{"id":34333,"date":"2024-08-07T05:16:40","date_gmt":"2024-08-07T05:16:40","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34333"},"modified":"2024-08-07T05:16:42","modified_gmt":"2024-08-07T05:16:42","slug":"coreax","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/coreax\/","title":{"rendered":"Coreax &#8211; Revolutionizing Data Reduction With Coreset Algorithms In JAX"},"content":{"rendered":"\n<p>For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the statistical properties of the full data set. <\/p>\n\n\n\n<p>The algorithm maintains the dimension of the original data set. Thus the\u00a0m\u00a0points, referred to as the\u00a0<strong>coreset<\/strong>, are also\u00a0d-dimensional.<\/p>\n\n\n\n<p>The&nbsp;m&nbsp;points need not be in the original data set. We refer to the special case where all selected points are in the original data set as a&nbsp;<strong>coresubset<\/strong>.<\/p>\n\n\n\n<p>Some algorithms return the&nbsp;m&nbsp;points with weights, so that importance can be attributed to each point in the coreset. The weights,&nbsp;wi&nbsp;for&nbsp;i=1,&#8230;,m, are often chosen from the simplex. In this case, they are non-negative and sum to 1:&nbsp;wi&gt;0&nbsp;\u2200i&nbsp;and&nbsp;\u2211iwi=1.<\/p>\n\n\n\n<p>Please see\u00a0<a href=\"https:\/\/coreax.readthedocs.io\/en\/latest\/quickstart.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the documentation<\/a>\u00a0for some in-depth examples.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Example Applications<\/strong><a href=\"https:\/\/github.com\/gchq\/coreax#example-applications\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Choosing Pixels From An Image<\/strong><a href=\"https:\/\/github.com\/gchq\/coreax#choosing-pixels-from-an-image\"><\/a><\/h3>\n\n\n\n<p>In the example below, we reduce the original 180&#215;215 pixel image (38,700 pixels in total) to a coreset approximately 20% of this size. (Left) original image. <\/p>\n\n\n\n<p>(Centre) 8,000 coreset points chosen using Stein kernel herding, with point size a function of weight. (Right) 8,000 points chosen randomly. Run\u00a0<code>examples\/david_map_reduce_weighted.py<\/code>\u00a0to replicate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Setup<\/strong><a href=\"https:\/\/github.com\/gchq\/coreax#setup\"><\/a><\/h2>\n\n\n\n<p>Before installing coreax, make sure JAX is installed. Be sure to install the preferred version of JAX for your system.<\/p>\n\n\n\n<p>Install\u00a0<a href=\"https:\/\/jax.readthedocs.io\/en\/latest\/installation.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">JAX<\/a>\u00a0noting that there are (currently) different setup paths for CPU and GPU use:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ python3 -m pip install jax<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/gchq\/coreax\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the statistical properties of the full data set. The algorithm maintains the dimension of the original data set. Thus the\u00a0m\u00a0points, referred to as the\u00a0coreset, are also\u00a0d-dimensional. The&nbsp;m&nbsp;points need not be in the original data set. We refer to the [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34338,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38],"tags":[6881,737,6321,6052,6325],"class_list":["post-34333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","tag-coreax","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coreax - Revolutionizing Data Reduction With Coreset Algorithms<\/title>\n<meta name=\"description\" content=\"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/coreax\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coreax - Revolutionizing Data Reduction With Coreset Algorithms\" \/>\n<meta property=\"og:description\" content=\"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/coreax\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-07T05:16:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T05:16:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Coreax &#8211; Revolutionizing Data Reduction With Coreset Algorithms In JAX\",\"datePublished\":\"2024-08-07T05:16:40+00:00\",\"dateModified\":\"2024-08-07T05:16:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/\"},\"wordCount\":256,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\",\"keywords\":[\"Coreax\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/coreax\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/coreax\/\",\"name\":\"Coreax - Revolutionizing Data Reduction With Coreset Algorithms\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\",\"datePublished\":\"2024-08-07T05:16:40+00:00\",\"dateModified\":\"2024-08-07T05:16:42+00:00\",\"description\":\"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/coreax\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coreax - Revolutionizing Data Reduction With Coreset Algorithms","description":"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/coreax\/","og_locale":"en_US","og_type":"article","og_title":"Coreax - Revolutionizing Data Reduction With Coreset Algorithms","og_description":"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the","og_url":"https:\/\/kalilinuxtutorials.com\/coreax\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-08-07T05:16:40+00:00","article_modified_time":"2024-08-07T05:16:42+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/coreax\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/coreax\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Coreax &#8211; Revolutionizing Data Reduction With Coreset Algorithms In JAX","datePublished":"2024-08-07T05:16:40+00:00","dateModified":"2024-08-07T05:16:42+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/coreax\/"},"wordCount":256,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","keywords":["Coreax","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/coreax\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/coreax\/","url":"https:\/\/kalilinuxtutorials.com\/coreax\/","name":"Coreax - Revolutionizing