{"id":31702,"date":"2024-01-11T05:49:47","date_gmt":"2024-01-11T05:49:47","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31702"},"modified":"2024-01-11T05:50:49","modified_gmt":"2024-01-11T05:50:49","slug":"pipeviewer","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/","title":{"rendered":"PipeViewer &#8211; Exploring Windows Named Pipes For Security And Permissions"},"content":{"rendered":"\n<p>PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is designed to be useful for security researchers who are interested in searching for named pipes with weak permissions or testing the security of named pipes. <\/p>\n\n\n\n<p>With PipeViewer, users can easily view and analyze information about named pipes on their systems, helping them to identify potential security vulnerabilities and take appropriate steps to secure their systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/PipeViewer#usage\"><\/a><strong>Usage<\/strong><\/h2>\n\n\n\n<p>Double-click the EXE binary and you will get the list of all named pipes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/PipeViewer#build\"><\/a><strong>Build<\/strong><\/h2>\n\n\n\n<p>We used Visual Studio to compile it.<br>When downloading it from GitHub you might get error of block files, you can use PowerShell to unblock them:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Get-ChildItem -Path 'D:\\tmp\\PipeViewer-main' -Recurse | Unblock-File<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Warning<\/strong><\/h2>\n\n\n\n<p>We built the project and uploaded it so you can find it in the releases.<br>One problem is that the binary will trigger alerts from Windows Defender because it uses the NtObjerManager package which is flagged as virus.<br>Note that James Forshaw talked about it\u00a0<a href=\"https:\/\/youtu.be\/At-SWQyp-DY?t=1652\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<br>We can&#8217;t change it because we depend on third-party DLL.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/cyberark\/PipeViewer#features\"><\/a><strong>Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A detailed overview of named pipes.<\/li>\n\n\n\n<li>Filter\\highlight rows based on cells.<\/li>\n\n\n\n<li>Bold specific rows.<\/li>\n\n\n\n<li>Export\\Import to\\from JSON.<\/li>\n\n\n\n<li>PipeChat &#8211; create a connection with available named pipes.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is designed to be useful for security researchers who are interested in searching for named pipes with weak permissions or testing the security of named pipes. With PipeViewer, users can easily view and analyze information about [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31704,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6491],"class_list":["post-31702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-pipeviewer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PipeViewer<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PipeViewer\" \/>\n<meta property=\"og:description\" content=\"PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is designed to be useful for security researchers who are interested in searching for named pipes with weak permissions or testing the security of named pipes. With PipeViewer, users can easily view and analyze information about [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-11T05:49:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-11T05:50:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"PipeViewer &#8211; Exploring Windows Named Pipes For Security And Permissions\",\"datePublished\":\"2024-01-11T05:49:47+00:00\",\"dateModified\":\"2024-01-11T05:50:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\"},\"wordCount\":215,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"PipeViewer\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\",\"name\":\"PipeViewer\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\",\"datePublished\":\"2024-01-11T05:49:47+00:00\",\"dateModified\":\"2024-01-11T05:50:49+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PipeViewer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/","og_locale":"en_US","og_type":"article","og_title":"PipeViewer","og_description":"PipeViewer is a GUI tool that allows users to view details about Windows Named pipes and their permissions. It is designed to be useful for security researchers who are interested in searching for named pipes with weak permissions or testing the security of named pipes. With PipeViewer, users can easily view and analyze information about [&hellip;]","og_url":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-01-11T05:49:47+00:00","article_modified_time":"2024-01-11T05:50:49+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"PipeViewer &#8211; Exploring Windows Named Pipes For Security And Permissions","datePublished":"2024-01-11T05:49:47+00:00","dateModified":"2024-01-11T05:50:49+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/"},"wordCount":215,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","PipeViewer"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pipeviewer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/","url":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/","name":"PipeViewer","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","datePublished":"2024-01-11T05:49:47+00:00","dateModified":"2024-01-11T05:50:49+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pipeviewer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pipeviewer\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi7sGACJwzEUihuGTHoGJosQgA24beqTKshOd5LFZkSh_wsoSCeIyk4nisBHCardNcotSgVCpdS6Fq-nb_PqB7RDHdkKtApIrK3F5KZf30eyRgSI_TKlkjjB8y-K1c4HWAinJbgJHspyGpfWfqDtp30SDMlEgTP8DutOW0wt_Thaxh3NZ-HyMRUr2YLxMRv\/s16000\/Untitled%20design%20(4).