{"id":32930,"date":"2024-05-03T01:52:21","date_gmt":"2024-05-03T01:52:21","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32930"},"modified":"2024-05-03T01:52:25","modified_gmt":"2024-05-03T01:52:25","slug":"nutek-apple","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","title":{"rendered":"Nutek-Apple : Unleashing Power On macOS And Linux"},"content":{"rendered":"\n<p>Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not. It&#8217;s a matter of taste.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What It Does?<\/strong><a href=\"https:\/\/github.com\/NutekSecurity\/nutek-apple#what-it-does\"><\/a><\/h2>\n\n\n\n<p>This &#8211;\u00a0<code>nutek-apple.rb<\/code>\u00a0&#8211; script for macOS and Linux operating systems installs all the neccessairly tools for well prepared hacker, bug hunter or a seasoned hobbiest willing to pursue a way of turning things inside out and is not scared to use only command line tools. <\/p>\n\n\n\n<p>Why? Almost all of the fancy GUI (don&#8217;t there are some of them) apps started as a command line tool, or are in many ways similar, or even less capable, because in command line &#8211; you&#8217;re on top, you&#8217;re left alone like Alice in Wonderland deep inside your dreams of power, and you know what? You can have this power! Just follow along.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><a href=\"https:\/\/github.com\/NutekSecurity\/nutek-apple#installation\"><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Install Homebrew<\/li>\n<\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>\/bin\/bash -c \"$(curl -fsSL https:\/\/raw.githubusercontent.com\/Homebrew\/install\/HEAD\/install.sh)\"<\/code><\/pre>\n\n\n\n<p>2. Clone this repository<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/NutekSecurity\/nutek-apple.git<\/code><\/pre>\n\n\n\n<p>to some safe location on your Apple\/PC computer. Make sure you have Ruby installed, and also Homebrew (that&#8217;s from where we&#8217;ll be fetching apps) &#8211; you can get Homebrew from\u00a0<a href=\"https:\/\/brew.sh\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">brew.sh<\/a>.<\/p>\n\n\n\n<p>3. You should already have Ruby installed on your computer, but if you don&#8217;t, you can install it with Homebrew:<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\"><\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>brew install ruby<\/code><\/pre>\n\n\n\n<p>on Linux, you can install Ruby with your package manager, for example on Ubuntu:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo apt install ruby<\/code><\/pre>\n\n\n\n<p>on Fedora:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo dnf install ruby<\/code><\/pre>\n\n\n\n<p>4. You&#8217;re on start line. Run this command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ruby nutek-apple.rb<\/code><\/pre>\n\n\n\n<p>or make this happen:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>chmod 744 nutek-apple.rb\n.\/nutek-apple.rb<\/code><\/pre>\n\n\n\n<p>This should present you with help message, and there you will find everything you need, but in case of clarity, I provide the transcript.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Usage: ruby nutek-apple.rb &#91;options]\nAutomated installation of hacking command line programs on macOS - Nutek Security Platform. Requires Homebrew.\nCurated by Nutek Security\nDownloading the latest version from GitHub:\nhttps:&#47;&#47;github.com\/NutekSecurity\/nutek-apple\n\nOptions:\n  -h, --help\t\t\t\tShow this help message and exit\n  -i, --install\t\t\t\tInstall programs. Choose programs to install with --gui, --cli or --all\n  -u, --uninstall\t\t\tUninstall programs. Choose programs to uninstall with --gui, --cli or --all\n  --license\t\t\t\tShow license information\n  --all\t\t\t\t\tInstall or uninstall all programs\n  --cli\t\t\t\tInstall or uninstall cli set of programs\n  --gui\t\t\t\tInstall or uninstall GUI programs\n  --list\t\t\t\tList all programs\n  --list-cli\t\t\t\tList cli set of programs\n  --list-gui\t\t\t\tList gui programs\n  --unattended\t\t\t\tUnattended mode. Install selected programs without asking for confirmation (on Linux run with sudo)\n  --dry-run\t\t\t\tDry run. Show what would be installed without actually installing anything\n\nExamples:\n  ruby nutek-apple.rb --install --cli\n  ruby nutek-apple.rb --install --gui\n  ruby nutek-apple.rb --install --all\n  ruby nutek-apple.rb --uninstall --gui\n  ruby nutek-apple.rb --uninstall --all\n  ruby nutek-apple.rb --list\n  ruby nutek-apple.rb --list-gui\n  ruby nutek-apple.rb --unattended --install --gui\n  ruby nutek-apple.rb --unattended --install --all\n  ruby nutek-apple.rb --unattended --uninstall --gui\n  ruby nutek-apple.rb --unattended --uninstall --all<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What You Will Get?