{"id":33193,"date":"2024-06-03T11:27:43","date_gmt":"2024-06-03T11:27:43","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33193"},"modified":"2024-06-03T11:27:45","modified_gmt":"2024-06-03T11:27:45","slug":"quidam","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/quidam\/","title":{"rendered":"Quidam &#8211; Leveraging Forgotten Password Functions For Information Retrieval"},"content":{"rendered":"\n<p>Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user information. <\/p>\n\n\n\n<p>This open-source intelligence tool, compatible with Python, enables users to access data such as email addresses and phone numbers from sites like Twitter, Instagram, and GitHub. <\/p>\n\n\n\n<p>Ideal for educational and research purposes, Quidam is a must-have for anyone in the field of information security and digital forensics.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Educational Purposes Only<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#educational-purposes-only\"><\/a><\/h2>\n\n\n\n<p>Quidam allows you to retrieve information thanks to the forgotten password function of some sites.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Prerequisite<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#-prerequisite\"><\/a><\/h2>\n\n\n\n<p><a href=\"https:\/\/www.python.org\/downloads\/release\/python-370\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Python 2\/3<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#%EF%B8%8F-installation\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With PyPI<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#with-pypi\"><\/a><\/h3>\n\n\n\n<p><code>pip3 install Quidam<\/code><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>With Github<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/megadose\/Quidam.git\ncd Quidam\/\npython3 setup.py install<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Usage<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>from quidam import *\nprint(instagram(\"test\"))\nprint(twitter(\"test\"))\nprint(github(\"test\"))<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 Quidam.py -u test -m all<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Type Of Information Per Site:<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#type-of-information-per-site\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Twitter: If the person has not disabled the email option and the last 2 digits of their phone number as well as part of the email the star number\u00a0<code>*<\/code>\u00a0is the right number corresponding to the email.<\/li>\n\n\n\n<li>Instagram : Always retrieves a part of the email with the right number of stars and the full domain name<\/li>\n\n\n\n<li>Github: Go look at recent commits with the api so give the full email and the name associated with the email address.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Rate Limit:<\/strong><a href=\"https:\/\/github.com\/megadose\/Quidam#rate-limit\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Twitter rate limit if you do it too fast just change IP<\/li>\n\n\n\n<li>Instagram no rate limit<\/li>\n\n\n\n<li>Github no rate limit<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user information. This open-source intelligence tool, compatible with Python, enables users to access data such as email addresses and phone numbers from sites like Twitter, Instagram, and GitHub. Ideal for educational and research purposes, Quidam is [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33196,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[26],"tags":[737,6321,6052,6325,6757],"class_list":["post-33193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ig","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-quidam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quidam - Leveraging Forgotten Password Functions For<\/title>\n<meta name=\"description\" content=\"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/quidam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quidam - Leveraging Forgotten Password Functions For\" \/>\n<meta property=\"og:description\" content=\"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/quidam\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-03T11:27:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-03T11:27:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Quidam &#8211; Leveraging Forgotten Password Functions For