{"id":31459,"date":"2023-12-05T07:55:09","date_gmt":"2023-12-05T07:55:09","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31459"},"modified":"2023-12-05T07:55:12","modified_gmt":"2023-12-05T07:55:12","slug":"drawnmap","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","title":{"rendered":"DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results"},"content":{"rendered":"\n<p>Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML. Los nodos representan cada uno de los activos escaneados en al red con sus puertos abiertos correspondientes. El filtrado de puertos permite mostrar en el gr\u00e1fico \u00fanicamente los dispositivos que tienen habilitado ese puerto.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/jor6PS\/DrawNmap#usage\"><\/a><strong>Usage<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>DESCARGA\r\n\r\n# git clone --recurse-submodules https:\/\/github.com\/jor6PS\/DrawNmap.git\r\n\r\nCOMANDO\r\n\r\n# python3 DrawNmap.py &lt;nmap nmap format>\r\n\r\nEJEMPLOS\r\n\r\nArchivo \u00fanico\r\n# python3 DrawNmap.py examples\/nmap_test.nmap\r\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Rquisitos<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># pip3 install plotly\n# pip3 install ipaddress\n# pip3 install dash\n# pip3 install networkx\n# pip3 install pandas\n# pip3 install subprocess\n\n<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Apariencia<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg2Xck17b6ev-y7l247tu-Z4zcWnO-N9H7IPAK0XwXaqSJvPdqAEx5vj_AaeldSkLtoHofHZUhzcZzS13_gQ37491diWoTjnr-QHOjFE85RzTxWGJhBAXKkga4zlXOKEdVABtyLy4oQijhAbdOq56WT7106Ax0cIBcZ5exitRvgWmopQ6PF-gAjXeP6Qw\/s16000\/drawnmap_vid.gif\" alt=\"\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML. Los nodos representan cada uno de los activos escaneados en al red con sus puertos abiertos correspondientes. El filtrado de puertos permite mostrar en el gr\u00e1fico \u00fanicamente los dispositivos que tienen habilitado ese puerto. Usage [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31461,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6447,6321,6052,6325],"class_list":["post-31459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-drawnmap","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DrawNmap<\/title>\n<meta name=\"description\" content=\"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DrawNmap\" \/>\n<meta property=\"og:description\" content=\"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-05T07:55:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-05T07:55:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results\",\"datePublished\":\"2023-12-05T07:55:09+00:00\",\"dateModified\":\"2023-12-05T07:55:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\"},\"wordCount\":69,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\",\"keywords\":[\"cybersecurity\",\"DrawNmap\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\",\"name\":\"DrawNmap\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\",\"datePublished\":\"2023-12-05T07:55:09+00:00\",\"dateModified\":\"2023-12-05T07:55:12+00:00\",\"description\":\"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/drawnmap\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DrawNmap","description":"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","og_locale":"en_US","og_type":"article","og_title":"DrawNmap","og_description":"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.","og_url":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-12-05T07:55:09+00:00","article_modified_time":"2023-12-05T07:55:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DrawNmap: Revolutionizing Network Analysis with Python-Based Visualization of Nmap Scan Results","datePublished":"2023-12-05T07:55:09+00:00","dateModified":"2023-12-05T07:55:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/"},"wordCount":69,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","keywords":["cybersecurity","DrawNmap","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/drawnmap\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","url":"https:\/\/kalilinuxtutorials.com\/drawnmap\/","name":"DrawNmap","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","datePublished":"2023-12-05T07:55:09+00:00","dateModified":"2023-12-05T07:55:12+00:00","description":"Herramienta desarrollada en Python para mostrar en un diagrama de red el contenido de un escaneo Nmap en formato XML.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/drawnmap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/drawnmap\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjowBy5lxJIVGKxm1BkqZfQ1qgzDxKZ9BMzMkxQTfjIU13XZnDUND1dSyvak_Bou7_YqUwI3ii4tqWPzzg-7BETELWpxi25RR9BVqlMdDcsnxH8emfuuxuN-D94XaOqvRJPOtQab3e8fM_VMKQl3RU9gsBMPv5veZpghoMh4qAgMu_OlT49QLx3Ov3wxA\/s16000\/drawnmap.