<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>podman - docker alternative\nneovim - text editor\nopenvpn - vpn client\nirssi - irc client\ndos2unix - convert dos to unix\nipcalc - ip calculator\nwhatmask - ip calculator\nexpect - automate interactive applications\nfd - find alternative\ntmux - terminal multiplexer\nlsd - ls alternative\nbat - cat alternative\nripgrep-all - grep alternative\nsd - sed alternative\ntermshark - wireshark alternative\nhttpie - curl alternative\nsmap - map network\nnmap - network scanner\np0f - passive os fingerprinting\nmasscan - port scanner\nferoxbuster - directory bruteforcer\nffuf - directory bruteforcer\nnuclei - vulnerability scanner\nmitmproxy - transparent proxy\nhttpx - http scanner\namass - subdomain scanner\njq - json parser\nhtmlq - html parser\nhttrack - website copier\nmonolith - website copier\nmdcat - markdown reader\nouch - archive extractor\nexploitdb - exploit database\nasciinema - terminal recorder\nagg - ascii art generator\nhashcat - password cracker\njohn-jumbo - password cracker\nmdbook - book generator<a href=\"https:\/\/github.com\/NutekSecurity\/nutek-apple#what-you-will-get\"><\/a><\/code><\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>podman-desktop - docker alternative\nimhex - hex editor\nwarp - terminal\nalacritty - terminal\nwireshark - network analyzer\nzui - data mangling\nfont-hack-nerd-font - font<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not. It&#8217;s a matter of taste. What It Does? This &#8211;\u00a0nutek-apple.rb\u00a0&#8211; script for macOS and Linux operating systems installs all the neccessairly tools for well prepared hacker, bug hunter or a seasoned hobbiest [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32936,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6724],"class_list":["post-32930","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-nutek-apple"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nutek-Apple : Unleashing Power On macOS And Linux<\/title>\n<meta name=\"description\" content=\"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nutek-Apple : Unleashing Power On macOS And Linux\" \/>\n<meta property=\"og:description\" content=\"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T01:52:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-03T01:52:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Nutek-Apple : Unleashing Power On macOS And Linux\",\"datePublished\":\"2024-05-03T01:52:21+00:00\",\"dateModified\":\"2024-05-03T01:52:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\"},\"wordCount\":267,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"nutek-apple\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\",\"name\":\"Nutek-Apple : Unleashing Power On macOS And Linux\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\",\"datePublished\":\"2024-05-03T01:52:21+00:00\",\"dateModified\":\"2024-05-03T01:52:25+00:00\",\"description\":\"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nutek-Apple : Unleashing Power On macOS And Linux","description":"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","og_locale":"en_US","og_type":"article","og_title":"Nutek-Apple : Unleashing Power On macOS And Linux","og_description":"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.","og_url":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-05-03T01:52:21+00:00","article_modified_time":"2024-05-03T01:52:25+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Nutek-Apple : Unleashing Power On macOS And Linux","datePublished":"2024-05-03T01:52:21+00:00","dateModified":"2024-05-03T01:52:25+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/"},"wordCount":267,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","nutek-apple"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/nutek-apple\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","url":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","name":"Nutek-Apple : Unleashing Power On macOS And Linux","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","datePublished":"2024-05-03T01:52:21+00:00","dateModified":"2024-05-03T01:52:25+00:00","description":"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/nutek-apple\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37240,"url":"https:\/\/kalilinuxtutorials.com\/ipatool\/","url_meta":{"origin":32930,"position":0},"title":"IPATool : A Comprehensive Guide To Managing iOS Apps","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"IPATool is a versatile command-line utility designed to facilitate the search, download, and management of iOS app packages (ipa files) from the App Store. It supports various operating systems, including Windows, Linux, and macOS, making it accessible to a wide range of users. This article will delve into the functionality\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36372,"url":"https:\/\/kalilinuxtutorials.com\/yara-x-v0-13-0\/","url_meta":{"origin":32930,"position":1},"title":"YARA-X v0.13.0 : Elevating Malware Analysis With New Tools And Enhanced Features","author":"Varshini","date":"February 12, 2025","format":false,"excerpt":"The release of YARA-X v0.13.0 introduces several enhancements, bug fixes, and new tools aimed at improving the functionality and user experience of this malware analysis framework. Below is a detailed breakdown of the key updates in this version. Key Features And Updates Basic Linting with the check CommandA basic linting\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/YARA-X-v0.13.0.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":29201,"url":"https:\/\/kalilinuxtutorials.com\/5-essential-crypto-tools-for-linux-users-in-2023\/","url_meta":{"origin":32930,"position":2},"title":"5 Essential Crypto Tools For Linux Users In 2023","author":"Febi","date":"June 1, 2023","format":false,"excerpt":"Crypto enthusiasts in particular share a common love for all-things open source, and the humble Linux operating system is no exception. As a result, it isn\u2019t surprising to see an avalanche of crypto tools and solutions, especially off-late, all aimed at Linux users who also participate in the global crypto\u2026","rel":"","context":"In &quot;TECH&quot;","block_context":{"text":"TECH","link":"https:\/\/kalilinuxtutorials.com\/category\/tech\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36481,"url":"https:\/\/kalilinuxtutorials.com\/invoke-argfuscator\/","url_meta":{"origin":32930,"position":3},"title":"Invoke-ArgFuscator : A Tool For Command-Line Obfuscation","author":"Varshini","date":"February 18, 2025","format":false,"excerpt":"Invoke-ArgFuscator is an open-source, cross-platform PowerShell module designed to obfuscate command-line arguments for system-native executables. It provides a robust solution for both offensive and defensive cybersecurity practitioners to explore and counteract command-line obfuscation techniques. Purpose And Functionality Command-line obfuscation, classified under MITRE ATT&CK sub-technique T1027.010, involves manipulating command-line arguments to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Invoke-ArgFuscator.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37055,"url":"https:\/\/kalilinuxtutorials.com\/rec2\/","url_meta":{"origin":32930,"position":4},"title":"REC2 : Rusty External Command And Control Tool","author":"Varshini","date":"March 13, 2025","format":false,"excerpt":"REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms. This tool leverages external APIs like VirusTotal and Mastodon to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":28381,"url":"https:\/\/kalilinuxtutorials.com\/tai-e\/","url_meta":{"origin":32930,"position":5},"title":"Tai-e : A New Efficient Static Analysis Framework For Java","author":"R K","date":"February 17, 2023","format":false,"excerpt":"Tai-e (Chinese: \u592a\u963f; pronunciation: [\u02c8ta\u026a\u0259:]) is a new static analysis framework for Java (please see our technical report for details), which features arguably the \"best\" designs from both the novel ones we proposed and those of classic frameworks such as Soot, WALA, Doop, and SpotBugs. Tai-e is easy-to-learn, easy-to-use, efficient,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMdU1Jv902Tnr8GPvJUSPzF6yXqbr1vFrAEpSvpbCE83mZxaRdXGe734NIsVK_m_tp48RMlQmzfwdZ9euIUyrx915S493VFA0c179L2tCMv7TdGWqDlxn36mlXnYOr6iJsCFfYo5ZskZeS4b4ByCexVhIaUdsTG4yaiK85pyD42y5WFwjK-O_rlRHp\/s16000\/tai-e-logo.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32930"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32930\/revisions"}],"predecessor-version":[{"id":32935,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32930\/revisions\/32935"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32936"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}