04+00:00","description":"Raven - Advanced Cyber Threat Map (Simplified, customizable and responsive. It uses D3.js with TOPO JSON, has 247 countries.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/raven\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/raven\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgUjcxjjlYueulnY6wu2Y0eIK_rubKX4Gn6i2bZhlY7CXSawJf96em9wFWDFvw0sJEmZo7LuKYrrgqyZmRta-qGGU2B7oYjI2Pd-YcANEmLGEv8WnfIYiPo2XjVO45JYQyBUWQKZa5OwWXWfGVzYkIlqg4OurJCWJFli_-547NIwY2LQbUb4s9W9YgR=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":38490,"url":"https:\/\/kalilinuxtutorials.com\/best-9-incident-response-automation-tools\/","url_meta":{"origin":22406,"position":0},"title":"Best 9 Incident Response Automation Tools","author":"0xSnow","date":"February 21, 2026","format":false,"excerpt":"Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks. Manual response methods are often too slow, making automation a must. The right incident response automation tools can help organizations rapidly detect, respond to, and recover from security incidents. In this blog, we will explore\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Top 10 Incident Response Automation Tools for Cybersecurity","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh29RGJ7eSgDHS0sXRPxg5q37e4_1KEHPCZYrJndDWhwE9mp9nv5JTsd6ctFGnwRdXbYe_kvcby9gVnM_saPC6hLjugE32NslHPWnIpfHdd6qp3cmzFl3b3J6eewip85LWo_hyphenhyphenFWf4G4H9_oxGPrXqluTJMnN4OjrI9QiWRVKBJtt3DaYnnnrFWZWk07f4\/s1280\/Top%2010%20Incident%20Response%20Automation%20Tools%20for%20Cybersecurity.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh29RGJ7eSgDHS0sXRPxg5q37e4_1KEHPCZYrJndDWhwE9mp9nv5JTsd6ctFGnwRdXbYe_kvcby9gVnM_saPC6hLjugE32NslHPWnIpfHdd6qp3cmzFl3b3J6eewip85LWo_hyphenhyphenFWf4G4H9_oxGPrXqluTJMnN4OjrI9QiWRVKBJtt3DaYnnnrFWZWk07f4\/s1280\/Top%2010%20Incident%20Response%20Automation%20Tools%20for%20Cybersecurity.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh29RGJ7eSgDHS0sXRPxg5q37e4_1KEHPCZYrJndDWhwE9mp9nv5JTsd6ctFGnwRdXbYe_kvcby9gVnM_saPC6hLjugE32NslHPWnIpfHdd6qp3cmzFl3b3J6eewip85LWo_hyphenhyphenFWf4G4H9_oxGPrXqluTJMnN4OjrI9QiWRVKBJtt3DaYnnnrFWZWk07f4\/s1280\/Top%2010%20Incident%20Response%20Automation%20Tools%20for%20Cybersecurity.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh29RGJ7eSgDHS0sXRPxg5q37e4_1KEHPCZYrJndDWhwE9mp9nv5JTsd6ctFGnwRdXbYe_kvcby9gVnM_saPC6hLjugE32NslHPWnIpfHdd6qp3cmzFl3b3J6eewip85LWo_hyphenhyphenFWf4G4H9_oxGPrXqluTJMnN4OjrI9QiWRVKBJtt3DaYnnnrFWZWk07f4\/s1280\/Top%2010%20Incident%20Response%20Automation%20Tools%20for%20Cybersecurity.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh29RGJ7eSgDHS0sXRPxg5q37e4_1KEHPCZYrJndDWhwE9mp9nv5JTsd6ctFGnwRdXbYe_kvcby9gVnM_saPC6hLjugE32NslHPWnIpfHdd6qp3cmzFl3b3J6eewip85LWo_hyphenhyphenFWf4G4H9_oxGPrXqluTJMnN4OjrI9QiWRVKBJtt3DaYnnnrFWZWk07f4\/s1280\/Top%2010%20Incident%20Response%20Automation%20Tools%20for%20Cybersecurity.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":36547,"url":"https:\/\/kalilinuxtutorials.com\/byob\/","url_meta":{"origin":22406,"position":1},"title":"BYOB : Exploring The Educational And Ethical Dimensions Of Building Your Own Botnet","author":"Varshini","date":"February 19, 2025","format":false,"excerpt":"BYOB (Build Your Own Botnet) is an open-source post-exploitation framework designed primarily for educational and research purposes. It enables students, researchers, and developers to explore cybersecurity concepts by providing a customizable platform for creating and managing post-exploitation tools. However, its potential misuse highlights the importance of ethical use and security\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BYOB-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":683,"url":"https:\/\/kalilinuxtutorials.com\/world-wide-live-attack-map-analytics\/","url_meta":{"origin":22406,"position":2},"title":"World Wide Live Attack Map &#038; Analytics","author":"Ravi Sankar","date":"September 29, 2015","format":false,"excerpt":"Ever wanted to see live DOS attacks across the globe? There is a website from a security firm that shows live attacks from all over the globe including the protocol information, IP addresses and country. All this information is put together in a wonderful hacker-like map. Live attacks & traffic\u2026","rel":"","context":"In &quot;Blog&quot;","block_context":{"text":"Blog","link":"https:\/\/kalilinuxtutorials.com\/category\/blog\/"},"img":{"alt_text":"attack","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/live-attack-map-1024x544.gif?