{"id":32705,"date":"2024-04-10T06:42:46","date_gmt":"2024-04-10T06:42:46","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32705"},"modified":"2024-04-10T06:42:49","modified_gmt":"2024-04-10T06:42:49","slug":"shortemall","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/shortemall\/","title":{"rendered":"Shortemall &#8211; The Definitive Guide To Advanced URL Scanning"},"content":{"rendered":"\n<p>Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning. <\/p>\n\n\n\n<p>With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs. <\/p>\n\n\n\n<p>This article dives deep into ShortEmAll&#8217;s capabilities, from its robust features and installation process to practical usage tips, ensuring readers can leverage this tool to its fullest potential.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Table Of Contents<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#table-of-contents\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Introduction<\/li>\n\n\n\n<li>Features<\/li>\n\n\n\n<li>Installation<\/li>\n\n\n\n<li>Usage<\/li>\n\n\n\n<li>Options<\/li>\n\n\n\n<li>Example Usages<\/li>\n\n\n\n<li>Contributing<\/li>\n\n\n\n<li>License<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#introduction\"><\/a><\/h2>\n\n\n\n<p>Short&#8217;Em All is a Python-based tool that automates the process of scanning URLs. <\/p>\n\n\n\n<p>It utilizes various techniques to gather information about short URLs, such as taking screenshots of landing pages, checking for the existence of URLs, and filtering results based on user preferences.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>New_Features_of_Short&#8217;Em_All_v3<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#new_features_of_shortem_all_v3\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Scanning Specific Short URL Providers:<\/strong>\u00a0Users can now target specific short URL providers for scanning, providing more flexibility and efficiency in their investigations.<\/li>\n\n\n\n<li><strong>Auto-Configuration for Improved User Experience:<\/strong>\u00a0The tool now offers auto-configuration options to streamline the setup process and ensure optimal performance.<\/li>\n\n\n\n<li><strong>Enhanced Screenshot Management:<\/strong>\u00a0Short&#8217;Em All now utilizes Chromedriver and Selenium for screenshot capture, reducing user intervention and ensuring greater stability.<\/li>\n\n\n\n<li><strong>Total Code Refactoring:<\/strong>\u00a0The codebase has undergone extensive refactoring to improve readability, maintainability, and overall performance<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Main_Features<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#main_features\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Automated Scanning:<\/strong>\u00a0Short&#8217;Em All automates the process of scanning URLs, saving time and effort.<\/li>\n\n\n\n<li><strong>Screenshot Capture:<\/strong>\u00a0It can capture screenshots of landing pages to provide visual insights.<\/li>\n\n\n\n<li><strong>Notification System:<\/strong>\u00a0Users can receive email notifications about scan results.<\/li>\n\n\n\n<li><strong>Customization:<\/strong>\u00a0Users can customize scan options based on their requirements.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#installation\"><\/a><\/h2>\n\n\n\n<p>To install Short&#8217;Em All, follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Clone the repository:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>gh repo clone osintmatter\/shortemall<\/code><\/pre>\n\n\n\n<p>2. Install dependencies:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>pip install -r requirements.txt<\/code><\/pre>\n\n\n\n<p>Before You Begin:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure you have installed Python and pip (at least version 3.8).<\/li>\n\n\n\n<li>Run the tool on a Linux machine or Linux Virtual Host.<\/li>\n\n\n\n<li>Obtain the OAuth 2.0 client ID for your Gmail account and save the generated credentials file as\u00a0<code>credentials.json<\/code>\u00a0in the main folder &#8211; <a href=\"https:\/\/support.google.com\/cloud\/answer\/6158849?hl=en#zippy=\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">follow <\/a>this step-by-step guide<\/li>\n\n\n\n<li>Edit the\u00a0<code>config.py<\/code>\u00a0file to set variables such as\u00a0<code>my_email<\/code>,\u00a0<code>to_email<\/code>.<\/li>\n\n\n\n<li>After first run, ensure you have the required configuration files (<code>config.ini<\/code>\u00a0and\u00a0<code>gmail.pickle<\/code>) in the current directory.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#usage\"><\/a><\/h2>\n\n\n\n<p>To use Short&#8217;Em All, follow the steps below:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Run the\u00a0<code>short_em_all.py<\/code>\u00a0script.<\/li>\n\n\n\n<li>Follow the on-screen prompts to configure the scan options.<\/li>\n\n\n\n<li>Review the scan results displayed in the terminal and read the output.txt file and Screenshots Scan folder.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Options<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#options\"><\/a><\/h2>\n\n\n\n<p>Short&#8217;Em All provides several command-line options to customize the scanning process:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><code>-t, --target<\/code>: Insert the target keyword for this scan.