Information Retrieval\",\"datePublished\":\"2024-06-03T11:27:43+00:00\",\"dateModified\":\"2024-06-03T11:27:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/\"},\"wordCount\":208,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Quidam\"],\"articleSection\":[\"Information Gathering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/quidam\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/quidam\/\",\"name\":\"Quidam - Leveraging Forgotten Password Functions For\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\",\"datePublished\":\"2024-06-03T11:27:43+00:00\",\"dateModified\":\"2024-06-03T11:27:45+00:00\",\"description\":\"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/quidam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quidam - Leveraging Forgotten Password Functions For","description":"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/quidam\/","og_locale":"en_US","og_type":"article","og_title":"Quidam - Leveraging Forgotten Password Functions For","og_description":"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user","og_url":"https:\/\/kalilinuxtutorials.com\/quidam\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-06-03T11:27:43+00:00","article_modified_time":"2024-06-03T11:27:45+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/quidam\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/quidam\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Quidam &#8211; Leveraging Forgotten Password Functions For Information Retrieval","datePublished":"2024-06-03T11:27:43+00:00","dateModified":"2024-06-03T11:27:45+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/quidam\/"},"wordCount":208,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Quidam"],"articleSection":["Information Gathering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/quidam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/quidam\/","url":"https:\/\/kalilinuxtutorials.com\/quidam\/","name":"Quidam - Leveraging Forgotten Password Functions For","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","datePublished":"2024-06-03T11:27:43+00:00","dateModified":"2024-06-03T11:27:45+00:00","description":"Quidam is an innovative tool designed to harness the forgotten password functions of various social platforms to retrieve partial user","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/quidam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/quidam\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_3E-M8oR1aXg5dur0rmMzF93pNAXmhMwHV2xkkPbLRrFW_GRFKZ7-FXRpTJ2tUSpk5oF2E9yVT1z-mklRRosfoMs-JgMAPsEOuBaqyl8vqi9PM9z_j_Z9_aWqGUGzmjDdzulPqwblJEPEJoyQLKx4eCe6VAlrLXTOMClMkJlqyXSKGXonjDSP-KMAEpYy\/s16000\/Critical%20Flaw%20Veeam%20Unauthorized%20Access%20(1).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33334,"url":"https:\/\/kalilinuxtutorials.com\/holehe-maltego-transform\/","url_meta":{"origin":33193,"position":0},"title":"Holehe Maltego Transform &#8211; Your Tool For Digital Investigation And Information Gathering","author":"Varshini","date":"June 13, 2024","format":false,"excerpt":"holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function. In the evolving landscape of online intelligence, the Holehe Maltego Transform emerges as a pivotal tool for digital investigators. Designed to reveal how\u2026","rel":"","context":"In &quot;Information Gathering&quot;","block_context":{"text":"Information Gathering","link":"https:\/\/kalilinuxtutorials.com\/category\/ig\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjTbOiMqFt2dQr5kRgg93sGhyphenhyphenRLM__IRD1cy3oyY_mbVxLGytJwmRx7ohTp_Vfx89S9_70El25AS1iWLrtWsQLpa23Lu59WLFggm_37XuRoE9bAzP4-aimD84rnA9e5EdQvBIHVzxQTy-Xok5SLKVHS6bjTi8fPsb1YrPPibDXv-yQSYQRiKX061XhheDKp\/s16000\/Holehe%20Maltego%20Transform%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17455,"url":"https:\/\/kalilinuxtutorials.com\/sharplaps\/","url_meta":{"origin":33193,"position":1},"title":"SharpLAPS : Retrieve LAPS Password From LDAP","author":"R K","date":"August 9, 2021","format":false,"excerpt":"SharpLAPS is a tool to Retrieve LAPS Password From LDAP. The attribute\u00a0ms-mcs-AdmPwd\u00a0stores the clear-text LAPS password. This executable is made to be executed within Cobalt Strike session using\u00a0execute-assembly. It will retrieve the\u00a0LAPS\u00a0password from the Active Directory. Require (either): Account with\u00a0ExtendedRight\u00a0or\u00a0Generic All RightsDomain Admin privilege