{"id":28643,"date":"2023-03-27T06:30:20","date_gmt":"2023-03-27T06:30:20","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28643"},"modified":"2023-03-27T06:30:21","modified_gmt":"2023-03-27T06:30:21","slug":"x-force","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/x-force\/","title":{"rendered":"X-force : IBM Security Utilitary Library In Python"},"content":{"rendered":"\n<p>X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Install<\/h2>\n\n\n\n<pre class=\"wp-block-code has-background\" style=\"background-color:#f4f4f4\"><code><strong>pip3 install XForce<\/strong>\n<\/code><\/pre>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/Jul10l1r4\/X-force#use\"><\/a><\/h1>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Use<\/h2>\n\n\n\n<p>Using you API_KEY make a basic authentication. See <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/camo.githubusercontent.com\/336355a60f8a82531c4d34fa12091eee6bae8bcf022a7cff8537e64cfefbcd4e\/68747470733a2f2f6170692e78666f7263652e69626d636c6f75642e636f6d2f646f632f\"><\/a>. After make a base64 code \u2192 Key + : + Password:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-background\" style=\"background-color:#f4f4f4\"><strong>printf \"d2f5f0f9-2995-42c6-b1dd-4c92252da129:06c41d5e-0604-4c7c-a599-300c367d2090\" | base64\n# ZDJmNWYwZjktMjk5NS00MmM2LWIxZGQtNGM5MjI1MmRhMTI5OjA2YzQxZDVlLTA2MDQtNGM3Yy1hNTk5LTMwMGMzNjdkMjA5MAo=<\/strong><\/pre>\n\n\n\n<p>Using API_KEY, call functions. See <a target=\"_blank\" rel=\"noreferrer noopener\" href=\"https:\/\/camo.githubusercontent.com\/57a8e692a4b1168631fa08c977809201a4cd2423c00f23c0deaf3bd39bb5b830\/68747470733a2f2f6d656469756d2e636f6d2f6765656b63756c747572652f707974686f6e2d73657061726174652d636f64652d616e642d73656e7369746976652d696e666f726d6174696f6e2d656c6567616e746c792d616532316365633566616532\"><\/a> for key storage<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/Jul10l1r4\/X-force#call-functions\"><\/a><\/h2>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Call functions<\/h2>\n\n\n\n<pre class=\"wp-block-preformatted has-background\" style=\"background-color:#f4f4f4\"><strong>import XForce\n\n# Args: 1 - Term of search, 2 - API KEY\n\n# Threat activity search return in string\nXForce.threat_activities(Term, API_KEY)\n\n# Malware analysis search return in string\nXForce.malware_analysis(Term, API_KEY)\n\n# Threat groups search return in string\nXForce.threat_groups(Term, API_KEY)\n\n# Industries search return in string\nXForce.industries(Term, API_KEY)\n\n# All categories search return in list with dict\nXForce.industries(Term, API_KEY)<\/strong><\/pre>\n\n\n\n<p>For see more details of consult, run:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted has-background\" style=\"background-color:#f4f4f4\"><strong>from XForce import details\n\n# Args: 1 - GUID, 2 - API KEY \n# IMPORTANT: all GUID are correspondent to category\n# All function of details have:\n# url \u2192 with x-force exchange panel\ndetails.activity(Id, API_KEY)\ndetails.group(Id, API_KEY)\ndetails.malware(Id, API_KEY)\ndetails.industry(Id, API_KEY)<\/strong><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/Jul10l1r4\/X-force\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>X-force, IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries Install Use Using you API_KEY make a basic authentication. See . After make a base64 code \u2192 Key + : + Password: printf &#8220;d2f5f0f9-2995-42c6-b1dd-4c92252da129:06c41d5e-0604-4c7c-a599-300c367d2090&#8221; | base64 # ZDJmNWYwZjktMjk5NS00MmM2LWIxZGQtNGM5MjI1MmRhMTI5OjA2YzQxZDVlLTA2MDQtNGM3Yy1hNTk5LTMwMGMzNjdkMjA5MAo= Using API_KEY, call functions. See for key storage Call functions [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28658,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5961,2676,5960,5959],"class_list":["post-28643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-malware_analysis","tag-python","tag-threat_activities","tag-xforce"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>X-force : IBM Security Utilitary Library In Python Search: threat_activities<\/title>\n<meta name=\"description\" content=\"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/x-force\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"X-force : IBM Security