Data Reduction With Coreset Algorithms","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","datePublished":"2024-08-07T05:16:40+00:00","dateModified":"2024-08-07T05:16:42+00:00","description":"For\u00a0n\u00a0points in\u00a0d\u00a0dimensions, a coreset algorithm takes an\u00a0n\u00d7d\u00a0data set and reduces it to\u00a0m\u226an\u00a0points whilst attempting to preserve the","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/coreax\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/coreax\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiat7N0rQrJr28uBcqwFitegEaZxmEp6eBe1HHCz3k0DiO3VPM2548mzwIpro2-3xR50twdRv8cSxomTtic4KVxPzG0aNeWdqK1tWBdr5nzjzsnseHxdImAmDHRj_DllP0h0D4Bx5jY4uxlcfVn9HiGbssSuiYuF0YBVD6VOYfcXY43nfULkBbhy1P7DL_A\/s16000\/Coreax%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1688,"url":"https:\/\/kalilinuxtutorials.com\/wifijammer-wi-fi-clients-routers\/","url_meta":{"origin":34333,"position":0},"title":"WiFiJammer &#8211; Continuously Jam All Wi-Fi Clients\/Routers","author":"R K","date":"June 21, 2018","format":false,"excerpt":"WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. It requires\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2694,"url":"https:\/\/kalilinuxtutorials.com\/hashpump-tool-exploit-hash-length\/","url_meta":{"origin":34333,"position":1},"title":"HashPump &#8211; Tool To Exploit Hash Length Extension Attack In Various Hashing Algorithms","author":"R K","date":"September 18, 2018","format":false,"excerpt":"HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump [-h help] [-t test] [-s signature] [-d data] [-a additional] [-k keylength] HashPump generates strings to exploit signatures vulnerable to the Hash Length\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3284,"url":"https:\/\/kalilinuxtutorials.com\/hassh-client-server-ssh\/","url_meta":{"origin":34333,"position":2},"title":"Hassh : Tool Used To Identify Specific Client &#038; Server SSH Implementations","author":"R K","date":"November 26, 2018","format":false,"excerpt":"HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored, searched and shared in the form of a small MD5 fingerprint. Also ReadWebMap : Nmap Web Dashboard and Reporting HASSH help with? Use in highly controlled,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":17773,"url":"https:\/\/kalilinuxtutorials.com\/pantagrule\/","url_meta":{"origin":34333,"position":3},"title":"Pantagrule : Large Hashcat Rulesets Generated From Real-World Compromised Passwords","author":"R K","date":"September 14, 2021","format":false,"excerpt":"Pantagrule is a series of rules for the\u00a0hashcat\u00a0password cracker generated from large amounts of real-world password compromise data. While Pantagrule rule files can be large, the rules are both tunable and perform better than many existing rule sets. Pantagrule was generated using\u00a0PACK's Levenshtein Reverse Path algorithm for automated rule generation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-JnlYPR8UtRY\/YTBO5PURDCI\/AAAAAAAAKo0\/0-mgMmxw1MUY8YkKOuczpByNXuWukMLugCLcBGAsYHQ\/s992\/download%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-JnlYPR8UtRY\/YTBO5PURDCI\/AAAAAAAAKo0\/0-mgMmxw1MUY8YkKOuczpByNXuWukMLugCLcBGAsYHQ\/s992\/download%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-JnlYPR8UtRY\/YTBO5PURDCI\/AAAAAAAAKo0\/0-mgMmxw1MUY8YkKOuczpByNXuWukMLugCLcBGAsYHQ\/s992\/download%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-JnlYPR8UtRY\/YTBO5PURDCI\/AAAAAAAAKo0\/0-mgMmxw1MUY8YkKOuczpByNXuWukMLugCLcBGAsYHQ\/s992\/download%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":18737,"url":"https:\/\/kalilinuxtutorials.com\/weakpass\/","url_meta":{"origin":34333,"position":4},"title":"Weakpass : Rule-Based Online Generator To Create A Wordlist Based On A Set Of Words","author":"R K","date":"September 29, 2021","format":false,"excerpt":"Weakpass is a tool generates a wordlist based on a set of words entered by the user. For example, during penetration testing, you need to gain access to some service, device, account, or Wi-Fi network that is password protected. For example, let it be the\u00a0Wi-Fi\u00a0network of\u00a0EvilCorp. Sometimes, a password is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-BWRM8X6n6K0\/YUyHq8xPzcI\/AAAAAAAAK7o\/O6TId533uS8R4GnxO1MNhXlNK2EvZP4BwCLcBGAsYHQ\/s728\/weakpass_1_sample%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-BWRM8X6n6K0\/YUyHq8xPzcI\/AAAAAAAAK7o\/O6TId533uS8R4GnxO1MNhXlNK2EvZP4BwCLcBGAsYHQ\/s728\/weakpass_1_sample%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-BWRM8X6n6K0\/YUyHq8xPzcI\/AAAAAAAAK7o\/O6TId533uS8R4GnxO1MNhXlNK2EvZP4BwCLcBGAsYHQ\/s728\/weakpass_1_sample%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-BWRM8X6n6K0\/YUyHq8xPzcI\/AAAAAAAAK7o\/O6TId533uS8R4GnxO1MNhXlNK2EvZP4BwCLcBGAsYHQ\/s728\/weakpass_1_sample%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37703,"url":"https:\/\/kalilinuxtutorials.com\/networking-devices-101\/","url_meta":{"origin":34333,"position":5},"title":"Networking Devices 101: Understanding Routers, Switches, Hubs, and More","author":"Tamilselvan S","date":"September 10, 2025","format":false,"excerpt":"What is Networking? Networking brings together devices like computers, servers, routers, and switches so they can interact smoothly. It plays a key role in enabling fast communication and reliable data exchange between users and systems. With the help of networks, people can easily share resources such as files, printers, or\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/kalilinuxtutorials.com\/category\/tuts\/"},"img":{"alt_text":"Networking 101","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/Bash-Functions-2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34333"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34333\/revisions"}],"predecessor-version":[{"id":34337,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34333\/revisions\/34337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34338"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}