{"id":33528,"date":"2024-06-27T10:08:10","date_gmt":"2024-06-27T10:08:10","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33528"},"modified":"2024-06-27T10:08:12","modified_gmt":"2024-06-27T10:08:12","slug":"vulnnodeapp","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/","title":{"rendered":"VulnNodeApp &#8211; Exploring Web Vulnerabilities With A Node.js Educational Tool"},"content":{"rendered":"\n<p>A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Setup<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#setup\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Clone This Repository<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/4auvar\/VulnNodeApp.git<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Application Setup:<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#application-setup\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install the latest node.js version with npm.<\/li>\n\n\n\n<li>Open terminal\/command prompt and navigate to the location of downloaded\/cloned repository.<\/li>\n\n\n\n<li>Run command:\u00a0<code>npm install<\/code><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>DB Setup<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#db-setup\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Install and configure latest mysql version and start the mysql service\/deamon<\/li>\n\n\n\n<li>Login with root user in mysql and run below sql script:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>CREATE USER 'vulnnodeapp'@'localhost' IDENTIFIED BY 'password';\ncreate database vuln_node_app_db;\nGRANT ALL PRIVILEGES ON vuln_node_app_db.* TO 'vulnnodeapp'@'localhost';\nUSE vuln_node_app_db;\ncreate table users (id int AUTO_INCREMENT PRIMARY KEY, fullname varchar(255), username varchar(255),password varchar(255), email varchar(255), phone varchar(255), profilepic varchar(255));\ninsert into users(fullname,username,password,email,phone) values(\"test1\",\"test1\",\"test1\",\"test1@test.com\",\"976543210\");\ninsert into users(fullname,username,password,email,phone) values(\"test2\",\"test2\",\"test2\",\"test2@test.com\",\"9887987541\");\ninsert into users(fullname,username,password,email,phone) values(\"test3\",\"test3\",\"test3\",\"test3@test.com\",\"9876987611\");\ninsert into users(fullname,username,password,email,phone) values(\"test4\",\"test4\",\"test4\",\"test4@test.com\",\"9123459876\");\ninsert into users(fullname,username,password,email,phone) values(\"test5\",\"test5\",\"test5\",\"test5@test.com\",\"7893451230\");<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Set Basic Environment Variable<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#set-basic-environment-variable\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>User needs to set the below environment variable.\n<ul class=\"wp-block-list\">\n<li>DATABASE_HOST (E.g: localhost, 127.0.0.1, etc&#8230;)<\/li>\n\n\n\n<li>DATABASE_NAME (E.g: vuln_node_app_db or DB name you change in above DB script)<\/li>\n\n\n\n<li>DATABASE_USER (E.g: vulnnodeapp or user name you change in above DB script)<\/li>\n\n\n\n<li>DATABASE_PASS (E.g: password or password you change in above DB script)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Start The Server<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#start-the-server\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Open the command prompt\/terminal and navigate to the <a href=\"http:\/\/localhost:3000\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">location <\/a>of your repository<\/li>\n\n\n\n<li>Run command:\u00a0<code>npm start<\/code><\/li>\n\n\n\n<li>Access the application <\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Vulnerability Covered<\/strong><a href=\"https:\/\/github.com\/4auvar\/VulnNodeApp#vulnerability-covered\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SQL Injection<\/li>\n\n\n\n<li>Cross Site Scripting (XSS)<\/li>\n\n\n\n<li>Insecure Direct Object Reference (IDOR)<\/li>\n\n\n\n<li>Command Injection<\/li>\n\n\n\n<li>Arbitrary File Retrieval<\/li>\n\n\n\n<li>Regular Expression Injection<\/li>\n\n\n\n<li>External XML Entity Injection (XXE)<\/li>\n\n\n\n<li>Node js Deserialization<\/li>\n\n\n\n<li>Security Misconfiguration<\/li>\n\n\n\n<li>Insecure Session Management<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only. Setup Clone This Repository Application Setup: DB Setup Set Basic Environment Variable Start The Server Vulnerability Covered<\/p>\n","protected":false},"author":12,"featured_media":33535,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43],"tags":[737,6321,6052,6325,6814],"class_list":["post-33528","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability-analysis-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-vulnnodeapp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VulnNodeApp - Exploring Web Vulnerabilities With A Node.js<\/title>\n<meta name=\"description\" content=\"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VulnNodeApp - Exploring Web Vulnerabilities With A Node.js\" \/>\n<meta property=\"og:description\" content=\"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-27T10:08:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T10:08:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"VulnNodeApp &#8211; Exploring Web Vulnerabilities With A Node.js Educational Tool\",\"datePublished\":\"2024-06-27T10:08:10+00:00\",\"dateModified\":\"2024-06-27T10:08:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\"},\"wordCount\":203,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"VulnNodeApp\"],\"articleSection\":[\"Vulnerability Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\",\"name\":\"VulnNodeApp - Exploring Web Vulnerabilities With A Node.js\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\",\"datePublished\":\"2024-06-27T10:08:10+00:00\",\"dateModified\":\"2024-06-27T10:08:12+00:00\",\"description\":\"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VulnNodeApp - Exploring Web Vulnerabilities With A Node.js","description":"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/","og_locale":"en_US","og_type":"article","og_title":"VulnNodeApp - Exploring Web Vulnerabilities With A Node.js","og_description":"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.","og_url":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-06-27T10:08:10+00:00","article_modified_time":"2024-06-27T10:08:12+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"VulnNodeApp &#8211; Exploring Web Vulnerabilities With A Node.js Educational Tool","datePublished":"2024-06-27T10:08:10+00:00","dateModified":"2024-06-27T10:08:12+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/"},"wordCount":203,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","VulnNodeApp"],"articleSection":["Vulnerability Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/","url":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/","name":"VulnNodeApp - Exploring Web Vulnerabilities With A Node.js","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","datePublished":"2024-06-27T10:08:10+00:00","dateModified":"2024-06-27T10:08:12+00:00","description":"A vulnerable application made using node.js, express server and ejs template engine. This application is meant for educational purposes only.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/vulnnodeapp\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhZiE1jQohsIu1UV0NUKrJOEJtVhlT__IbPuor6Gs8QqWgHlCL4Pu11_1SFw0KQCaiCcQmm5sADPxQ3vgGR2HTNC6NhPthJE1leLEbMAULSbnkNg_m3f2ua6HbbWniVXXlQBgAQRhR7oMNLFUp0ZZUvBX8iX2VU76sPbMonDeyrcMRSJ8KbuXRyTvHeSxWb\/s16000\/VulnNodeApp%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37305,"url":"https:\/\/kalilinuxtutorials.com\/wa-tunne\/","url_meta":{"origin":33528,"position":0},"title":"wa-tunnel &#8211; TCP Tunneling Through Whatsapp","author":"Varshini","date":"March 26, 2025","format":false,"excerpt":"wa-tunnel is an innovative tool designed to tunnel TCP data through two WhatsApp accounts, leveraging the Baileys library, which supports multi-device WhatsApp functionality. This project is particularly useful in scenarios where network carriers offer unlimited WhatsApp data, such as in certain regions or on airplanes with restricted internet access. How\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/wa-tunne.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32431,"url":"https:\/\/kalilinuxtutorials.com\/open-video-downloader\/","url_meta":{"origin":33528,"position":1},"title":"Open Video Downloader (youtube-dl-gui) : A Cross-Platform Solution For Your Video Downloading Needs","author":"Varshini","date":"March 22, 2024","format":false,"excerpt":"A cross-platform GUI for youtube-dl made in Electron and node.js. Open Video Downloader, also known as youtube-dl-gui, revolutionizes the way we download videos from the internet. This cross-platform GUI, built with Electron and Node.js, offers an intuitive interface to harness the powerful capabilities of youtube-dl. From downloading entire playlists to\u2026","rel":"","context":"In &quot;software&quot;","block_context":{"text":"software","link":"https:\/\/kalilinuxtutorials.com\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg3GNp0pE8jxn15WyfOsSU8PEIMWOWZIFs4X4GKb3kXP00V9kJtGO3iSAgLm1lmoFdN1xnBNlL1NLmY-0UkqtZrMLhGoMGrzC_oCPdidzkClE2vk7NNBcD_iQAFG41jF7SThRULYtpvdCJaTx1COf37euvyNzoiZewKnOH6bg77qStaQqQ5uugdUno027xx\/s16000\/Open%20Video%20Downloader%20%28youtube-dl-gui%29%20A%20Cross-Platform%20Solution%20For%20Your%20Video%20Downloading%20Needs.