{"id":35478,"date":"2024-12-23T09:03:36","date_gmt":"2024-12-23T09:03:36","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35478"},"modified":"2024-12-23T09:03:37","modified_gmt":"2024-12-23T09:03:37","slug":"delink","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/delink\/","title":{"rendered":"DeLink : Decrypting D-Link Firmware Across Devices With A Rust-Based Library"},"content":{"rendered":"\n<p>A crypto library to decrypt various encrypted D-Link firmware images.<\/p>\n\n\n\n<p>Confirmed to work on the following D-Link devices:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>E15<\/li>\n\n\n\n<li>E30<\/li>\n\n\n\n<li>R12<\/li>\n\n\n\n<li>R15<\/li>\n\n\n\n<li>R18<\/li>\n\n\n\n<li>M18<\/li>\n\n\n\n<li>M30<\/li>\n\n\n\n<li>M32<\/li>\n\n\n\n<li>M60<\/li>\n\n\n\n<li>DAP-1665<\/li>\n\n\n\n<li>DAP-1820<\/li>\n\n\n\n<li>DAP-1955<\/li>\n\n\n\n<li>DAP-2610<\/li>\n\n\n\n<li>DAP-2680<\/li>\n\n\n\n<li>DAP-2682<\/li>\n\n\n\n<li>DIR-850L A1<\/li>\n\n\n\n<li>DIR-850L B1<\/li>\n\n\n\n<li>DAP-1610 B1<\/li>\n\n\n\n<li>DAP-1620 B1<\/li>\n\n\n\n<li>DAP-LX1880<\/li>\n\n\n\n<li>DRA-1360 A1<\/li>\n\n\n\n<li>DRA-2060 A1<\/li>\n\n\n\n<li>DIR-1750<\/li>\n\n\n\n<li>DIR-2055<\/li>\n\n\n\n<li>DIR-LX1870<\/li>\n\n\n\n<li>DIR-X1560<\/li>\n\n\n\n<li>DIR-X1870<\/li>\n\n\n\n<li>DIR-X4860<\/li>\n\n\n\n<li>DIR-X5460<\/li>\n\n\n\n<li>DIR-822<\/li>\n\n\n\n<li>DIR-842<\/li>\n\n\n\n<li>DIR-878<\/li>\n\n\n\n<li>DIR-2150<\/li>\n\n\n\n<li>DIR-3040<\/li>\n\n\n\n<li>DIR-3060<\/li>\n<\/ul>\n\n\n\n<p>Encryption keys\/methods are often re-used amongst devices and firmware, so other devices may also be supported.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Compiling<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/devttys0\/delink#compiling\"><\/a>You must have the Rust compiler installed:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cargo build --release<\/code><\/pre>\n\n\n\n<p>Command Line Usage:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>.\/target\/release\/delink encrypted.bin decrypted.bin<\/code><\/pre>\n\n\n\n<p>Rust Library Usage:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/\/ Read in the contents of an encrypted firmware image\nmatch std::fs::read(\"DIR850LB1_FW220WWb03.bin\") {\n    Err(e) => {\n        eprint!(\"Failed to read input file: {}\", e);\n    }\n    Ok(encrypted_data) => {\n        \/\/ Attempt to decrypt the encrypted data\n        match delink::decrypt(&amp;encrypted_data) {\n            Err(e) => {\n                eprint!(\"Decryption failed: {}\", e);\n            }\n            Ok(decrypted_data) => {\n                \/\/ Decryption successful, save decrypted data to disk\n                if let Err(e) = std::fs::write(\"decrypted.bin\", decrypted_data) {\n                    eprint!(\"Failed to write decrypted data: {}\", e);\n                }\n            }\n        }\n    }\n}<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>A crypto library to decrypt various encrypted D-Link firmware images. Confirmed to work on the following D-Link devices: Encryption keys\/methods are often re-used amongst devices and firmware, so other devices may also be supported. Compiling You must have the Rust compiler installed: Command Line Usage: Rust Library Usage:<\/p>\n","protected":false},"author":12,"featured_media":35482,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6989,6321,6052,6325],"class_list":["post-35478","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-delink","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DeLink : Decrypting D-Link Firmware Across Devices With A<\/title>\n<meta name=\"description\" content=\"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/delink\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DeLink : Decrypting D-Link Firmware Across Devices With A\" \/>\n<meta property=\"og:description\" content=\"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/delink\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-23T09:03:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-23T09:03:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DeLink : Decrypting D-Link Firmware Across Devices With A Rust-Based Library\",\"datePublished\":\"2024-12-23T09:03:36+00:00\",\"dateModified\":\"2024-12-23T09:03:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/\"},\"wordCount\":102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\",\"keywords\":[\"cybersecurity\",\"DeLink\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/delink\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/delink\/\",\"name\":\"DeLink : Decrypting D-Link Firmware Across Devices With A\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\",\"datePublished\":\"2024-12-23T09:03:36+00:00\",\"dateModified\":\"2024-12-23T09:03:37+00:00\",\"description\":\"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/delink\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DeLink : Decrypting D-Link Firmware Across Devices With A","description":"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/delink\/","og_locale":"en_US","og_type":"article","og_title":"DeLink : Decrypting D-Link Firmware Across Devices With A","og_description":"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices","og_url":"https:\/\/kalilinuxtutorials.com\/delink\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-12-23T09:03:36+00:00","article_modified_time":"2024-12-23T09:03:37+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/delink\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/delink\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DeLink : Decrypting D-Link Firmware Across Devices With A Rust-Based