Utilitary Library In Python Search: threat_activities\" \/>\n<meta property=\"og:description\" content=\"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/x-force\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-27T06:30:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T06:30:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"X-force : IBM Security Utilitary Library In Python\",\"datePublished\":\"2023-03-27T06:30:20+00:00\",\"dateModified\":\"2023-03-27T06:30:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/\"},\"wordCount\":66,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\",\"keywords\":[\"malware_analysis\",\"Python\",\"threat_activities\",\"XForce\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/x-force\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/x-force\/\",\"name\":\"X-force : IBM Security Utilitary Library In Python Search: threat_activities\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\",\"datePublished\":\"2023-03-27T06:30:20+00:00\",\"dateModified\":\"2023-03-27T06:30:21+00:00\",\"description\":\"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/x-force\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"X-force : IBM Security Utilitary Library In Python Search: threat_activities","description":"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/x-force\/","og_locale":"en_US","og_type":"article","og_title":"X-force : IBM Security Utilitary Library In Python Search: threat_activities","og_description":"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries","og_url":"https:\/\/kalilinuxtutorials.com\/x-force\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-03-27T06:30:20+00:00","article_modified_time":"2023-03-27T06:30:21+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/x-force\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/x-force\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"X-force : IBM Security Utilitary Library In Python","datePublished":"2023-03-27T06:30:20+00:00","dateModified":"2023-03-27T06:30:21+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/x-force\/"},"wordCount":66,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","keywords":["malware_analysis","Python","threat_activities","XForce"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/x-force\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/x-force\/","url":"https:\/\/kalilinuxtutorials.com\/x-force\/","name":"X-force : IBM Security Utilitary Library In Python Search: threat_activities","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","datePublished":"2023-03-27T06:30:20+00:00","dateModified":"2023-03-27T06:30:21+00:00","description":"IBM Security utilitary library in python. Search and query all sources: threat_activities and groups, malware_analysis, industries","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/x-force\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/x-force\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh3trhPpqNOrsmVCswniRq0xdZoYpBfxMPtZMb5vgssAcNclaCPtQfjJATlkcZDx-ON4jqIrnrQ9Mt88J885Jas49n4EQsOpyesBI4FOvd6TZADflQ70BMpmLPMKoxJW5al5xg8BireaP1kyacln-TwlUBjhejSEfg6niozpWH-70lTOTnWiuHdTXwU\/s16000\/X-force-9.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11726,"url":"https:\/\/kalilinuxtutorials.com\/pesidious\/","url_meta":{"origin":28643,"position":0},"title":"Pesidious : Malware Mutation using Deep Reinforcement Learning &#038; GANs","author":"R K","date":"October 29, 2020","format":false,"excerpt":"The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass AI powered classifiers while keeping its functionality intact. In the past, notable work has been done in this domain with researchers either looking at reinforcement learning or generative adversarial networks as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":428,"url":"https:\/\/kalilinuxtutorials.com\/peepdf\/","url_meta":{"origin":28643,"position":1},"title":"PEEPDF : A One Stop Tool for PDF Document Forensic Analysis","author":"Ravi Sankar","date":"June 16, 2018","format":false,"excerpt":"Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java scripts & shell-codes. It can analyze suspicious objects & data streams within a PDF document. With some extensions installed, a security researcher can analyze the java-scripts &\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"PEEPDF","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicZEeA-sqO_S3pRKVYMaKXgMcU7zLKVuyMD1SPbZD9cH2r-Om3J0PVPm1WjOsmWhaPu1W45x8QQd6q1VG2HR5MDpawbJe2j8dcwvQcAQKS50KgYJrn0ahsuAXckbDMQJLw3fjVbaKQ9gKqkOqBm0ZkfmHKtV2sazUiMPqHxyfq0N-d2attHPm3vPUX\/s16000\/PEEPDF.