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32828,"url":"https:\/\/kalilinuxtutorials.com\/ego-vulnerability-scanner\/","url_meta":{"origin":31459,"position":0},"title":"EGO Vulnerability Scanner &#8211; Revolutionizing Cybersecurity With Advanced Scanning Capabilities","author":"Varshini","date":"April 23, 2024","format":false,"excerpt":"EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple projects in a REST API. Recognizing a need for such a tool, EGO was developed to utilize various open-source security tools and libraries to perform comprehensive reconnaissance scans.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgwuW_42ohyphenhyphenIzaH06rtfvdPOSewLxRE-HXm7SgAclZ1ZkyREsmpML3nKXHQmh1_rk1S5F4qm_KV3QADqslsvBoN_-kvR3Q_HcrWc2nLHx33mMzbsi9cwtS_TIa1FiaDzyctvMAJyFJl_wmSMx20MVOmug6rR3wjHJbx6dptRpi1F1-oS3uzp_1GfFrMz7Rp\/s16000\/Unitedhealth%20Ransomware%20Attack%20Data%20Breach%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4232,"url":"https:\/\/kalilinuxtutorials.com\/socialfish-phishing-tool\/","url_meta":{"origin":31459,"position":1},"title":"SocialFish : Educational Phishing Tool &#038; Information Collector","author":"R K","date":"March 17, 2019","format":false,"excerpt":"An app to remote control SocialFish. This app is an open-source project to remote control the application, it does not work independently. Also Read - PFQ : Functional Network Framework for Multi-Core Architectures Setting Up Fernando H. E. Bellincanta edited this page 16 hours ago \u00b7 8 revisions PREREQUISITES Python\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11813,"url":"https:\/\/kalilinuxtutorials.com\/pcwt\/","url_meta":{"origin":31459,"position":2},"title":"PCWT : A Web Application That Makes It Easy To Run Your Pentest &#038; Bug Bounty Projects","author":"R K","date":"November 15, 2020","format":false,"excerpt":"PCWT is a web application that makes it easy to run your pentest and bug bounty projects. The app provides a convenient web interface for working with various types of files that are used during the pentest, automate port scan and subdomain search. Port Scan You can scan ports using\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4031,"url":"https:\/\/kalilinuxtutorials.com\/r3con1z3r\/","url_meta":{"origin":31459,"position":3},"title":"R3Con1Z3R : A Lightweight Web Information Gathering Tool With an Intuitive Features","author":"R K","date":"March 5, 2019","format":false,"excerpt":"R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based foot printing can be conducted quickly and thoroughly. Footprinting is the first phase of ethical hacking, its the collection of every possible information\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7760,"url":"https:\/\/kalilinuxtutorials.com\/silver-mass-scan-ips-vulnerable-services\/","url_meta":{"origin":31459,"position":4},"title":"Silver : Mass Scan IPs For Vulnerable Services","author":"R K","date":"December 23, 2019","format":false,"excerpt":"masscan is fast, nmap can fingerprint software and vulners is a huge vulnerability database. Silver is a front-end that allows complete utilization of these programs by parsing data, spawning parallel processes, caching vulnerability data for faster scanning over time and much more. Features Resumable scanningSlack notificationsmulti-core utilizationVulnerability data cachingSmart Shodan\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28709,"url":"https:\/\/kalilinuxtutorials.com\/gpt_vuln-analyzer\/","url_meta":{"origin":31459,"position":5},"title":"GPT_Vuln-analyzer : Uses ChatGPT API To Create Vulnerability Reports Based On Nmap Scan","author":"R K","date":"April 7, 2023","format":false,"excerpt":"GPT_Vuln-analyzer uses ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan data. This is a Proof Of Concept application demonstrating how AI can generate accurate results for vulnerability analysis and allows further utilization of the already super helpful ChatGPT. The tool\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"GPT_Vuln-analyzer","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQk4QuaATRisGzF-_s_jDReGBsNRoW029Bl88BoyDH9avC6GuA_v2SRmEFYoJqXOM97fh-y7BD7acwNa5xu0mRab_4BdVpdW4EYJjnlBVCb1dnBTopG71Ds_nZNYLopEz7zVZQk0WZe2FwlXfueu4sgv9F8GgeLdvTSvllS9TfGm4ruZgFucn9QraULg\/s16000\/GPT.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQk4QuaATRisGzF-_s_jDReGBsNRoW029Bl88BoyDH9avC6GuA_v2SRmEFYoJqXOM97fh-y7BD7acwNa5xu0mRab_4BdVpdW4EYJjnlBVCb1dnBTopG71Ds_nZNYLopEz7zVZQk0WZe2FwlXfueu4sgv9F8GgeLdvTSvllS9TfGm4ruZgFucn9QraULg\/s16000\/GPT.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQk4QuaATRisGzF-_s_jDReGBsNRoW029Bl88BoyDH9avC6GuA_v2SRmEFYoJqXOM97fh-y7BD7acwNa5xu0mRab_4BdVpdW4EYJjnlBVCb1dnBTopG71Ds_nZNYLopEz7zVZQk0WZe2FwlXfueu4sgv9F8GgeLdvTSvllS9TfGm4ruZgFucn9QraULg\/s16000\/GPT.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQk4QuaATRisGzF-_s_jDReGBsNRoW029Bl88BoyDH9avC6GuA_v2SRmEFYoJqXOM97fh-y7BD7acwNa5xu0mRab_4BdVpdW4EYJjnlBVCb1dnBTopG71Ds_nZNYLopEz7zVZQk0WZe2FwlXfueu4sgv9F8GgeLdvTSvllS9TfGm4ruZgFucn9QraULg\/s16000\/GPT.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31459"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31459\/revisions"}],"predecessor-version":[{"id":31460,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31459\/revisions\/31460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31461"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}