<\/li>\n\n\n\n<li><code>-d, --dictionary<\/code>: Use a stable dictionary for this scan.<\/li>\n\n\n\n<li><code>-n, --notifications<\/code>: Disable email notifications on found results.<\/li>\n\n\n\n<li><code>-z, --zero<\/code>: Disable taking screenshots on URLs landing pages.<\/li>\n\n\n\n<li><code>-f, --found<\/code>: Show only found scan results.<\/li>\n\n\n\n<li><code>-r, --singlescan<\/code>: Use single scan mode (no data retention).<\/li>\n\n\n\n<li><code>-e, --email<\/code>: Receive email notification on the target scan.<\/li>\n\n\n\n<li><code>-s, --screenshot<\/code>: Enable taking screenshots on found results.<\/li>\n\n\n\n<li><code>-v, --verbose<\/code>: Enable verbose mode.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example Usages<\/strong><a href=\"https:\/\/github.com\/osintmatter\/shortemall#example-usages\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Perform a scan with default settings:<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>python short_em_all.py<\/code><\/pre>\n\n\n\n<p>2. Perform a scan with custom options:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>python short_em_all.py -t example_target -s -e<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike approach URL scanning. With its Python-based framework, it simplifies the intricacies of analyzing and verifying short URLs. This article dives deep into ShortEmAll&#8217;s capabilities, from its robust features and installation process to practical usage tips, ensuring [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32718,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25],"tags":[737,6321,6052,6688],"class_list":["post-32705","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-shortemall"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Shortemall- The Definitive Guide To Advanced URL Scanning<\/title>\n<meta name=\"description\" content=\"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/shortemall\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shortemall- The Definitive Guide To Advanced URL Scanning\" \/>\n<meta property=\"og:description\" content=\"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/shortemall\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-10T06:42:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T06:42:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Shortemall &#8211; The Definitive Guide To Advanced URL Scanning\",\"datePublished\":\"2024-04-10T06:42:46+00:00\",\"dateModified\":\"2024-04-10T06:42:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"Shortemall\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shortemall\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/\",\"name\":\"Shortemall- The Definitive Guide To Advanced URL Scanning\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\",\"datePublished\":\"2024-04-10T06:42:46+00:00\",\"dateModified\":\"2024-04-10T06:42:49+00:00\",\"description\":\"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/shortemall\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Shortemall- The Definitive Guide To Advanced URL Scanning","description":"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/shortemall\/","og_locale":"en_US","og_type":"article","og_title":"Shortemall- The Definitive Guide To Advanced URL Scanning","og_description":"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike","og_url":"https:\/\/kalilinuxtutorials.com\/shortemall\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-04-10T06:42:46+00:00","article_modified_time":"2024-04-10T06:42:49+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Shortemall &#8211; The Definitive Guide To Advanced URL Scanning","datePublished":"2024-04-10T06:42:46+00:00","dateModified":"2024-04-10T06:42:49+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","keywords":["cybersecurity","informationsecurity","kalilinux","Shortemall"],"articleSection":["Cyber security","Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/shortemall\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/","url":"https:\/\/kalilinuxtutorials.com\/shortemall\/","name":"Shortemall- The Definitive Guide To Advanced URL Scanning","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","datePublished":"2024-04-10T06:42:46+00:00","dateModified":"2024-04-10T06:42:49+00:00","description":"Shortemall stands as a pivotal tool in the realm of digital investigations, revolutionizing the way professionals and enthusiasts alike","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/shortemall\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/shortemall\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj1Vr_iQrBUKFkRPzsxZ6lsooHSeQO4rojvelIKxfbMW1F-DqRalMlJeTMHDfr5XAyc1b0akXiJebwTuOsuvFrIRVsf1bT1lQnwmGpq-2Pea-2U4n7bpIrp2dY_BuCfhVXnh2JdoAEIl2qm1FBIHevI45LrgpfGmtrWT5eEe-IEFM0zIsEx6A1oRJlUWatW\/s16000\/Critical%20Rust%20Vulnerability%20Shell%20Command%20Execution%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32974,"url":"https:\/\/kalilinuxtutorials.com\/cybersentry\/","url_meta":{"origin":32705,"position":0},"title":"CyberSentry &#8211; Automated Web Vulnerability Scanner","author":"Varshini","date":"May 7, 2024","format":false,"excerpt":"CyberSentry\u00a0is a robust automated scanning tool designed for web applications. It helps security professionals, ethical hackers, and developers detect and resolve vulnerabilities to strengthen their web environments. Features Multiple Vulnerability Tests: Includes tests for SQL Injection, XSS, and HTTP Parameter tampering. Extensive Coverage: Capable of scanning various frameworks and databases,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhY0CXmZQippv0YaCQCC9JcgASH_ly_vZkZxOhgNU2_pozrazbUFunX0e7fRodt3K_0YfUhqLQ6U-49PVhlYISOZAyiqo6MKYsCeB3evxY-1jBCd71MPnbSgMsvJsEahjxI31CxSenhUKeBvRhdVgvLChrKEz9tkWdnqXMOJPTj-fxc-Y_tv_96bpMfE8SU\/s16000\/CyberSentry.