{"id":34986,"date":"2024-09-27T06:36:20","date_gmt":"2024-09-27T06:36:20","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34986"},"modified":"2024-09-27T06:36:23","modified_gmt":"2024-09-27T06:36:23","slug":"gshark","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/gshark\/","title":{"rendered":"GShark &#8211; A Comprehensive Guide To Sensitive Information Management System Deployment"},"content":{"rendered":"\n<p>The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to <a href=\"https:\/\/mp.weixin.qq.com\/mp\/appmsgalbum?__biz=MzI3MjA3MTY3Mw==&amp;action=getalbum&amp;album_id=2376148333116850178#wechat_redirect\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">articles<\/a> and <a href=\"https:\/\/mp.weixin.qq.com\/mp\/appmsgalbum?__biz=MzI3MjA3MTY3Mw==&amp;action=getalbum&amp;album_id=1834365721464651778#wechat_redirect\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">videos<\/a>. For now, all the scans are only targeted to the public environments, not local environments.<\/p>\n\n\n\n<p>For the usage of GShark, please refer to the <a href=\"https:\/\/github.com\/madneal\/gshark\/wiki\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">wiki<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Features<\/strong><a href=\"https:\/\/github.com\/madneal\/gshark#features\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Support multiple platforms, such as GitLab, GitHub, Searchcode, and Postman<\/li>\n\n\n\n<li>Flexible menu and API permission settings<\/li>\n\n\n\n<li>Flexible rules and filtering rules<\/li>\n\n\n\n<li>Utilize gobuster for subdomain brute force<\/li>\n\n\n\n<li>Easy-to-use management system<\/li>\n\n\n\n<li>Support for Docker deployment<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Quick Start<\/strong><a href=\"https:\/\/github.com\/madneal\/gshark#quick-start\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Docker<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/madneal\/gshark\ncd gshark\ndocker-compose build &amp;&amp; docker-compose up <\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Manual Deployment<\/strong><a href=\"https:\/\/github.com\/madneal\/gshark#manual-deployment\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Requirements<\/strong><a href=\"https:\/\/github.com\/madneal\/gshark#requirements\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nginx<\/li>\n\n\n\n<li>MySQL(version above <strong>8.0<\/strong>)<\/li>\n<\/ul>\n\n\n\n<p>It is recommended to deploy the Front-End project using nginx. Place the <code>dist<\/code> folder in <code>\/var\/www\/html<\/code>, and adjust the <code>nginx.conf<\/code> file (\/etc\/nginx\/nginx.conf for Linux) to set up reverse proxy for the backend service. For detailed deployment tutorials, you can watch videos on <a href=\"https:\/\/www.bilibili.com\/video\/BV1Py4y1s7ap\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">bilibili<\/a> or <a href=\"https:\/\/youtu.be\/bFrKm5t4M54\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">youtube<\/a>. For deployment on Windows, refer to <a href=\"https:\/\/www.bilibili.com\/video\/BV1CA411L7ux\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">this link<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Nginx<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/madneal\/gshark#nginx\"><\/a>Can use <code>nginx -t<\/code> to locate the <code>nginx.conf<\/code> file, then modify the <code>nginx.conf<\/code>:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/\/ config the user accoring to your need\nuser  www www;\nworker_processes  1;\n\nevents {\n    worker_connections  1024;\n}\n\nhttp {\n    include       mime.types;\n    default_type  application\/octet-stream;\n    sendfile        on;\n    keepalive_timeout  65;\n    server {\n        listen       8080;\n        server_name  localhost;\n\n        location \/ {\n            autoindex on;\n            root   html;\n            index  index.html index.htm;\n        }\n        location \/api\/ {\n            proxy_set_header Host $http_host;\n            proxy_set_header X-Real-IP $remote_addr;\n            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;\n            proxy_set_header X-Forwarded-Proto $scheme;\n            rewrite ^\/api\/(.