{"id":33643,"date":"2024-07-04T05:46:18","date_gmt":"2024-07-04T05:46:18","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33643"},"modified":"2024-07-04T05:46:18","modified_gmt":"2024-07-04T05:46:18","slug":"aws-cdk-cloud-development-kit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/","title":{"rendered":"AWS CDK &#8211; Cloud Development Kit"},"content":{"rendered":"\n<p><a href=\"https:\/\/aws.amazon.com\/cdk\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">AWS CDK<\/a>\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. <\/p>\n\n\n\n<p>It provides high-level components called constructs that preconfigure cloud resources with proven defaults, so you can build cloud applications with ease.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"prerequisites\"><strong>Prerequisites<a href=\"https:\/\/madhuakula.com\/kubernetes-goat\/docs\/how-to-run\/kubernetes-goat-on-aws-ec2-kind-cdk#prerequisites\">\u200b<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>You have\u00a0<code>python3<\/code>\u00a0installed and setup locally in your system path,\u00a0<a href=\"https:\/\/www.python.org\/doc\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">refer to the docs for installation<\/a><\/li>\n\n\n\n<li>You have installed and configured the AWS CDK locally<\/li>\n\n\n\n<li>Ensure you have all the required AWS permission and configuration locally<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"setup\"><strong>Setup<a href=\"https:\/\/madhuakula.com\/kubernetes-goat\/docs\/how-to-run\/kubernetes-goat-on-aws-ec2-kind-cdk#setup\">\u200b<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>First, clone the Kubernetes Goat repository locally by running the following command<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/madhuakula\/kubernetes-goat.git<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Navigate to the folder for setup and installation of the Kubernetes Goat using KiND<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>cd kubernetes-goat\/platforms\/aws-kind-ec2-cdk<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Create a virtualenv (Assume you already have installed Python3 and it&#8217;s available in the path)<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 -m venv .venv<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Activate your\u00a0<code>virtualenv<\/code>\u00a0in MacOS &amp; Linux<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>source .venv\/bin\/activate<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you are a Windows platform, you would activate the\u00a0<code>virtualenv<\/code>\u00a0by running following command<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>% .venv\\Scripts\\activate.bat<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level components called constructs that preconfigure cloud resources with proven defaults, so you can build cloud applications with ease. Prerequisites\u200b Setup\u200b<\/p>\n","protected":false},"author":12,"featured_media":33645,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38,40,41],"tags":[737,6321,6052,6325],"class_list":["post-33643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","category-tech","category-tuts","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AWS CDK - Cloud Development Kit<\/title>\n<meta name=\"description\" content=\"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AWS CDK - Cloud Development Kit\" \/>\n<meta property=\"og:description\" content=\"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-04T05:46:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"AWS CDK &#8211; Cloud Development Kit\",\"datePublished\":\"2024-07-04T05:46:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\"},\"wordCount\":142,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"software\",\"TECH\",\"Tutorials\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\",\"name\":\"AWS CDK - Cloud Development Kit\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\",\"datePublished\":\"2024-07-04T05:46:18+00:00\",\"description\":\"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AWS CDK - Cloud Development Kit","description":"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/","og_locale":"en_US","og_type":"article","og_title":"AWS CDK - Cloud Development Kit","og_description":"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level","og_url":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-04T05:46:18+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"AWS CDK &#8211; Cloud Development Kit","datePublished":"2024-07-04T05:46:18+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/"},"wordCount":142,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["software","TECH","Tutorials"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/","url":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/","name":"AWS CDK - Cloud Development Kit","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","datePublished":"2024-07-04T05:46:18+00:00","description":"AWS CDK\u00a0uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/aws-cdk-cloud-development-kit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjQIDQOVmETNBOHbIaXnyZwBzfTKBAeELGPQjkzJE2_m7GnGTuNHU4WMj3yqZ4JHe8oApA2nddv0S-k4DhhN_ZlAdFW1fU9V3u2WrVxaqHJSwIC-4lqQeBLgrY5iOqT3IC-Von1MVq7qQExsfhs1RFmzGie_TGwgMvFNQ9vgAEsa-I_Q8uODuhE9KQbFWYQ\/s16000\/AWS%20CDK%20-%20Cloud%20Development%20Kit.