{"id":33883,"date":"2024-07-18T14:54:16","date_gmt":"2024-07-18T14:54:16","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=33883"},"modified":"2024-07-18T14:54:17","modified_gmt":"2024-07-18T14:54:17","slug":"project-horus","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/project-horus\/","title":{"rendered":"Project Horus &#8211; The Comprehensive Toolkit For Investigation Assistance"},"content":{"rendered":"\n<p>Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. <\/p>\n\n\n\n<p>This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow. <\/p>\n\n\n\n<p>Whether you&#8217;re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Table of Contents<\/h1>\n\n\n\n<p><a href=\"https:\/\/github.com\/6abd\/horus?tab=readme-ov-file#table-of-contents\"><\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\ud83d\ude80 About Horus<\/li>\n\n\n\n<li>\u26a1 Installation and Usage Instructions<\/li>\n\n\n\n<li>\u2699\ufe0f API Configuration<\/li>\n\n\n\n<li>\ud83d\udd2e Intended Features<\/li>\n\n\n\n<li>\ud83e\udd1d Current Maintainers<\/li>\n\n\n\n<li>\ud83d\udee0\ufe0f Contributing<\/li>\n\n\n\n<li>\ud83d\udce7 Contact Me<\/li>\n\n\n\n<li>\ud83e\udd1d Acknowledgements<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\ude80 About Horus<\/strong><\/h2>\n\n\n\n<p>Horus is an all-in-one encompassing tool for investigations assistance, from API leveraging to compiling data too. Its your pre-ops buddy!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u26a1 Installation And Usage Instructions<\/strong><a href=\"https:\/\/github.com\/6abd\/horus?tab=readme-ov-file#-installation-and-usage-instructions\"><\/a><\/h2>\n\n\n\n<p>To get started with this project, you will need Python installed on your device. Once it is installed, follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Clone this repository.<\/li>\n\n\n\n<li><code>cd<\/code>\u00a0to the &#8216;horus&#8217; directory. (Make sure it isn&#8217;t the outermost folder)<\/li>\n\n\n\n<li>Install dependencies using the following command:\u00a0<code>pip install -r requirements.txt<\/code><\/li>\n\n\n\n<li>In the &#8216;horus&#8217; directory, run\u00a0<code>python3 horus.py<\/code>\u00a0on Linux\/MacOS, or\u00a0<code>py horus.py<\/code>\u00a0on Windows<\/li>\n<\/ol>\n\n\n\n<p>Note: protonvpn-cli is a requirement for the &#8216;pvpn&#8217; command<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u2699\ufe0f API Configuration<\/strong><a href=\"https:\/\/github.com\/6abd\/horus?tab=readme-ov-file#%EF%B8%8F-api-configuration\"><\/a><\/h2>\n\n\n\n<p>To configure the APIs necessary for usage of certain commands, you can either manually enter them, or use the &#8216;apicon&#8217; command<\/p>\n\n\n\n<p>To manually configure API keys, navigate to&nbsp;<code>\/src\/modules\/var\/pipes\/api_config.json<\/code>. Enter your API keys in their corresponding entries.<\/p>\n\n\n\n<p>\u26a0\ufe0f\u00a0Warning: If you are contributing to this repository or are testing it through a public fork, make sure to remove your API keys from the JSON file before pushing changes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\ud83d\udd2e Intended Features<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>\ud83d\udfe2 = Fully implemented or more than 80% done\n\n\ud83d\udfe1 = Partially implemented \/ In development\n\n\ud83d\udd34 = To be implemented<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/6abd\/horus?tab=readme-ov-file#-installation-and-usage-instructions\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages advanced APIs and data compilation strategies to streamline your investigative workflow. Whether you&#8217;re a security professional or a tech enthusiast, Horus equips you with the necessary tools to elevate your analytical capabilities. Table of Contents \ud83d\ude80 About Horus Horus is [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":33887,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6849],"class_list":["post-33883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-project-horus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Project Horus - The Comprehensive Toolkit For Investigation Assistance<\/title>\n<meta name=\"description\" content=\"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/project-horus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Project Horus - The Comprehensive Toolkit For Investigation Assistance\" \/>\n<meta