Library","datePublished":"2024-12-23T09:03:36+00:00","dateModified":"2024-12-23T09:03:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/delink\/"},"wordCount":102,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","keywords":["cybersecurity","DeLink","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/delink\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/delink\/","url":"https:\/\/kalilinuxtutorials.com\/delink\/","name":"DeLink : Decrypting D-Link Firmware Across Devices With A","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","datePublished":"2024-12-23T09:03:36+00:00","dateModified":"2024-12-23T09:03:37+00:00","description":"A crypto library to decrypt various encrypted D-Link firmware images.Confirmed to work on the following D-Link devices","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/delink\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/delink\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhRMB45k0I6Qs8xpUrR_h8GxvSz78ctB0b7R5At-cWBCDxGTu5cDwtDF4qCShfPdOZivyv2fueeOunUBxNjn_3gD8tM0sxKnkjI3-M6zUj64EJUhfJx0nweKRglJXUrUdKcnYJ0AweQ-WiKb-4SQwY-kOw2YfiHuTWBH5Oid6saL1uFBbNMovYw0VaDWLWs\/s1600\/DeLink%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":37116,"url":"https:\/\/kalilinuxtutorials.com\/binwalk\/","url_meta":{"origin":35478,"position":0},"title":"Binwalk : A Comprehensive Firmware Analysis Tool","author":"Varshini","date":"March 18, 2025","format":false,"excerpt":"Binwalk is a powerful tool designed for analyzing and extracting embedded files from firmware images. It is widely used by security researchers and penetration testers for identifying vulnerabilities in IoT devices and other hardware. Binwalk's capabilities have been enhanced with the release of Binwalk v3, which is rewritten in Rust\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Binwalk-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34656,"url":"https:\/\/kalilinuxtutorials.com\/emuscan\/","url_meta":{"origin":35478,"position":1},"title":"EmuScan &#8211; Advanced Emulation Detection For Firmware And Devices","author":"Varshini","date":"August 29, 2024","format":false,"excerpt":"This test is based on ekknod's [drvscan], with added emulation detection for common devices. Thanks to ekknod for his contribution.Thanks to my good friend HChai for providing the software interface and ideas. Important Functions Detecting DMA disguised devices Activate firmware (to be added in the future) Common Problem Q: The\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimoTuDNuyhVlO8AqhVKi5yKO4_J5PvnoBrEQS6emyXVpjovxfZy3A3MqWfMMZBGG12w4FRW8rB-mMkUcKuYCc1aGn4lFV-61QEdaG8-7CiqQ5sBTAm_X5ioU4HduM81JqhrhnTm_ff0XW25lNUaD82mY3h7GhpVAdHlzLdgHXq2FAaIHkm7UUI1zEn9z7-\/s16000\/EmuScan%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32450,"url":"https:\/\/kalilinuxtutorials.com\/awesome-embedded-and-iot-security\/","url_meta":{"origin":35478,"position":2},"title":"Awesome Embedded And IoT Security &#8211; Key Tools And Insights","author":"Varshini","date":"March 25, 2024","format":false,"excerpt":"Botnets like\u00a0Mirai\u00a0have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the\u00a0Books\u00a0and\u00a0Case Studies\u00a0sections. If you want to start right away\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1016,"url":"https:\/\/kalilinuxtutorials.com\/wi-fi-cracking-android-hijacker\/","url_meta":{"origin":35478,"position":3},"title":"All-in-One Wi-Fi Cracking Tools for Android &#8211; Hijacker v1.5","author":"R K","date":"April 26, 2018","format":false,"excerpt":"Hijacker v1.5 is a Graphical User Interface for the penetration testing instruments Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a basic and simple UI to utilize these devices without using commands in a console and copy and pasting MAC addresses. This application requires an ARM android smartphone with an internal\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=350%2C200 1x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=525%2C300 1.5x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=700%2C400 2x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=1050%2C600 3x, https:\/\/i2.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/mdk-feature.jpg?fit=1500%2C1000&ssl=1&resize=1400%2C800 4x"},"classes":[]},{"id":36206,"url":"https:\/\/kalilinuxtutorials.com\/pebbleos\/","url_meta":{"origin":35478,"position":4},"title":"PebbleOS : A Guide To Its Framework And Development Tools","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"PebbleOS is an open-source software framework originally developed by Pebble Technology for their smartwatch ecosystem. While the repository has undergone modifications to remove proprietary components, it serves as a valuable resource for developers interested in exploring smartwatch operating systems or building custom firmware. Key Features And Functions Of PebbleOS Tools\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7001,"url":"https:\/\/kalilinuxtutorials.com\/iot-implant-toolkit-for-implant-attack\/","url_meta":{"origin":35478,"position":5},"title":"IoT Implant : Toolkit For Implant Attack Of IoT Devices","author":"R K","date":"October 24, 2019","format":false,"excerpt":"IoT Implant Toolkit is a framework of useful tools for malware implantation research of IoT devices. It is a toolkit consisted of essential software tools on firmware modification, serial port debugging, software analysis and stable spy clients. With an easy-to-use and extensible shell-like environment, IoT-Implant-Toolkit is a one-stop-shop toolkit simplifies\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35478"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35478\/revisions"}],"predecessor-version":[{"id":35481,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35478\/revisions\/35481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35482"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}