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6530,"url":"https:\/\/kalilinuxtutorials.com\/grapl-graph-platform-for-detection-and-response\/","url_meta":{"origin":33643,"position":0},"title":"Grapl : Graph platform for Detection and Response","author":"R K","date":"September 18, 2019","format":false,"excerpt":"Grapl is a Graph Platform for Detection and Response. In short, Grapl will take raw logs, convert them into graphs, and merge those graphs into a Master Graph. It will then orchestrate the execution of your attack signatures and provide tools for performing your investigations. Grapl supports nodes for: Processes\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34103,"url":"https:\/\/kalilinuxtutorials.com\/sleeper\/","url_meta":{"origin":33643,"position":1},"title":"Sleeper &#8211; Revolutionizing Data Management With Serverless, Scalable Key-Value Stores","author":"Varshini","date":"August 2, 2024","format":false,"excerpt":"Sleeper is a serverless, cloud-native, log-structured merge tree based, scalable key-value store. It is designed to allow the ingest of very large volumes of data at low cost. Data is stored in rows in tables. Each row has a key field, and an optional sort field, and some value fields.\u2026","rel":"","context":"In &quot;Database Assessment&quot;","block_context":{"text":"Database Assessment","link":"https:\/\/kalilinuxtutorials.com\/category\/dba\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8jT-RG-sxG6vDAGA64R7X7f9bKJXOmiTuDHiCIDWrlubfd5-zgdSURHQWHZ14JXKG9rzyIHQw7WhtV3RhRwjFNh_mrkzc0dWBCFdkWKIofBfoSJ4mD1qj73pJS4advWo_ECUpQn0fOW9hYgUsJqIw__eXx48ryDqzcVWZjf004tTCXK_M57tKvcEtbFmx\/s16000\/Sleeper.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36251,"url":"https:\/\/kalilinuxtutorials.com\/hyperswitch\/","url_meta":{"origin":33643,"position":2},"title":"Hyperswitch : Revolutionizing Digital Payments With Open-Source Flexibility","author":"Varshini","date":"February 10, 2025","format":false,"excerpt":"Juspay, a leader in payment orchestration since 2012, has introduced Hyperswitch, an open-source payments platform designed to simplify global payments for digital businesses. Hyperswitch empowers merchants and brands with a modular, enterprise-grade solution to optimize their payment infrastructure. Key Components Of Hyperswitch Hyperswitch Backend:The backend facilitates seamless payment processing by\u2026","rel":"","context":"In &quot;software&quot;","block_context":{"text":"software","link":"https:\/\/kalilinuxtutorials.com\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Hyperswitch-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33631,"url":"https:\/\/kalilinuxtutorials.com\/aws-amazon-web-services\/","url_meta":{"origin":33643,"position":3},"title":"\u00a0AWS &#8211; Amazon Web Services","author":"Varshini","date":"July 3, 2024","format":false,"excerpt":"Elastic Kubernetes Service (EKS)\u00a0is a managed kubernetes offering by AWS. Discover how to harness the power of Amazon Web Services (AWS) to deploy a robust, scalable Kubernetes environment. This tutorial guides you through setting up an EKS cluster, configuring essential tools like eksctl, kubectl, and awscli, and deploying the Kubernetes\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjippQZAjatP-xQ7mNOD4VshNcq4zgpcLGNZOtQdoHZIhaNkfqUIZraM3-UAjZ9Gx3YzQjdS_6YNU-ZedyUhibXDjMtJqIn01UEC9VVs6ZXQ39nI75M_6fL0ytJIbSv72LHtkqt0qSarlJGjxrUVmVC9DOblIXqOgM0zhGGr_abbMXb3qaHTMGQbS4v6ezi\/s16000\/_AWS%20-%20Amazon%20Web%20Services.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32256,"url":"https:\/\/kalilinuxtutorials.com\/cloudgrappler\/","url_meta":{"origin":33643,"position":4},"title":"CloudGrappler &#8211; Elevating Cloud Security In AWS And Azure","author":"Varshini","date":"March 11, 2024","format":false,"excerpt":"CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known threat actors in popular cloud environments such as AWS and Azure. Notes To optimize your utilization of CloudGrappler, we recommend using shorter time ranges when querying for results. This approach enhances efficiency and\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjohyoEj5sfvU7tLq4tYOQf1yAAEo8uTRa5cRAHuJpKwuxRaghY8Hgp9lFXt71UoVws9ID18AImeK55PR_N3qydfURUz1sn4D9qWMXGSy1uBEgD4LrwzQuvb4iet0sjmwBdxCmSAcVBE2AJHDUZgOEIApTb6jAUsoQPPBcZliHg-0ugf2bznqgiN1FJ3UiK\/s16000\/Awesome%20AppSec%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11267,"url":"https:\/\/kalilinuxtutorials.com\/skyark\/","url_meta":{"origin":33643,"position":5},"title":"SkyArk : A Cloud Security Project With Two Main Scanning Modules","author":"R K","date":"August 20, 2020","format":false,"excerpt":"SkyArk is a cloud security project with two main scanning modules: AzureStealth - Scans Azure environmentsAWStealth - Scan AWS environments These two scanning modules will discover the most privileged entities in the target AWS and Azure. The Main Goal - Discover The Most Privileged Cloud Users It currently focuses on\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33643"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33643\/revisions"}],"predecessor-version":[{"id":33644,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33643\/revisions\/33644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33645"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}