property=\"og:description\" content=\"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/project-horus\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-18T14:54:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T14:54:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Project Horus &#8211; The Comprehensive Toolkit For Investigation Assistance\",\"datePublished\":\"2024-07-18T14:54:16+00:00\",\"dateModified\":\"2024-07-18T14:54:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/\"},\"wordCount\":240,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Project Horus\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/project-horus\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/\",\"name\":\"Project Horus - The Comprehensive Toolkit For Investigation Assistance\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\",\"datePublished\":\"2024-07-18T14:54:16+00:00\",\"dateModified\":\"2024-07-18T14:54:17+00:00\",\"description\":\"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/project-horus\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Project Horus - The Comprehensive Toolkit For Investigation Assistance","description":"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/project-horus\/","og_locale":"en_US","og_type":"article","og_title":"Project Horus - The Comprehensive Toolkit For Investigation Assistance","og_description":"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages","og_url":"https:\/\/kalilinuxtutorials.com\/project-horus\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-07-18T14:54:16+00:00","article_modified_time":"2024-07-18T14:54:17+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Project Horus &#8211; The Comprehensive Toolkit For Investigation Assistance","datePublished":"2024-07-18T14:54:16+00:00","dateModified":"2024-07-18T14:54:17+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/"},"wordCount":240,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Project Horus"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/project-horus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/","url":"https:\/\/kalilinuxtutorials.com\/project-horus\/","name":"Project Horus - The Comprehensive Toolkit For Investigation Assistance","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","datePublished":"2024-07-18T14:54:16+00:00","dateModified":"2024-07-18T14:54:17+00:00","description":"Project Horus, your ultimate pre-operations tool tailored for enhancing investigation processes. This comprehensive toolkit leverages","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/project-horus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/project-horus\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh_iQH0usVxqDvDVJsHRSu5ZwuEg2pnYAwbDhU1ZwE-PIuGXZXnslqoU84aCKXOr1I9GmzhJThgtvqXPOqkEO7UkvpFLS87F7bsQn3CiyqWGd92frlGbgLyUup4yfdT9HMlWDQurd5mYKo4tgJxQFEIbSPl_OpJeGMv-jZ4Q5yOkVYMy7iquCFRi_1JfO9D\/s16000\/Project%20Horus%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":33078,"url":"https:\/\/kalilinuxtutorials.com\/osint-inception-links\/","url_meta":{"origin":33883,"position":0},"title":"OSINT Inception | Links : Your Gateway To Open-Source Intelligence Resources","author":"Varshini","date":"May 15, 2024","format":false,"excerpt":"Explore the comprehensive world of Open-Source Intelligence (OSINT) with our curated list of active links from the OSINT Inception project. This resource guide is designed to assist professionals and enthusiasts in navigating through an extensive array of tools and databases tailored for various investigative needs. Whether you're searching for specific\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEih_U8tSg8G1O-7o9ynlFpV4jll_uVcvr86pOshSGaf2DE6Xy8McO1EQDwbAK80HWQYxLsdeeVRiqAcI2WGggvKq90fDNE65E6GZtE4fr5jJ9CPOkYaOZJxdTBHyNswGd_ZUsQ1W5-pswuqXfCKGEwuklxdAmeirhVgMCJDnUPJA4muQADcAqvROQyFAFTX\/s16000\/OSINT%20Inception%20Links%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32774,"url":"https:\/\/kalilinuxtutorials.com\/hacking-toolkit\/","url_meta":{"origin":33883,"position":1},"title":"Hacking-Toolkit : The Ultimate Suite For Network Security And Penetration Testing","author":"Varshini","date":"April 16, 2024","format":false,"excerpt":"Developed an integrated suite of network security and penetration testing tools using Python. This toolkit aims to provide cybersecurity professionals and ethical hackers with a