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2917,"url":"https:\/\/kalilinuxtutorials.com\/nodexp\/","url_meta":{"origin":33528,"position":2},"title":"Nodexp &#8211; A Server Side Javascript Injection Tool Capable Of Detecting &#038; Exploiting Node.js Vulnerabilities","author":"R K","date":"October 6, 2018","format":false,"excerpt":"NodeXP is an intergrated tool, written in Python 2.7, capable of detecting possible vulnerabilities on Node.js services as well as exploiting them in an automated way, based on S(erver)S(ide)J(avascript)I(njection) attack! Nodexp Getting Started - Installation & Usage Download NodeXP by cloning the Git repository: git clone https:\/\/github.com\/esmog\/nodexp To get a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":34351,"url":"https:\/\/kalilinuxtutorials.com\/cyberchef-server\/","url_meta":{"origin":33528,"position":3},"title":"CyberChef Server &#8211; A Comprehensive Guide To Setting Up And Using A CyberChef API","author":"Varshini","date":"August 8, 2024","format":false,"excerpt":"CyberChef has a useful Node.js API, but sometimes we want to be able to programmatically run CyberChef recipes in languages other than JavaScript. By running this server, you can use CyberChef operations in any language, as long as you can communicate via HTTP. Example Use Assuming you've downloaded the repository\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjUywGuKeFoH36GBscAbDfI45LJuzWCW5FxtlVggbdBxqb6dlywWym3thyd7eJoAoLGQ_qZVTjF9VNHcYZAVLtXdeFlxsDZtkXccEkFtMCkpOXUXch6rRLAUqBXtgyF1ALEWOIi8sg0kVAL2-MDGt0SpDhikBTPZI19Qu3YHJogqkDxqoL7oLfM_1pZwxJu\/s16000\/CyberChef%20server.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":22837,"url":"https:\/\/kalilinuxtutorials.com\/mininode\/","url_meta":{"origin":33528,"position":4},"title":"Mininode : A CLI Tool To Reduce The Attack Surface Of The Node.js Applications By Using Static Analysis","author":"R K","date":"March 14, 2022","format":false,"excerpt":"Mininode is a CLI tool to reduce the attack surface of the Node.js applications by using static analysis of source code. It supports two modes of reduction (1) coarse, (2) fine. Mininode constructs the dependency graph (modules and functions used) of the application starting from main file,\u00a0i.e.\u00a0entry point of the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgLyGDJSvs9XiOxTJYP6THcxA4GXiTRPLmUC3usdqGe8JErI4DcQ6eFiZ7z2sjrbFJzAmiWR-1g4N2Xta0nwVPm2BSI_QcZcIjo84YTnHNlJbFNhYS-6oaemgfy3BpQiBoEuj6iSCXC2XY7V0CKk67g03gJve8xDOTUAMCOFU7jEpwwbidRlnYPTyWk=s748","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgLyGDJSvs9XiOxTJYP6THcxA4GXiTRPLmUC3usdqGe8JErI4DcQ6eFiZ7z2sjrbFJzAmiWR-1g4N2Xta0nwVPm2BSI_QcZcIjo84YTnHNlJbFNhYS-6oaemgfy3BpQiBoEuj6iSCXC2XY7V0CKk67g03gJve8xDOTUAMCOFU7jEpwwbidRlnYPTyWk=s748 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgLyGDJSvs9XiOxTJYP6THcxA4GXiTRPLmUC3usdqGe8JErI4DcQ6eFiZ7z2sjrbFJzAmiWR-1g4N2Xta0nwVPm2BSI_QcZcIjo84YTnHNlJbFNhYS-6oaemgfy3BpQiBoEuj6iSCXC2XY7V0CKk67g03gJve8xDOTUAMCOFU7jEpwwbidRlnYPTyWk=s748 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgLyGDJSvs9XiOxTJYP6THcxA4GXiTRPLmUC3usdqGe8JErI4DcQ6eFiZ7z2sjrbFJzAmiWR-1g4N2Xta0nwVPm2BSI_QcZcIjo84YTnHNlJbFNhYS-6oaemgfy3BpQiBoEuj6iSCXC2XY7V0CKk67g03gJve8xDOTUAMCOFU7jEpwwbidRlnYPTyWk=s748 2x"},"classes":[]},{"id":27595,"url":"https:\/\/kalilinuxtutorials.com\/jscythe\/","url_meta":{"origin":33528,"position":5},"title":"Jscythe : Force Any Node.Js\/Electron\/V8 Based Process To Execute Arbitrary Javascript Code","author":"R K","date":"November 13, 2022","format":false,"excerpt":"Jscythe abuses the node.js inspector mechanism in order to force any node.js\/electron\/v8 based process to execute arbitrary javascript code, even if their debugging capabilities are disabled. Tested and working against Visual Studio Code, Discord, any Node.js application and more! How? Locate the target process. Send SIGUSR1 signal to the process,\u2026","rel":"","context":"In \"electron\"","block_context":{"text":"electron","link":"https:\/\/kalilinuxtutorials.com\/tag\/electron\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33528"}],"version-history":[{"count":6,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33528\/revisions"}],"predecessor-version":[{"id":33534,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33528\/revisions\/33534"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33535"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}