{"id":35522,"date":"2024-12-27T08:01:58","date_gmt":"2024-12-27T08:01:58","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35522"},"modified":"2024-12-27T08:01:59","modified_gmt":"2024-12-27T08:01:59","slug":"pyxel","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pyxel\/","title":{"rendered":"Pyxel : A Complete Guide To The Python-Based Game Engine"},"content":{"rendered":"\n<p>With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can easily enjoy making pixel-art-style games.<\/p>\n\n\n\n<p>Pyxel&#8217;s specifications and APIs are inspired by <a href=\"https:\/\/www.lexaloffle.com\/pico-8.php\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">PICO-8<\/a> and <a href=\"https:\/\/tic80.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TIC-80<\/a>.<\/p>\n\n\n\n<p>Pyxel is open source under the <a href=\"https:\/\/github.com\/kitao\/pyxel\/blob\/main\/LICENSE\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">MIT License<\/a> and free to use. Let&#8217;s start making retro games with Pyxel!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Specifications<\/strong><a href=\"https:\/\/github.com\/kitao\/pyxel#specifications\"><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Runs on Windows, Mac, Linux, and Web<\/li>\n\n\n\n<li>Programming in Python<\/li>\n\n\n\n<li>16-color palette<\/li>\n\n\n\n<li>3 256&#215;256-sized image banks<\/li>\n\n\n\n<li>8 256&#215;256-sized tilemaps<\/li>\n\n\n\n<li>4 channels with 64 definable sounds<\/li>\n\n\n\n<li>8 music tracks combining any sounds<\/li>\n\n\n\n<li>Keyboard, mouse, and gamepad inputs<\/li>\n\n\n\n<li>Image and sound editing tools<\/li>\n\n\n\n<li>User-extensible colors, channels, and banks<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How To Install<\/strong><a href=\"https:\/\/github.com\/kitao\/pyxel#how-to-install\"><\/a><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Windows<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/kitao\/pyxel#windows\"><\/a>After installing <a href=\"https:\/\/www.python.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Python3<\/a> (version 3.8 or higher), run the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>pip install -U pyxel<\/code><\/pre>\n\n\n\n<p>When installing Python using the official installer, make sure to check the <code>Add Python 3.x to PATH<\/code> option to enable the <code>pyxel<\/code> command.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Mac<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/kitao\/pyxel#mac\"><\/a>After installing <a href=\"https:\/\/brew.sh\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Homebrew<\/a>, run the following commands:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>brew install pipx\npipx ensurepath\npipx install pyxel<\/code><\/pre>\n\n\n\n<p>To upgrade Pyxel after installation, run <code>pipx upgrade pyxel<\/code>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Linux<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/github.com\/kitao\/pyxel#linux\"><\/a>After installing the SDL2 package (<code>libsdl2-dev<\/code> for Ubuntu), <a href=\"https:\/\/www.python.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Python3<\/a> (version 3.8 or higher), and <code>python3-pip<\/code>, run the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo pip3 install -U pyxel<\/code><\/pre>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/kitao\/pyxel\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can easily enjoy making pixel-art-style games. Pyxel&#8217;s specifications and APIs are inspired by PICO-8 and TIC-80. Pyxel is open source under the MIT License and free to use. Let&#8217;s start making retro games with Pyxel! [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35527,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38],"tags":[737,6321,6052,6325,6998],"class_list":["post-35522","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-pyxel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pyxel : A Complete Guide To The Python-Based Game Engine<\/title>\n<meta name=\"description\" content=\"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pyxel\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pyxel : A Complete Guide To The Python-Based Game Engine\" \/>\n<meta property=\"og:description\" content=\"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pyxel\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-27T08:01:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-27T08:01:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Pyxel : A Complete Guide To The Python-Based Game