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicZEeA-sqO_S3pRKVYMaKXgMcU7zLKVuyMD1SPbZD9cH2r-Om3J0PVPm1WjOsmWhaPu1W45x8QQd6q1VG2HR5MDpawbJe2j8dcwvQcAQKS50KgYJrn0ahsuAXckbDMQJLw3fjVbaKQ9gKqkOqBm0ZkfmHKtV2sazUiMPqHxyfq0N-d2attHPm3vPUX\/s16000\/PEEPDF.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicZEeA-sqO_S3pRKVYMaKXgMcU7zLKVuyMD1SPbZD9cH2r-Om3J0PVPm1WjOsmWhaPu1W45x8QQd6q1VG2HR5MDpawbJe2j8dcwvQcAQKS50KgYJrn0ahsuAXckbDMQJLw3fjVbaKQ9gKqkOqBm0ZkfmHKtV2sazUiMPqHxyfq0N-d2attHPm3vPUX\/s16000\/PEEPDF.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEicZEeA-sqO_S3pRKVYMaKXgMcU7zLKVuyMD1SPbZD9cH2r-Om3J0PVPm1WjOsmWhaPu1W45x8QQd6q1VG2HR5MDpawbJe2j8dcwvQcAQKS50KgYJrn0ahsuAXckbDMQJLw3fjVbaKQ9gKqkOqBm0ZkfmHKtV2sazUiMPqHxyfq0N-d2attHPm3vPUX\/s16000\/PEEPDF.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7656,"url":"https:\/\/kalilinuxtutorials.com\/fileintel-python-application-malicious-files\/","url_meta":{"origin":28643,"position":2},"title":"Fileintel : A Modular Python Application To Pull Intelligence About Malicious Files","author":"R K","date":"December 12, 2019","format":false,"excerpt":"Fileinel is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so new intelligence sources can be easily added. Files are identified by file hash (MD5, SHA1, SHA256). The output is in CSV format and sent to STDOUT so the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4723,"url":"https:\/\/kalilinuxtutorials.com\/ftpbruter\/","url_meta":{"origin":28643,"position":3},"title":"FTPBruter : A FTP Server Brute Forcing Tool Written In Python 3","author":"R K","date":"April 24, 2019","format":false,"excerpt":"Brute forcing tool for FTP server. FTPBruter can work in any OS if they have and support Python 3. Brute force a FTP server with a username or a list of usernames. Install and Run on Linux You have to install Python 3 first:Install Python 3 on Arch Linux and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32950,"url":"https:\/\/kalilinuxtutorials.com\/facebook-hack\/","url_meta":{"origin":28643,"position":4},"title":"Facebook Hack : A Potent Tool For Brute Force Attacks On Facebook Accounts","author":"Varshini","date":"May 6, 2024","format":false,"excerpt":"Welcome to the world of Facebook_hack, a potent tool designed for educational purposes to showcase the vulnerabilities within Facebook's security framework. This article delves into the mechanics of this tool, offering insights into its functionality, installation process, and usage, while emphasizing ethical considerations in its deployment. Join us as we\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG4UHeT9GlMsalbuodBcf19nLbijAquR8tMsX82xGI5KP5fIB3WeccE2ekDl7vbIvCHpDLQ60JHh8FeWJoQ-2ZvJAkJ-hwiZuJZsu2Gabz0Dm5vB26LxNWW1jhJjaJfXvZWb4uboy1hi7G13suj0WoODqt_TXH1F6FdU6th6bVfvpXdfS086z7flrSwOa7\/s16000\/Facebook%20Hack%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3450,"url":"https:\/\/kalilinuxtutorials.com\/lightbulb-framework-wafs\/","url_meta":{"origin":28643,"position":5},"title":"Lightbulb Framework : Tools For Auditing WAFS","author":"R K","date":"December 9, 2018","format":false,"excerpt":"LightBulb\u00a0Framework is an open source python framework for auditing web application firewalls and filters. LightBulb\u00a0Framework Synopsis The framework consists of two main algorithms: GOFA: An active learning algorithm that infers symbolic representations of automate in the standard membership\/equivalence query model. Active learning algorithms permits the analysis of filter and sanitizer\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/12\/Application-lightbludb.gif?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28643"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28643\/revisions"}],"predecessor-version":[{"id":28657,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28643\/revisions\/28657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28658"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}