{"id":22723,"date":"2022-03-11T14:29:46","date_gmt":"2022-03-11T14:29:46","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=22723"},"modified":"2022-03-11T14:29:49","modified_gmt":"2022-03-11T14:29:49","slug":"vulnlab","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/vulnlab\/","title":{"rendered":"VulnLab : A Web Vulnerability Lab Project"},"content":{"rendered":"\n<p><strong>VulnLab<\/strong> is a web vulnerability lab project developed by Yavuzlar.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Vulnerabilities<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>SQL Injection<\/li><li>Cross Site Scripting (XSS)<\/li><li>Command Injection<\/li><li>Insecure Direct Object References (IDOR)<\/li><li>Cross Site Request Forgery (CSRF)<\/li><li>XML External Entity (XXE)<\/li><li>Insecure Deserialization<\/li><li>File Upload<\/li><li>File Inclusion<\/li><li>Broken Authentication<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/Yavuzlar\/VulnLab#installation\"><\/a><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/Yavuzlar\/VulnLab#install-with-dockerhub\"><\/a><strong>Install with DockerHub<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If you want to install on DockerHub, just type this command<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker run &#8211;name vulnlab -d -p 1337:80 yavuzlar\/vulnlab:latest<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Go to&nbsp;http:\/\/localhost:1337<\/li><\/ul>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/Yavuzlar\/VulnLab#manuel-installation\"><\/a><strong>Manuel Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone the repo<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/Yavuzlar\/VulnLab<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Build docker image<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker build -t yavuzlar\/vulnlab <\/strong>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/Yavuzlar\/VulnLab\">Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>VulnLab is a web vulnerability lab project developed by Yavuzlar. Vulnerabilities SQL Injection Cross Site Scripting (XSS) Command Injection Insecure Direct Object References (IDOR) Cross Site Request Forgery (CSRF) XML External Entity (XXE) Insecure Deserialization File Upload File Inclusion Broken Authentication Installation Install with DockerHub If you want to install on DockerHub, just type this [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":22735,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4833,4832,3651],"class_list":["post-22723","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-lab-project","tag-vulnlab","tag-web-vulnerability"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux<\/title>\n<meta name=\"description\" content=\"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux\" \/>\n<meta property=\"og:description\" content=\"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-11T14:29:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-11T14:29:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"VulnLab : A Web Vulnerability Lab Project\",\"datePublished\":\"2022-03-11T14:29:46+00:00\",\"dateModified\":\"2022-03-11T14:29:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\"},\"wordCount\":97,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\",\"keywords\":[\"Lab Project\",\"VulnLab\",\"Web Vulnerability\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\",\"name\":\"Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\",\"datePublished\":\"2022-03-11T14:29:46+00:00\",\"dateModified\":\"2022-03-11T14:29:49+00:00\",\"description\":\"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/vulnlab\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux","description":"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/vulnlab\/","og_locale":"en_US","og_type":"article","og_title":"Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux","og_description":"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).","og_url":"https:\/\/kalilinuxtutorials.com\/vulnlab\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-11T14:29:46+00:00","article_modified_time":"2022-03-11T14:29:49+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"VulnLab : A Web Vulnerability Lab Project","datePublished":"2022-03-11T14:29:46+00:00","dateModified":"2022-03-11T14:29:49+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/"},"wordCount":97,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","keywords":["Lab Project","VulnLab","Web Vulnerability"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/vulnlab\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/","url":"https:\/\/kalilinuxtutorials.com\/vulnlab\/","name":"Vu lnLab : A Web Vulnerability Lab Project!!! Kali Linux","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","datePublished":"2022-03-11T14:29:46+00:00","dateModified":"2022-03-11T14:29:49+00:00","description":"VulnLab is a web vulnerability lab project developed by Yavuzlar. Cross Site Scripting (XSS). Insecure Direct Object References (IDOR).","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/vulnlab\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/vulnlab\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh9ZY8Ny3qXJL8HXl8tTT3h19aSPzlW-RMl6XeA8Hyvt5voUEj97E8Hy5CdLMlqzUrwL9a4sVqYOphgvr3D2hcOMUPqDQ-M_J1DLpmIiSbLzi3QYwwVnzzL_t8FoZGQoB2QyVNzRbjfWKW9AY0KVU64TeUtkGQ8NNVeBKBVE1meNprerQRMCsMk6bwx=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":20430,"url":"https:\/\/kalilinuxtutorials.com\/tiwap\/","url_meta":{"origin":22723,"position":0},"title":"TIWAP : Totally