{"id":25061,"date":"2022-06-09T12:25:08","date_gmt":"2022-06-09T12:25:08","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=25061"},"modified":"2022-06-09T12:25:11","modified_gmt":"2022-06-09T12:25:11","slug":"sub3suite","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/sub3suite\/","title":{"rendered":"Sub3Suite : A Free, Open Source, Cross Platform Intelligence Gathering Tool"},"content":{"rendered":"\n<p><strong>Sub3 Suite<\/strong> is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering &amp; Attack Surface Mapping. Supports both manual and automated analysis on variety of target types with many available features &amp; tools.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Launching<\/h2>\n\n\n\n<p>Download Sub3 Suite for your required platform (Windows or Linux) from&nbsp;releases.<\/p>\n\n\n\n<p><strong>on Windows<\/strong><\/p>\n\n\n\n<p>After download: Extract the zip file to location of your choice. To run just open the&nbsp;<code>s<strong>ub3suite.exe<\/strong><\/code>&nbsp;application and done!<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><em><strong>NOTE:<\/strong><\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Install the MSVC-redistributable package&nbsp;<code><strong>sub3suite\/vcredist_x64.exe<\/strong><\/code>&nbsp;or&nbsp;<code><strong>sub3suite\/vcredist_x86.exe<\/strong><\/code>&nbsp;if the program fails to run on first try.<\/li><li>Install the OpenSSL libraries using OpenSSL package&nbsp;<code><strong>sub3suite\/Win32 OpenSSL v1.1.1n Light.msi<\/strong><\/code>&nbsp;or&nbsp;<code><strong>sub3suite\/Win64 OpenSSL v1.1.1n<\/strong> <strong>Light.msi<\/strong><\/code>&nbsp;in your system incase of SSL errors when using sub3suite.<\/li><\/ul>\n\n\n\n<p><strong>on Linux<\/strong><\/p>\n\n\n\n<p>After download: Extract archive with command&nbsp;<code><strong>tar -xvf sub3suite-&lt;version&gt;-linux.tar.gz<\/strong><\/code>, then&nbsp;<code><strong>cd sub3suite<\/strong><\/code>&nbsp;and run sub3suite<strong>&nbsp;<code>.\/sub3suite<\/code><\/strong>.<\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/3nock\/s3s_doc\/blob\/main\/md\/index.md#startup-wizard\"><\/a>Startup wizard<\/h2>\n\n\n\n<p>When Sub3 Suite launches, the startup wizard is displayed. This lets you choose what s3s project to open.<\/p>\n\n\n\n<h3 class=\"has-text-align-center wp-block-heading\"><a href=\"https:\/\/github.com\/3nock\/s3s_doc\/blob\/main\/md\/index.md#selecting-a-project\"><\/a>Selecting a project<\/h3>\n\n\n\n<p>You can choose from the following options to create or open a project:<\/p>\n\n\n\n<p><code><strong>Temporary project<\/strong><\/code>&nbsp;&#8211; This option is useful for quick tasks where your work doesn&#8217;t need to be saved. All data is held in memory, and is lost when s3s exits.<\/p>\n\n\n\n<p><code><strong>New project on disk<\/strong><\/code>&nbsp;&#8211; This creates a new project that will store its data in a s3s project file. This file will hold all of the data and configuration for the project. You can also specify a name for the project.<\/p>\n\n\n\n<p><code><strong>Open existing project<\/strong><\/code>&nbsp;&#8211; This reopens an existing project from a Sub3 project file. A list of recently opened projects is shown for quick selection.<\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><em><strong>Note:<\/strong><\/em><\/p>\n\n\n\n<p><em>You can rename a project later via project config.<\/em><\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/3nock\/s3s_doc\/blob\/main\/md\/index.md#tools-suite\"><\/a>Tools Suite<\/h2>\n\n\n\n<p>Use the links below for further help on Sub3 Suite Engines:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>OSINT&nbsp;Engine.<\/li><li>RAW&nbsp;Engine.<\/li><li>BRUTE&nbsp;Engine.<\/li><li>ACTIVE&nbsp;Engine.<\/li><li>DNS&nbsp;Engine.<\/li><li>SSL&nbsp;Engine.<\/li><li>URL&nbsp;Engine.<\/li><\/ol>\n\n\n\n<p>Use the links below for further help on Sub3 Suite Enumerators:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>IP&nbsp;Enumerator.<\/li><li>ASN&nbsp;Enumerator.<\/li><li>CIDR&nbsp;Enumerator.<\/li><li>NS&nbsp;Enumerator.<\/li><li>MX&nbsp;Enumerator.<\/li><li>SSL&nbsp;Enumerator.<\/li><li>EMAIL&nbsp;Enumerator.<\/li><\/ol>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Installation &amp; Usage<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Download from&nbsp;releases.<\/li><li>Unzip.<\/li><li>Run.<\/li><\/ul>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>NOTE on windows:<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Install the MSVC-redistributable package&nbsp;<code><strong>sub3suite\/vcredist_x64.exe<\/strong><\/code>&nbsp;or&nbsp;<code><strong>sub3suite\/vcredist_x86.exe<\/strong><\/code>&nbsp;if the program fails to run on first try.