comprehensive set of utilities to perform network analysis, security audits, and penetration testing. The tools are designed with an emphasis on simplicity, efficiency, and effectiveness,\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEglCFaQJ0SzOZi0RygW2vrwbfxBzQCNei2OYI-2st02KY8sC-Kb2d1TKiEVn8N93feOMDBq47sVZ906JIUh6mqArRJFadGMOgqQ1Jlnh60ou77Su6sB7WLY9vgxOuX6n9IZWASDb6O8FeMu4b3HvpwJVIz4RFojkbzJBzIC9ax_lHD-VyRJaRWt1Z1XNDzf\/s16000\/Hacking-Toolkit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33139,"url":"https:\/\/kalilinuxtutorials.com\/osint\/","url_meta":{"origin":33883,"position":2},"title":"OSINT &#8211; Comprehensive Toolkit With Docker To Enhance Your Cyber Security Using Vault Security&#8217;s Image","author":"Varshini","date":"May 21, 2024","format":false,"excerpt":"Open Source Intelligence (OSINT) involves gathering and analyzing publicly available information for security purposes. Vault Cyber Security offers a Docker image packed with essential OSINT tools to streamline and enhance your investigative capabilities. This article explores the diverse range of tools included in the image, making it easier for professionals\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhifG3FoC2yoAToDqTVKCkxBwkahTxkUpWedPwF67Q2elT6FXjBa9nnU63_Vw7xcUYu4tO7D9R9HECD749AE3iOs3xMwkye6gne-iie31nhzcYFF4yz4mETXNFSUoV9UQnxSS6uc8ZSl8DvEOD8reRPw8bVUMA_RSeAE4ZdBJDBV8UthcUZzafGguUChkYG\/s16000\/OSINT%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33186,"url":"https:\/\/kalilinuxtutorials.com\/computer-forensics\/","url_meta":{"origin":33883,"position":3},"title":"Computer Forensics : Exploring The Tools Of The Trade &#8211; A Comprehensive Guide","author":"Varshini","date":"June 3, 2024","format":false,"excerpt":"Computer forensics is an essential field that involves the investigation of digital devices to uncover evidence in various scenarios, including criminal activities and corporate disputes. This article provides a curated list of top-notch free tools and resources that are crucial for anyone involved in the forensic analysis of computers. From\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh8ga6z5wFoaiA_KrO5N9MTQTQXB5trqLEVMNnvy0fSlyGzG9iTmuGv8BxG-BJkFX_xJikdhAKR1nqYXDfg0yoFR8MsnpipdRMzG28TzRHgzlCg9w-XtNqGvkMMYIMeme5NFHeiXLRh6YlFLgTYtYgmCQTz_OAf17dF-5vnl5cx4BYQ4e7Cc-aVjZp_eef_\/s16000\/Forensics%20Tools%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33180,"url":"https:\/\/kalilinuxtutorials.com\/mvt\/","url_meta":{"origin":33883,"position":4},"title":"Mobile Verification Toolkit (MVT) &#8211; A Forensic Tool For Investigating Spyware On Mobile Devices","author":"Varshini","date":"May 23, 2024","format":false,"excerpt":"Mobile Verification Toolkit (MVT) is a collection of utilities to simplify and automate the process of gathering forensic traces helpful to identify a potential compromise of Android and iOS devices. It has been developed and released by the\u00a0Amnesty International Security Lab\u00a0in July 2021 in the context of the\u00a0Pegasus Project\u00a0along with\u00a0a\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj0_iM9xETxfU5urAr3r_nV_VIQ80k82hpNuYOrhOG48F-cQnhlqQntte67rw4-_0mtatQfgAYjG_V_OkIIweGQQQworidTeJ14RryIXPDGG6oC3di5CX_dWSlq-KgL53OpeuZAsmsYYofRLSmyoEQI0b_vHZHs_oDbHepMxI0OLDxrWkPsfGT1KraQkG3O\/s16000\/MVT%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34382,"url":"https:\/\/kalilinuxtutorials.com\/tca\/","url_meta":{"origin":33883,"position":5},"title":"TCA &#8211; A Comprehensive Toolkit For Code Analysis And Quality Assurance","author":"Varshini","date":"August 12, 2024","format":false,"excerpt":"Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigG0igD0lqIRwwJfjCwZf0deJ17ukuLo0BVe172PKd_oms-_10EK0tsl8BYEM1Xo9cLhwbEQ2x3FoKNcxUAJtlDX1PqvUsodmHFd3npWP9twaODbRzVKnlYEaJ51UouQGcEE6l2KW_VBvB3s55_aiUM3a0YEJuCnImgb8YgZ_taInOOZMLJInfL6dL1raf\/s16000\/TCA%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=33883"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33883\/revisions"}],"predecessor-version":[{"id":33889,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/33883\/revisions\/33889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/33887"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=33883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=33883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=33883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}