Engine\",\"datePublished\":\"2024-12-27T08:01:58+00:00\",\"dateModified\":\"2024-12-27T08:01:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/\"},\"wordCount\":175,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Pyxel\"],\"articleSection\":[\"software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pyxel\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/\",\"name\":\"Pyxel : A Complete Guide To The Python-Based Game Engine\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\",\"datePublished\":\"2024-12-27T08:01:58+00:00\",\"dateModified\":\"2024-12-27T08:01:59+00:00\",\"description\":\"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pyxel\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pyxel : A Complete Guide To The Python-Based Game Engine","description":"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pyxel\/","og_locale":"en_US","og_type":"article","og_title":"Pyxel : A Complete Guide To The Python-Based Game Engine","og_description":"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can","og_url":"https:\/\/kalilinuxtutorials.com\/pyxel\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-12-27T08:01:58+00:00","article_modified_time":"2024-12-27T08:01:59+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Pyxel : A Complete Guide To The Python-Based Game Engine","datePublished":"2024-12-27T08:01:58+00:00","dateModified":"2024-12-27T08:01:59+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/"},"wordCount":175,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Pyxel"],"articleSection":["software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/pyxel\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/","url":"https:\/\/kalilinuxtutorials.com\/pyxel\/","name":"Pyxel : A Complete Guide To The Python-Based Game Engine","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","datePublished":"2024-12-27T08:01:58+00:00","dateModified":"2024-12-27T08:01:59+00:00","description":"With simple specifications inspired by retro gaming consoles, such as displaying only 16 colors and supporting 4 sound channels, you can","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pyxel\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pyxel\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhGw_dNkyEooK5i8Mp4R-RmOBczDfwmjUxiNyzLDWGMYtoW5WYz8R4hyAJuj6yxpMz-bZQyUAocObvp1-hkfu2-HteEjFtZVVMwoY-mLgy8tffhM1yhEyGtrkn_ISlzl3OhEewkUYCJDtTnJYY_6qF4ExXTrmw7N0L-Cala5ECwX96Lz85MgVp2dvEv_7lV\/s1600\/Pyxel%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35064,"url":"https:\/\/kalilinuxtutorials.com\/introduction-to-openvas-open-source-vulnerability-scanning\/","url_meta":{"origin":35522,"position":0},"title":"Introduction to OpenVAS: Open-Source Vulnerability Scanning","author":"Rajashekar Yasani","date":"December 13, 2015","format":false,"excerpt":"In the rapidly evolving world of cybersecurity, maintaining a robust defense against vulnerabilities is crucial for any organization. OpenVAS (Open Vulnerability Assessment System) is an open-source solution that provides comprehensive vulnerability scanning capabilities. This guide will delve into how OpenVAS works, its technical specifications, and how companies can effectively use\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"OpenVAS","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhOrN1LNNM3bEHI95qE3DtlO8MdJFMIVxCqENdb2XKBVPVRuRramEaQbZGMEh_sHOnSt0i8Kuq1tihK15eIjFJGpu4sUNDopukNASmxLmeREDTfkg4line7HrcFp2ZD4GJIbhKht68GrEYVuEPM4wclVNe-p3zyKS8GMOBHnBVVhCAyEFAex4n8eLSbGpYY\/s16000\/openvas.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7574,"url":"https:\/\/kalilinuxtutorials.com\/asyncrone-multifunction-syn-flood-ddos-weapon\/","url_meta":{"origin":35522,"position":1},"title":"aSYNcrone : Multifunction SYN Flood DDoS Weapon","author":"R K","date":"December 6, 2019","format":false,"excerpt":"aSYNcrone is a C language based, malfunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN packet intensively to the destination. POWER!!! Also Read - CAPE : Malware Configuration And Payload Extraction USAGE git clone https:\/\/github.com\/fatih4842\/aSYNcrone.gitcd aSYNcronegcc aSYNcrone.c -o aSYNcrone -lpthread.\/aSYNcrone Specifications Internal random IP generatorUsing threads\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34076,"url":"https:\/\/kalilinuxtutorials.com\/hardware-yaml-dsl\/","url_meta":{"origin":35522,"position":2},"title":"Hardware YAML DSL &#8211; A Guide To Specifications","author":"Varshini","date":"July 31, 2024","format":false,"excerpt":"In the ever-evolving landscape of cybersecurity, the configuration and management of hardware profiles are crucial for effective security protocols. The Hardware YAML DSL (Domain Specific Language) provides a structured format for defining and automating these profiles within security toolkits. This article delves into the specifics of setting up hardware profiles\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEimvEllssILGAp7lCcc7eCtMzec2_ob4I14qW8ulzUtLUFUyxh7p7bD1l5v0s_yYIlmEpdHbJs9WkrNTnEKKoE-7qqdqEQltSHDXIlxUClf_7q9Ptsdhn8cXq6Vp9onlGxvK-2CCA_JNiXjs4q82f8VKfvsDrbph80xXCK41N0JaUQmfk9FROTL2PCmNKLo\/s16000\/Hardware%20YAML%20DSL.