<\/li><li>Install the OpenSSL libraries using OpenSSL package&nbsp;<code><strong>sub3suite\/Win32 OpenSSL v1.1.1n Light.msi<\/strong><\/code>&nbsp;or&nbsp;<code><strong>sub3suite\/Win64 OpenSSL v1.1.1n Light.msi<\/strong><\/code>&nbsp;in your system incase of SSL errors when using sub3suite.<\/li><\/ol>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>NOTE on Linux:<\/strong><\/p>\n\n\n\n<p><strong>After download:<\/strong>&nbsp;Extract archive with command&nbsp;<code><strong>tar -xvf sub3suite-&lt;version&gt;-linux.tar.gz<\/strong><\/code>, then&nbsp;<code><strong>cd sub3suite<\/strong><\/code>&nbsp;and run sub3suite&nbsp;<code>.<strong>\/sub3suite<\/strong><\/code>.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/3nock\/sub3suite\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering &amp; Attack Surface Mapping. Supports both manual and automated analysis on variety of target types with many available features &amp; tools.&nbsp; Launching Download Sub3 Suite for your required platform (Windows or Linux) from&nbsp;releases. on Windows After download: Extract the zip file [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":25068,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4570,5251,5250],"class_list":["post-25061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-cross-platform-2","tag-intelligence-gathering-tool","tag-sub3suite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool<\/title>\n<meta name=\"description\" content=\"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering &amp; Attack Surface Mapping.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool\" \/>\n<meta property=\"og:description\" content=\"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering &amp; Attack Surface Mapping.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-09T12:25:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-09T12:25:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Sub3Suite : A Free, Open Source, Cross Platform Intelligence Gathering Tool\",\"datePublished\":\"2022-06-09T12:25:08+00:00\",\"dateModified\":\"2022-06-09T12:25:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\",\"keywords\":[\"Cross Platform\",\"Intelligence Gathering Tool\",\"Sub3Suite\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\",\"name\":\"Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\",\"datePublished\":\"2022-06-09T12:25:08+00:00\",\"dateModified\":\"2022-06-09T12:25:11+00:00\",\"description\":\"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/sub3suite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool","description":"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/sub3suite\/","og_locale":"en_US","og_type":"article","og_title":"Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool","og_description":"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping.","og_url":"https:\/\/kalilinuxtutorials.com\/sub3suite\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-06-09T12:25:08+00:00","article_modified_time":"2022-06-09T12:25:11+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Sub3Suite : A Free, Open Source, Cross Platform Intelligence Gathering Tool","datePublished":"2022-06-09T12:25:08+00:00","dateModified":"2022-06-09T12:25:11+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","keywords":["Cross Platform","Intelligence Gathering Tool","Sub3Suite"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/sub3suite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/","url":"https:\/\/kalilinuxtutorials.com\/sub3suite\/","name":"Sub3Suite : A Open Source, Cross Platform Intelligence Gathering Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","datePublished":"2022-06-09T12:25:08+00:00","dateModified":"2022-06-09T12:25:11+00:00","description":"Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/sub3suite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/sub3suite\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiV3YoND2eHCnFCuUIMj8qVY8_PixDW0-Bn4ffdJuU0TD2JOa9aDGO-WztozOPtFl5XJ4mwlJToiiRCB1AEdh75f8YeqgOpl1MQHptbAnrESB0QEAdcm-vCA8xje4dfCqYypoA6OPNwVpv8OD6X0Z1NQEGXTx_MnvEyrzPERBAyVI9zmIPpVJmqRY3Y\/s728\/sub3suite%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32346,"url":"https:\/\/kalilinuxtutorials.com\/awesome-incident-response\/","url_meta":{"origin":25061,"position":0},"title":"Awesome Incident Response &#8211; Essential Tools And Resources","author":"Varshini","date":"March 18, 2024","format":false,"excerpt":"Digital Forensics and Incident Response (DFIR) teams are groups of people in an organization responsible for managing the response to a security incident, including gathering evidence of