Insecure Web Application Project","author":"R K","date":"November 24, 2021","format":false,"excerpt":"TIWAP is a web security testing lab made using Flask for budding security enthusiasts to learn about various web vulnerabilities. Inspired by DVWA, the contributors have tried their best to regenerate various web vulnerabilities The application is solely made for educational purpose and to learn web hacking in a legal\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjg4Ds20ia33rirWOiRij5gYApwyd86w96bWileQ8nTUIe4QLakArQiVLkdX43Ayk9yJDRXtbO92mjxMZxMnv9c114X7nag0XW3wJShd741seXXBrVaJOA6_yuTPiOm6RT80ZznatXKI064tS2IP2InXopF7wEBqithA8MfI0qwt-3X1ptz_JPLAKFT=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjg4Ds20ia33rirWOiRij5gYApwyd86w96bWileQ8nTUIe4QLakArQiVLkdX43Ayk9yJDRXtbO92mjxMZxMnv9c114X7nag0XW3wJShd741seXXBrVaJOA6_yuTPiOm6RT80ZznatXKI064tS2IP2InXopF7wEBqithA8MfI0qwt-3X1ptz_JPLAKFT=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjg4Ds20ia33rirWOiRij5gYApwyd86w96bWileQ8nTUIe4QLakArQiVLkdX43Ayk9yJDRXtbO92mjxMZxMnv9c114X7nag0XW3wJShd741seXXBrVaJOA6_yuTPiOm6RT80ZznatXKI064tS2IP2InXopF7wEBqithA8MfI0qwt-3X1ptz_JPLAKFT=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjg4Ds20ia33rirWOiRij5gYApwyd86w96bWileQ8nTUIe4QLakArQiVLkdX43Ayk9yJDRXtbO92mjxMZxMnv9c114X7nag0XW3wJShd741seXXBrVaJOA6_yuTPiOm6RT80ZznatXKI064tS2IP2InXopF7wEBqithA8MfI0qwt-3X1ptz_JPLAKFT=s728 2x"},"classes":[]},{"id":25515,"url":"https:\/\/kalilinuxtutorials.com\/bwasp\/","url_meta":{"origin":22723,"position":1},"title":"BWASP : BoB Web Application Security Project","author":"R K","date":"June 24, 2022","format":false,"excerpt":"BWASP is\u00a0BoB Web Application Security Project (BWASP) is an open-source, analysis tool to support for Web Vulnerability Manual Analysis hackers. The BWASP tool basically provides predicted information through vulnerability analysis without proceeding with an attack. BWASP supports performing automated analysis and manual analysis. The BWASP Project supports: Find Attack vector\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi3y16Ir4UHi_cBpSY73vcgkJYml24KPwvC4rxuCnnA2ljnZiUJxh7MDUTQCIdzkOqUQjNwIM_ZAzWh6QG4r2YlNoPo7GXkIM2zhPxJ4uCNr8Khfm19-eYYZtIi73Iy9PbMnR6i59rCdrVxmZvvsMi0E1QaLQnIam19kR0ynAUO3RsyR3j7RZykdGXl\/s728\/BWASP-BoB-Web-Application-Security-Project-1280x720%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37388,"url":"https:\/\/kalilinuxtutorials.com\/nuclei-templates-labs\/","url_meta":{"origin":22723,"position":2},"title":"Nuclei-Templates-Labs : A Hands-On Security Testing Playground","author":"Varshini","date":"April 1, 2025","format":false,"excerpt":"Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to practice vulnerability detection and exploitation in a controlled environment. Developed by ProjectDiscovery, this resource combines containerized vulnerable setups with prebuilt Nuclei templates to provide a safe and practical platform for exploring real-world vulnerabilities. Key Features\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Nuclei-Templates-Labs.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37032,"url":"https:\/\/kalilinuxtutorials.com\/webhunt\/","url_meta":{"origin":22723,"position":3},"title":"WebHunt : A Dive Into Web App Testing For Bug Bounty Hunting","author":"Varshini","date":"March 13, 2025","format":false,"excerpt":"WebHunt is an innovative project that focuses on web application testing, particularly for bug bounty hunting. It leverages powerful tools like Burp Suite to identify vulnerabilities in web applications. Here's a closer look at how WebHunt functions and the tools it utilizes. Introduction To WebHunt WebHunt is not to be\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/webHunt.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":305,"url":"https:\/\/kalilinuxtutorials.com\/thc-ssl-dos\/","url_meta":{"origin":22723,"position":4},"title":"THC-SSL-DOS &#8211; DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation","author":"Ravi Sankar","date":"June 7, 2018","format":false,"excerpt":"THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a website or server is enabled with SSL-renegotiation, thereby checking for renegotiation vulnerability (CVE-2009-3555). SSL renegotiation is the process of renegotiating a client at the time of authentication. This tools sends\u2026","rel":"","context":"In &quot;Stress Testing&quot;","block_context":{"text":"Stress Testing","link":"https:\/\/kalilinuxtutorials.com\/category\/st\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7707,"url":"https:\/\/kalilinuxtutorials.com\/cyberrange-open-source-aws\/","url_meta":{"origin":22723,"position":5},"title":"CyberRange : The Open-Source AWS Cyber Range","author":"R K","date":"December 16, 2019","format":false,"excerpt":"This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering & security intelligence tooling in a private research lab using the AWS Cloud. This project contains vulnerable systems and a toolkit of the most\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22723","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=22723"}],"version-history":[{"count":12,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22723\/revisions"}],"predecessor-version":[{"id":22828,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22723\/revisions\/22828"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/22735"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=22723"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=22723"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=22723"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}