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31452,"url":"https:\/\/kalilinuxtutorials.com\/amnesiac\/","url_meta":{"origin":31702,"position":0},"title":"Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation","author":"Varshini","date":"December 4, 2023","format":false,"excerpt":"Amnesiac\u00a0is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge a gap on Windows OS, where post-exploitation frameworks are not readily available unless explicitly installed. In fact, it is entirely written in PowerShell, and can be loaded and executed in\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31518,"url":"https:\/\/kalilinuxtutorials.com\/douglas-042\/","url_meta":{"origin":31702,"position":1},"title":"DOUGLAS-042: Enhancing Threat Hunting and Incident Response with PowerShell Scripting","author":"Varshini","date":"December 13, 2023","format":false,"excerpt":"Video https:\/\/www.youtube.com\/watch?v=8KVeNvA6M0s DOUGLAS-042 stands as an ingenious embodiment of a PowerShell script meticulously designed to expedite the triage process and facilitate the meticulous collection of crucial evidence derived from both forensic artifacts and the ephemeral landscape of volatile data. Its fundamental mission revolves around providing indispensable aid in the arduous\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMK9GIAiGZkNUl4JZdvLJM0TjmhWfEHL1kXiKIKqQmMhnYk8HP0mbLKjiWW3mjEAOhSnOBOW6EDjsKLLO48VAJf7g0kXv9bn-ef-qfi2NfXnL6GaQ6btoM20-BVIIxLWxMcor9izTym0DV2G1wFQXwr55EbeK7D3cuDbW4e5_8enIevt9I_WT6j3XzQg\/s16000\/DOUGLAS-042.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33849,"url":"https:\/\/kalilinuxtutorials.com\/lemma\/","url_meta":{"origin":31702,"position":2},"title":"Lemma &#8211; Harnessing AWS Lambda For Scalable Command-Line Tool Execution","author":"Varshini","date":"July 16, 2024","format":false,"excerpt":"The author of this project is not responsible for any damage or data loss incurred as a result of using this software. Use this software at your own risk. While efforts have been made to ensure the accuracy and reliability of the software, it is provided \"as is\" without warranty\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj6GCfFxkYceZ-BRF1Ou5RFfxtFxT7RJimpW7lTDfvQBxRU_6HEsZ1MmNynD6IV_pj7qk5RTl-I7fGL1LirdX7HU-yB9HlC6PWD6XRFNTUdHQNoF0oSLLvXVGsZUVAXQ746oJ0IxCSCd4s9cW8-5k3gr__EMDrWimgE7fcTGVrQ8zm1sRUu08nqFRQKdnTO\/s16000\/Lemma%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35734,"url":"https:\/\/kalilinuxtutorials.com\/awesomeuserfinder\/","url_meta":{"origin":31702,"position":3},"title":"AWeSomeUserFinder : Harnessing AWS IAM For Username Enumeration And Password Security","author":"Varshini","date":"January 23, 2025","format":false,"excerpt":"AWS IAM Username Enumerator and Password Spraying Tool in Python3 In order to use the tool with the UpdateAssumeRolePolicy method, the IAM user account utilized must have the following permissions attached: \"iam:GetRole\" \"iam:CreatePolicy\" \"iam:UpdateAssumeRolePolicy\" \"iam:CreateRole\" \"iam:AttachRolePolicy\" An example policy is included in the files named \"example_assume_role_policy.json\" in the example_policies directory.\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/AWeSomeUserFinder-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28913,"url":"https:\/\/kalilinuxtutorials.com\/secure-your-browsers\/","url_meta":{"origin":31702,"position":4},"title":"How to Secure your Browsers from Malicious Extensions?","author":"Shivaa Nandini R","date":"April 17, 2023","format":false,"excerpt":"In the first half of 2022, 1.3 million users suffered data breaches because of harmful extensions. Malicious extensions are considered major risk factors as they can easily penetrate your endpoints and cause major system compromises. Unsigned and unsafe extensions are considered to be potentially harmful to your browsers. Browser extensions\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Secure your Browsers","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPqyDnoD4Hj82-W21ujY0pmth_9YzTfKfF3wHJz2ou4Ib3-iMCgnnV6m-VwfqoPnB76B50-K-9ckdShd_7PoDFRGirhRY0-K6tGOFD-xuuazL9aDJ8tPhx7ZQvEv6YXsj9AU-_OaSDdZ7UslABQWB2X_AZzYqxyYL_oDa-dyW_fJGF4z87fPKBfzzYpQ\/s16000\/Secure%20your%20Browsers%20from%20Malicious%20Extensions.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35972,"url":"https:\/\/kalilinuxtutorials.com\/goredops\/","url_meta":{"origin":31702,"position":5},"title":"GoRedOps : A Golang Arsenal For Red Teamers And Security Professionals","author":"Varshini","date":"January 31, 2025","format":false,"excerpt":"GoRedOps is a comprehensive collection of Golang-based projects tailored for red teamers and offensive security professionals. This repository offers a wide array of tools and techniques essential for penetration testing, exploitation, and security research. Below is an overview of its structure and functionality. Project Structure And Tools GoRedOps is organized\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31702"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31702\/revisions"}],"predecessor-version":[{"id":31703,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31702\/revisions\/31703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31704"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}