Usage _ _ _ \/ \/\/\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37066,"url":"https:\/\/kalilinuxtutorials.com\/golaps-the-ultimate-guide-to-managing-laps-passwords-with-golang\/","url_meta":{"origin":33193,"position":2},"title":"goLAPS : The Ultimate Guide To Managing LAPS Passwords with Golang","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"goLAPS is a tool designed to interact with the Local Administrator Password Solution (LAPS) in a domain environment. It allows users to retrieve and set LAPS passwords for domain-joined computers using simple binding over LDAP and LDAPS protocols. This project was inspired by pyLAPS and serves as a learning exercise\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/goLAPS-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32895,"url":"https:\/\/kalilinuxtutorials.com\/cybersecurity-toolkit\/","url_meta":{"origin":33193,"position":3},"title":"Cybersecurity Toolkit &#8211; Essential Python Tools For Penetration Testing","author":"Varshini","date":"April 30, 2024","format":false,"excerpt":"Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing enthusiasts. In this article, we delve into a range of powerful yet straightforward scripts crafted for educational purposes. From port scanning to password sniffing and encryption, each tool offers insight into cybersecurity fundamentals and serves\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEinlewGCYM22KrfPlIUU7K4E0RAo9RvxLzcIo2CvjTOMnxq75sSk_YJtPx22_jCWm0aTfH5hYsQtRDZQSt88wStbGtTLxTK1-pBUT4oiS77JnSPhVc6LmyG4_sAIGh6WX2uCJKcrNNErfINauyc5eyhz_4u9CAnW1ttTYUqmCq23sp0ch8bPhCyOggHBT1J\/s16000\/MagicDot%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36175,"url":"https:\/\/kalilinuxtutorials.com\/chromestealer\/","url_meta":{"origin":33193,"position":4},"title":"ChromeStealer : A Tool For Extracting Chrome Passwords","author":"Varshini","date":"February 6, 2025","format":false,"excerpt":"ChromeStealer is an educational tool developed by @bernKing20 to demonstrate how to extract and decrypt stored passwords from Google Chrome on Windows systems using C\/C++. The project aims to address gaps in existing resources by providing a functional and detailed implementation. Key Features And Functionality ChromeStealer focuses on decrypting passwords\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ChromeStealer.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":23036,"url":"https:\/\/kalilinuxtutorials.com\/instaloctrack\/","url_meta":{"origin":33193,"position":5},"title":"Instaloctrack : An Instagram OSINT Tool To Collect All The Geotagged Locations","author":"R K","date":"March 21, 2022","format":false,"excerpt":"Instaloctrack, a tool to scrape geotagged locations on Instagram profiles. Output in JSON & interactive map. Requirements sudo apt install chromium-chromedriver && chmod a+x \/usr\/bin\/chromedriver Installation git clone https:\/\/github.com\/bernsteining\/instaloctrackcd instaloctrackpip3 install . Or use Docker: sudo docker build -t instaloctrack -f Dockerfile . Usage instaloctrack -husage: instaloctrack [-h] [-t TARGET_ACCOUNT]\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjIA8BIze478QcpXJ4BMBw09oLgs1WUliKtvMlIHh8cN_Q2jLuOtfQCQ3rexjWLlM_zZ35xhla1isX-XlButUzMq4SJ4udnKyAEf-jweFVO3JeTSB2zWqZnRsJZ88HYKkZK0TdKm6Wq8Ks4JWcWp34lrjWt-llnXaO5sr0jh39ESFCEqUTfp0TmnKJV=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjIA8BIze478QcpXJ4BMBw09oLgs1WUliKtvMlIHh8cN_Q2jLuOtfQCQ3rexjWLlM_zZ35xhla1isX-XlButUzMq4SJ4udnKyAEf-jweFVO3JeTSB2zWqZnRsJZ88HYKkZK0TdKm6Wq8Ks4JWcWp34lrjWt-llnXaO5sr0jh39ESFCEqUTfp0TmnKJV=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjIA8BIze478QcpXJ4BMBw09oLgs1WUliKtvMlIHh8cN_Q2jLuOtfQCQ3rexjWLlM_zZ35xhla1isX-XlButUzMq4SJ4udnKyAEf-jweFVO3JeTSB2zWqZnRsJZ88HYKkZK0TdKm6Wq8Ks4JWcWp34lrjWt-llnXaO5sr0jh39ESFCEqUTfp0TmnKJV=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjIA8BIze478QcpXJ4BMBw09oLgs1WUliKtvMlIHh8cN_Q2jLuOtfQCQ3rexjWLlM_zZ35xhla1isX-XlButUzMq4SJ4udnKyAEf-jweFVO3JeTSB2zWqZnRsJZ88HYKkZK0TdKm6Wq8Ks4JWcWp34lrjWt-llnXaO5sr0jh39ESFCEqUTfp0TmnKJV=s728 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33193"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33193\/revisions"}],"predecessor-version":[{"id":33195,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33193\/revisions\/33195"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33196"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}