the incident, remediating its effects, and implementing controls to prevent the incident from recurring in the future. Contents Adversary Emulation All-In-One Tools Books\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0fVIpiLAdx6vftfu3rD1nl1WOF9VjAMJb-2vjxCVFveIX4POIPRYHoHezXaFRwYSYFlannuStRc9IOjZyCwvJhcJKWrlXtj-cEeTXF5uyiv6ViYFiuv70-dwkdEhy8cyy7B0ZW09psJMWdAL0e4buxlAg_EtY_UxpycxSBR4pYECA5BpUHxdqKkaOa9rM\/s16000\/StopCrypt%20Ransomware%20%281%29%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6062,"url":"https:\/\/kalilinuxtutorials.com\/w13scan-passive-security-scanner\/","url_meta":{"origin":25061,"position":1},"title":"W13Scan : Passive Security Scanner Linux\/Windows\/Mac Systems","author":"R K","date":"August 4, 2019","format":false,"excerpt":"W13scan is a proxy-based web scanner that runs on Linux\/Windows\/Mac systems. If you want w13scan to support https, similar to BurpSuite, first need to set up a proxy server (default 127.0.0.1:7778), then go to\u00a0http:\/\/w13scan.ca\u00a0to download the root certificate and trust it. Install pip3 install w13scan Usage #helpw13scan -h#runningw13scan -s 127.0.0.1:7778\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/zBgfnY-qSTU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":31120,"url":"https:\/\/kalilinuxtutorials.com\/social-media-osint-tools-collection\/","url_meta":{"origin":25061,"position":2},"title":"Social-Media-OSINT-Tools-Collection &#8211; A Powerful Toolkit","author":"Varshini","date":"November 2, 2023","format":false,"excerpt":"A collection of most useful tools for social media osint. Unlock the potential of Open-Source Intelligence (OSINT) with our curated 'Social-Media-OSINT-Tools-Collection.' Dive into a world of powerful tools designed to gather valuable information from social media platforms like Facebook, Instagram, LinkedIn, Twitter, and more. Discover how these tools can empower\u2026","rel":"","context":"In &quot;Information Gathering&quot;","block_context":{"text":"Information Gathering","link":"https:\/\/kalilinuxtutorials.com\/category\/ig\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzN08vBN6zZnSjOXMmE9yDamOJCxlIwbGQAnz0oAzLXf2Ke_IWPLNqZBYyEr1XId0XLgS-DRalpSS4Xsaq7RL8Zazd4MsNduh8u6rlPBHvsoyv89knggwP4S5MhY4-O0y3s9n0umvvzOBqoYQYQ1kFuETGibX47XP4jgm22G2GRN3Usa6co1MahNE6aA\/s16000\/OSINT.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31324,"url":"https:\/\/kalilinuxtutorials.com\/top-penetration-testing-software-tools-essential-for-security-assessments\/","url_meta":{"origin":25061,"position":3},"title":"Top Penetration Testing Software &amp; Tools &#8211; Essential for Security Assessments","author":"Varshini","date":"November 22, 2023","format":false,"excerpt":"This article offers a comprehensive overview of the nine most commonly utilized penetration testing tools in the cybersecurity domain. The utilization of tools such as Netsparker, Wireshark, and Kali Linux is crucial in the process of identifying vulnerabilities across diverse digital environments. Each tool provides distinct functionalities for conducting web\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6134,"url":"https:\/\/kalilinuxtutorials.com\/skadi-macos-windows-linux\/","url_meta":{"origin":25061,"position":4},"title":"Skadi : Collect, Process &#038; Hunt With Host Based Data From MacOS, Windows &#038; Linux","author":"R K","date":"August 9, 2019","format":false,"excerpt":"Skadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artifacts and images. It works on MacOS, Windows, and Linux machines. It scales to work effectively on laptops, desktops, servers, the cloud, and can be installed on top of hardened \/\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4031,"url":"https:\/\/kalilinuxtutorials.com\/r3con1z3r\/","url_meta":{"origin":25061,"position":5},"title":"R3Con1Z3R : A Lightweight Web Information Gathering Tool With an Intuitive Features","author":"R K","date":"March 5, 2019","format":false,"excerpt":"R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based foot printing can be conducted quickly and thoroughly. Footprinting is the first phase of ethical hacking, its the collection of every possible information\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=25061"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25061\/revisions"}],"predecessor-version":[{"id":25475,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25061\/revisions\/25475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/25068"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=25061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=25061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=25061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}