*)$ \/$1 break;\n            proxy_pass http:\/\/127.0.0.1:8888;\n        }\n        error_page   500 502 503 504  \/50x.html;\n        location = \/50x.html {\n            root   html;\n        }\n    }\n    include servers\/*;\n}<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/madneal\/gshark#run\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please refer to articles and videos. For now, all the scans are only targeted to the public environments, not local environments. For the usage of GShark, please refer to the wiki. Features Quick Start [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34991,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25],"tags":[737,6943,6321,6052,6325],"class_list":["post-34986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","tag-cybersecurity","tag-gshark","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GShark - A Comprehensive Guide To Sensitive Information<\/title>\n<meta name=\"description\" content=\"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/gshark\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GShark - A Comprehensive Guide To Sensitive Information\" \/>\n<meta property=\"og:description\" content=\"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/gshark\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-27T06:36:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-27T06:36:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"GShark &#8211; A Comprehensive Guide To Sensitive Information Management System Deployment\",\"datePublished\":\"2024-09-27T06:36:20+00:00\",\"dateModified\":\"2024-09-27T06:36:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/\"},\"wordCount\":176,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\",\"keywords\":[\"cybersecurity\",\"GShark\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gshark\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/gshark\/\",\"name\":\"GShark - A Comprehensive Guide To Sensitive Information\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\",\"datePublished\":\"2024-09-27T06:36:20+00:00\",\"dateModified\":\"2024-09-27T06:36:23+00:00\",\"description\":\"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/gshark\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GShark - A Comprehensive Guide To Sensitive Information","description":"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/gshark\/","og_locale":"en_US","og_type":"article","og_title":"GShark - A Comprehensive Guide To Sensitive Information","og_description":"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please","og_url":"https:\/\/kalilinuxtutorials.com\/gshark\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-09-27T06:36:20+00:00","article_modified_time":"2024-09-27T06:36:23+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/gshark\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/gshark\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"GShark &#8211; A Comprehensive Guide To Sensitive Information Management System Deployment","datePublished":"2024-09-27T06:36:20+00:00","dateModified":"2024-09-27T06:36:23+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gshark\/"},"wordCount":176,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","keywords":["cybersecurity","GShark","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/gshark\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/gshark\/","url":"https:\/\/kalilinuxtutorials.com\/gshark\/","name":"GShark - A Comprehensive Guide To Sensitive Information","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","datePublished":"2024-09-27T06:36:20+00:00","dateModified":"2024-09-27T06:36:23+00:00","description":"The project is based on Go and Vue to build a management system for sensitive information detection. For the full introduction, please","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/gshark\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/gshark\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEghdYGQrtcpNYNEZ_Ls80cCDeXOH93FwTGiS6rX97wRWlRYl-ujB_UbxIKCkW9Fmj0uclwU99JfcPXVu-daplMOBu3bepTrLfAPo3pZRDFrV2lSxvevEXWG6pqnzWo5MrPEu0P-vJNVqvhORw3IT2q3WYR1lZrVA74CDAgzOFAccsNm-Oz3AjWdr4NA_7dZ\/s1600\/GShark%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35699,"url":"https:\/\/kalilinuxtutorials.com\/vermilion\/","url_meta":{"origin":34986,"position":0},"title":"Vermilion : Mastering Linux Post-Exploitation For Red Team Success","author":"Varshini","date":"January 17, 2025","format":false,"excerpt":"Vermilion is a simple and lightweight CLI tool designed for rapid collection, and optional exfiltration of sensitive information from Linux systems.Its primary purpose is to streamline the process of gathering critical data in red teaming scenarios. How It Works Vermilion is a Linux-focused tool designed for efficient information gathering and\u2026","rel":"","context":"In &quot;Post Exploitation&quot;","block_context":{"text":"Post