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":21809,"url":"https:\/\/kalilinuxtutorials.com\/mariana-trench\/","url_meta":{"origin":35522,"position":3},"title":"Mariana Trench : Security Focused Static Analysis Tool For Android And Java Applications","author":"R K","date":"February 15, 2022","format":false,"excerpt":"Mariana Trench is a security focused static analysis platform targeting Android. This guide will walk you through setting up Mariana Trench on your machine and get you to find your first remote code execution vulnerability in a small sample app. These instructions are also available at our\u00a0website. Prerequisites Mariana Trench\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjqIfxg4wLA2A9p6_3ACvZKqxLBUn4WPrsRXrDouS9wHTsnDw8vLHYFmadDaUb74x2N3_3kRGLJ3BUap7FGXE_UJpCVMevsnCUoe9lAlyBsFDxFhsw9eExDn-QrHd612NstSsP-KLAvpJGrDocN4iXq2ysfZeBGtJvDVAvoEGaH3SVFFRCzxvDrGGj6=s1138","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjqIfxg4wLA2A9p6_3ACvZKqxLBUn4WPrsRXrDouS9wHTsnDw8vLHYFmadDaUb74x2N3_3kRGLJ3BUap7FGXE_UJpCVMevsnCUoe9lAlyBsFDxFhsw9eExDn-QrHd612NstSsP-KLAvpJGrDocN4iXq2ysfZeBGtJvDVAvoEGaH3SVFFRCzxvDrGGj6=s1138 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjqIfxg4wLA2A9p6_3ACvZKqxLBUn4WPrsRXrDouS9wHTsnDw8vLHYFmadDaUb74x2N3_3kRGLJ3BUap7FGXE_UJpCVMevsnCUoe9lAlyBsFDxFhsw9eExDn-QrHd612NstSsP-KLAvpJGrDocN4iXq2ysfZeBGtJvDVAvoEGaH3SVFFRCzxvDrGGj6=s1138 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjqIfxg4wLA2A9p6_3ACvZKqxLBUn4WPrsRXrDouS9wHTsnDw8vLHYFmadDaUb74x2N3_3kRGLJ3BUap7FGXE_UJpCVMevsnCUoe9lAlyBsFDxFhsw9eExDn-QrHd612NstSsP-KLAvpJGrDocN4iXq2ysfZeBGtJvDVAvoEGaH3SVFFRCzxvDrGGj6=s1138 2x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjqIfxg4wLA2A9p6_3ACvZKqxLBUn4WPrsRXrDouS9wHTsnDw8vLHYFmadDaUb74x2N3_3kRGLJ3BUap7FGXE_UJpCVMevsnCUoe9lAlyBsFDxFhsw9eExDn-QrHd612NstSsP-KLAvpJGrDocN4iXq2ysfZeBGtJvDVAvoEGaH3SVFFRCzxvDrGGj6=s1138 3x"},"classes":[]},{"id":35068,"url":"https:\/\/kalilinuxtutorials.com\/wireshark-network-traffic-analysis\/","url_meta":{"origin":35522,"position":4},"title":"Getting Started with Wireshark: Network Traffic Analysis","author":"Rajashekar Yasani","date":"May 6, 2016","format":false,"excerpt":"Wireshark is a powerful and widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network. This guide will walk you through the basics of how Wireshark works, how to analyze network traffic, its features, and technical specifications. How Wireshark Works Wireshark\u2026","rel":"","context":"In &quot;Web Application Security&quot;","block_context":{"text":"Web Application Security","link":"https:\/\/kalilinuxtutorials.com\/category\/web-application-security\/"},"img":{"alt_text":"Wireshark","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17442,"url":"https:\/\/kalilinuxtutorials.com\/brutus\/","url_meta":{"origin":35522,"position":5},"title":"Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture","author":"R K","date":"September 9, 2021","format":false,"excerpt":"Brutus is an educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Introduction Looking for version 1? See the branches in this repository. Brutus is an educational exploitation framework written in Python. It automates pre and post-connection network-based exploits, as well as web-based reconnaissance. As\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"Brutus : An Educational Exploitation Framework Shipped On A Modular And Highly Extensible Multi-Tasking And Multi-Processing Architecture","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-V3i5WFntzFk\/YSXOUpeu0rI\/AAAAAAAAKjs\/pLsjrTCSu304paaEevUW78gH1u2I1k_VgCLcBGAsYHQ\/s728\/Brutus%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-V3i5WFntzFk\/YSXOUpeu0rI\/AAAAAAAAKjs\/pLsjrTCSu304paaEevUW78gH1u2I1k_VgCLcBGAsYHQ\/s728\/Brutus%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-V3i5WFntzFk\/YSXOUpeu0rI\/AAAAAAAAKjs\/pLsjrTCSu304paaEevUW78gH1u2I1k_VgCLcBGAsYHQ\/s728\/Brutus%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-V3i5WFntzFk\/YSXOUpeu0rI\/AAAAAAAAKjs\/pLsjrTCSu304paaEevUW78gH1u2I1k_VgCLcBGAsYHQ\/s728\/Brutus%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35522"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35522\/revisions"}],"predecessor-version":[{"id":35526,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35522\/revisions\/35526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35527"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}