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36962,"url":"https:\/\/kalilinuxtutorials.com\/massvulscan\/","url_meta":{"origin":32705,"position":1},"title":"MassVulScan : A Comprehensive Network Scanning Tool","author":"Varshini","date":"March 10, 2025","format":false,"excerpt":"MassVulScan is a powerful network scanning tool designed for pentesters and system administrators to identify open ports and potential security vulnerabilities across large-scale networks. It leverages the capabilities of masscan for rapid port scanning and nmap for detailed service analysis, making it an efficient tool for network security assessments. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/MassVulScan-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9547,"url":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","url_meta":{"origin":32705,"position":2},"title":"XCTR Hacking Tools 2020","author":"R K","date":"March 5, 2020","format":false,"excerpt":"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as \"project-name\" in results directory. You can update user agent and proxy information in the settings section and also update url, proxy, project name, wordlist, thread numbers. Features\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":29315,"url":"https:\/\/kalilinuxtutorials.com\/top-5-popular-web-scanner-for-kali-linux\/","url_meta":{"origin":32705,"position":3},"title":"Top 5 popular Web Scanner for Kali Linux","author":"Aman Mishra","date":"July 3, 2023","format":false,"excerpt":"Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux is a popular distribution for penetration testing and ethical hacking, and it comes with a wide range of tools for web application scanning. 1. Nikto: Nikto is a powerful web\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgUOxW4V_F2BbN3NDwhH0colLC0CrlPRGBSMsz4Pwx5BgVAnH-912aYBPsDyalGYuLmTK2T8YUPO-MBJEvkecMjUM23l4tKakv_4smgdsLfzwnam742kqUsPKh0QSQK8GtNi-qVOCL1Lu0VIymLP3YcHodCPXyKVHBgYOlt4at-GJ-2kSEZl3JY_v5KlSGK\/s728\/web%20scanner-1.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25973,"url":"https:\/\/kalilinuxtutorials.com\/crlfsuite\/","url_meta":{"origin":32705,"position":4},"title":"CRLFsuite : Fast CRLF Injection Scanning Tool","author":"R K","date":"July 17, 2022","format":false,"excerpt":"CRLFsuite is a fast tool specially designed to scan\u00a0CRLF injection. Installation $ git clone https:\/\/github.com\/Nefcore\/CRLFsuite.git$ cd CRLFsuite$ sudo python3 setup.py install$ crlfsuite -h Features \u2714\ufe0f\u00a0Single URL scanning \u2714\ufe0f\u00a0Multiple URL scanning \u2714\ufe0f\u00a0WAF detection \u2714\ufe0f\u00a0XSS through CRLF injection \u2714\ufe0f\u00a0Stdin supported \u2714\ufe0f\u00a0GET & POST method supported \u2714\ufe0f\u00a0Concurrency \u2714\ufe0f\u00a0Powerful payloads (WAF evasion payloads are\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQrzD5LbUAXLplzJGWnlLuGbfqJjzuagdJJpAYNH9YZBd1HSvJHHHfYfe62xVnaDgjazR8zMUPKV9eR1fk9VZVtqutQU7Pjdjvl0wdJy3MYDPQ8guhdfzQ2WR-ojgDIEDlY6S4TNJLvswHNFzVNLDA5FNRe3okRsB8GkOFYI0RQgvEatrX2AqOi8dh\/s728\/CRLFsuite_logo2.0%20%282%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQrzD5LbUAXLplzJGWnlLuGbfqJjzuagdJJpAYNH9YZBd1HSvJHHHfYfe62xVnaDgjazR8zMUPKV9eR1fk9VZVtqutQU7Pjdjvl0wdJy3MYDPQ8guhdfzQ2WR-ojgDIEDlY6S4TNJLvswHNFzVNLDA5FNRe3okRsB8GkOFYI0RQgvEatrX2AqOi8dh\/s728\/CRLFsuite_logo2.0%20%282%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQrzD5LbUAXLplzJGWnlLuGbfqJjzuagdJJpAYNH9YZBd1HSvJHHHfYfe62xVnaDgjazR8zMUPKV9eR1fk9VZVtqutQU7Pjdjvl0wdJy3MYDPQ8guhdfzQ2WR-ojgDIEDlY6S4TNJLvswHNFzVNLDA5FNRe3okRsB8GkOFYI0RQgvEatrX2AqOi8dh\/s728\/CRLFsuite_logo2.0%20%282%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiQrzD5LbUAXLplzJGWnlLuGbfqJjzuagdJJpAYNH9YZBd1HSvJHHHfYfe62xVnaDgjazR8zMUPKV9eR1fk9VZVtqutQU7Pjdjvl0wdJy3MYDPQ8guhdfzQ2WR-ojgDIEDlY6S4TNJLvswHNFzVNLDA5FNRe3okRsB8GkOFYI0RQgvEatrX2AqOi8dh\/s728\/CRLFsuite_logo2.0%20%282%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6845,"url":"https:\/\/kalilinuxtutorials.com\/penta-open-source-cli-automate-pentesting\/","url_meta":{"origin":32705,"position":5},"title":"Penta : Open Source All-In-One CLI Tool To Automate Pentesting","author":"R K","date":"October 11, 2019","format":false,"excerpt":"Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info found on specific servers. Installation Install requirements penta requires the following packages. Python3.7pipenv Resolve python package dependency. $ pipenv install If you dislike pipenv... $ pip install -r requirements.txt\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32705"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32705\/revisions"}],"predecessor-version":[{"id":32709,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32705\/revisions\/32709"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32718"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}