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/live-attack-map-1024x544.gif?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/live-attack-map-1024x544.gif?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/live-attack-map-1024x544.gif?resize=700%2C400 2x"},"classes":[]},{"id":35748,"url":"https:\/\/kalilinuxtutorials.com\/invoke-atomicassessment\/","url_meta":{"origin":22406,"position":3},"title":"Invoke-AtomicAssessment : Unleashing The Power Of Adversary Emulation For Enhanced Cybersecurity","author":"Varshini","date":"January 24, 2025","format":false,"excerpt":"Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team. This tool automates the execution of these techniques and logs the results in the ATTiRe format, which can then be visualized on the VECTR platform. The tool offers various threat actor profiles, enabling simulations of\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Invoke-AtomicAssessment.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10962,"url":"https:\/\/kalilinuxtutorials.com\/cyber-crime\/","url_meta":{"origin":22406,"position":4},"title":"Why is Cyber Crime Starts Growing? Detailed Report","author":"Balaji N","date":"July 15, 2020","format":false,"excerpt":"In the era of modern technologies when almost all the data about us is available online, the level of cyber crime is constantly growing. Nowadays, we can clearly see the steady stream of technological advancements that impede cybersecurity. Using special tools a criminals can steal secret information from IT systems\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38498,"url":"https:\/\/kalilinuxtutorials.com\/top-10-endpoint-malware-protection-tools\/","url_meta":{"origin":22406,"position":5},"title":"Best Endpoint Monitoring Tools for 2026","author":"0xSnow","date":"February 21, 2026","format":false,"excerpt":"Introduction In today\u2019s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from malware is crucial for any organization. Malware attacks are becoming increasingly sophisticated, making it necessary for businesses to adopt robust endpoint malware protection solutions. These tools can prevent, detect, and mitigate malware infections across all\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Top 10 Endpoint Malware Protection Tools for 2026","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjz5YXG1SaZhbbzJ1QJfS753dg3BGCUAEZAq7XBat4AVuziPxwbYKioZODKvUoayILHItcxfpWPWpreDndgkUQSpAMg0ElaUp60aUnM9FGvgUoNlzZf7F7poQrrA5Li50R2tH0nTD38WmCWVtL5vqq8W_AeRFITdR87eS5fQsro-SWdAq_rIcq7JFjsZtA\/s1280\/Top%2010%20Endpoint%20Malware%20Protection%20Tools%20for%202026.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjz5YXG1SaZhbbzJ1QJfS753dg3BGCUAEZAq7XBat4AVuziPxwbYKioZODKvUoayILHItcxfpWPWpreDndgkUQSpAMg0ElaUp60aUnM9FGvgUoNlzZf7F7poQrrA5Li50R2tH0nTD38WmCWVtL5vqq8W_AeRFITdR87eS5fQsro-SWdAq_rIcq7JFjsZtA\/s1280\/Top%2010%20Endpoint%20Malware%20Protection%20Tools%20for%202026.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjz5YXG1SaZhbbzJ1QJfS753dg3BGCUAEZAq7XBat4AVuziPxwbYKioZODKvUoayILHItcxfpWPWpreDndgkUQSpAMg0ElaUp60aUnM9FGvgUoNlzZf7F7poQrrA5Li50R2tH0nTD38WmCWVtL5vqq8W_AeRFITdR87eS5fQsro-SWdAq_rIcq7JFjsZtA\/s1280\/Top%2010%20Endpoint%20Malware%20Protection%20Tools%20for%202026.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjz5YXG1SaZhbbzJ1QJfS753dg3BGCUAEZAq7XBat4AVuziPxwbYKioZODKvUoayILHItcxfpWPWpreDndgkUQSpAMg0ElaUp60aUnM9FGvgUoNlzZf7F7poQrrA5Li50R2tH0nTD38WmCWVtL5vqq8W_AeRFITdR87eS5fQsro-SWdAq_rIcq7JFjsZtA\/s1280\/Top%2010%20Endpoint%20Malware%20Protection%20Tools%20for%202026.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjz5YXG1SaZhbbzJ1QJfS753dg3BGCUAEZAq7XBat4AVuziPxwbYKioZODKvUoayILHItcxfpWPWpreDndgkUQSpAMg0ElaUp60aUnM9FGvgUoNlzZf7F7poQrrA5Li50R2tH0nTD38WmCWVtL5vqq8W_AeRFITdR87eS5fQsro-SWdAq_rIcq7JFjsZtA\/s1280\/Top%2010%20Endpoint%20Malware%20Protection%20Tools%20for%202026.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=22406"}],"version-history":[{"count":17,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22406\/revisions"}],"predecessor-version":[{"id":22451,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22406\/revisions\/22451"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/22423"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=22406"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=22406"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=22406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}