Exploitation","link":"https:\/\/kalilinuxtutorials.com\/category\/pe\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Vermilion-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":38539,"url":"https:\/\/kalilinuxtutorials.com\/how-openclaw-works\/","url_meta":{"origin":34986,"position":1},"title":"How OpenClaw Works","author":"0xSnow","date":"February 25, 2026","format":false,"excerpt":"Imagine if you had a super-powered assistant who could automatically handle all the boring, repetitive tasks you dread without coffee breaks or complaints. Enter OpenClaw, the ultimate automation framework that does just that, but without the shiny cape. Whether it\u2019s dealing with real-time data, responding to human triggers, or even\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"How OpenClaw Works","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj62szzHPD6aXdlKXNAI7YcDpuE3ajdpxdb8wtuFUks0vEoMOi7xoJpLfT-PfpqUuVOM9MLIWN55jyUu_WzJsEW0CFt7LBQelvASrWLLbKFSo_fRtJz3OXDMeB7fSyXIY0EwUUgEAby_JyB3UKg8SjwE0BTzPVrFnAsbaCfsEp5ImGudDWC8wyvnPXuKk4\/s1536\/how%20open%20claw%20works.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35967,"url":"https:\/\/kalilinuxtutorials.com\/tabby\/","url_meta":{"origin":34986,"position":2},"title":"Tabby : Your Open-Source AI Coding Assistant","author":"Varshini","date":"January 31, 2025","format":false,"excerpt":"Tabby is an innovative, self-hosted AI coding assistant designed to provide developers with an open-source and on-premises alternative to proprietary tools like GitHub Copilot. By offering a robust set of features and seamless integration options, Tabby empowers teams to maintain full control over their development environments while leveraging the power\u2026","rel":"","context":"In &quot;software&quot;","block_context":{"text":"software","link":"https:\/\/kalilinuxtutorials.com\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Tabby-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36414,"url":"https:\/\/kalilinuxtutorials.com\/bottom\/","url_meta":{"origin":34986,"position":3},"title":"Bottom : Your Ultimate Guide To Mastering System Monitoring Across Platforms","author":"Varshini","date":"February 13, 2025","format":false,"excerpt":"\"bottom\" (btm) is a powerful, customizable, cross-platform graphical system and process monitor designed for terminal environments. Inspired by tools like htop, gtop, and gotop, it provides users with a visually appealing and feature-rich way to monitor system performance and manage processes. Its versatility and ease of use make it a\u2026","rel":"","context":"In &quot;TECH&quot;","block_context":{"text":"TECH","link":"https:\/\/kalilinuxtutorials.com\/category\/tech\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Bottom-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33675,"url":"https:\/\/kalilinuxtutorials.com\/dolost\/","url_meta":{"origin":34986,"position":4},"title":"DOLOST &#8211; Harnessing Cyber Deception For Strategic Security Deployments","author":"Varshini","date":"July 5, 2024","format":false,"excerpt":"Explore the cutting-edge framework 'DOLOST,' designed to innovate the field of cyber deception. This tool automates the deployment of decoys and deceptive environments, enhancing security strategies. Learn how DOLOST not only creates but also meticulously designs these operations to outsmart and trap potential threats. Table Of Contents About Installation Usage\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiTr2I_v586DezLbW2QPJ-46kcYaB1CWslg3awbB6fonRBY4O_wnBaNiKfRcE8uYhVMSC3yPbxRnX7kbUgLDdQjnsBWTkk_aeBkE1xbQ8uFqjBUHohxB71acYND6jOXG5LssiIe0sILd0CP71K9zx2OPIRcZQF8T138hseONav0JxF5uyBjn5nGtvlULycO\/s16000\/DOLOST%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12902,"url":"https:\/\/kalilinuxtutorials.com\/kubearmor-container-aware-runtime-security-enforcement-system\/","url_meta":{"origin":34986,"position":5},"title":"KubeArmor : Container-aware Runtime Security Enforcement System","author":"R K","date":"May 17, 2021","format":false,"excerpt":"Introduction to KubeArmor KubeArmor is a container-aware runtime security enforcement system that restricts the behavior (such as process execution, file access, networking operation, and resource utilization) of containers at the system level. KubeArmor operates with\u00a0Linux security modules (LSMs), meaning that it can work on top of any Linux platforms (such\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34986"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34986\/revisions"}],"predecessor-version":[{"id":34990,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34986\/revisions\/34990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34991"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}