{"id":35638,"date":"2025-01-06T08:19:31","date_gmt":"2025-01-06T08:19:31","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=35638"},"modified":"2025-01-06T08:19:37","modified_gmt":"2025-01-06T08:19:37","slug":"ripgrep","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/ripgrep\/","title":{"rendered":"ripgrep : The Fast, Flexible Search Tool"},"content":{"rendered":"\n<p>ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files\/directories and binary files. <\/p>\n\n\n\n<p>(To disable all automatic filtering by default, use <code>rg -uuu<\/code>.) ripgrep has first class support on Windows, macOS and Linux, with binary downloads available for <a href=\"https:\/\/github.com\/BurntSushi\/ripgrep\/releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">every release<\/a>. ripgrep is similar to other popular search tools like The Silver Searcher, ack and grep.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>CHANGELOG<\/strong><a href=\"https:\/\/github.com\/BurntSushi\/ripgrep#changelog\"><\/a><\/h2>\n\n\n\n<p>Please see the <a href=\"https:\/\/github.com\/BurntSushi\/ripgrep\/blob\/master\/CHANGELOG.md\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CHANGELOG<\/a> for a release history.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Documentation Quick Links<\/strong><a href=\"https:\/\/github.com\/BurntSushi\/ripgrep#documentation-quick-links\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Installation<\/li>\n\n\n\n<li>User Guide<\/li>\n\n\n\n<li>Frequently Asked Questions<\/li>\n\n\n\n<li>Regex syntax<\/li>\n\n\n\n<li>Configuration files<\/li>\n\n\n\n<li>Shell completions<\/li>\n\n\n\n<li>Building<\/li>\n\n\n\n<li>Translations<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Screenshot Of Search Results<a href=\"https:\/\/github.com\/BurntSushi\/ripgrep#screenshot-of-search-results\"><\/a><\/strong><\/h3>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Quick Examples Comparing Tools<\/strong><a href=\"https:\/\/github.com\/BurntSushi\/ripgrep#quick-examples-comparing-tools\"><\/a><\/h3>\n\n\n\n<p>This example searches the entire <a href=\"https:\/\/github.com\/BurntSushi\/linux\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Linux kernel source tree<\/a> (after running <code>make defconfig &amp;&amp; make -j8<\/code>) for <code>[A-Z]+_SUSPEND<\/code>, where all matches must be words. Timings were collected on a system with an Intel i9-12900K 5.2 GHz<\/p>\n\n\n\n<p>Please remember that a single benchmark is never enough! See my blog post on ripgrep for a very detailed comparison with more benchmarks and analysis.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Tool<\/th><th>Command<\/th><th>Line count<\/th><th>Time<\/th><\/tr><\/thead><tbody><tr><td>ripgrep (Unicode)<\/td><td><code>rg -n -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td><strong>0.082s<\/strong> (1.00x)<\/td><\/tr><tr><td>hypergrep<\/td><td><code>hgrep -n -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td>0.167s (2.04x)<\/td><\/tr><tr><td>git grep<\/td><td><code>git grep -P -n -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td>0.273s (3.34x)<\/td><\/tr><tr><td>The Silver Searcher<\/td><td><code>ag -w '[A-Z]+_SUSPEND'<\/code><\/td><td>534<\/td><td>0.443s (5.43x)<\/td><\/tr><tr><td>ugrep<\/td><td><code>ugrep -r --ignore-files --no-hidden -I -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td>0.639s (7.82x)<\/td><\/tr><tr><td>git grep<\/td><td><code>LC_ALL=C git grep -E -n -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td>0.727s (8.91x)<\/td><\/tr><tr><td>git grep (Unicode)<\/td><td><code>LC_ALL=en_US.UTF-8 git grep -E -n -w '[A-Z]+_SUSPEND'<\/code><\/td><td>536<\/td><td>2.670s (32.70x)<\/td><\/tr><tr><td>ack<\/td><td><code>ack -w '[A-Z]+_SUSPEND'<\/code><\/td><td>2677<\/td><td>2.935s (35.94x)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/BurntSushi\/ripgrep\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect gitignore rules and automatically skip hidden files\/directories and binary files. (To disable all automatic filtering by default, use rg -uuu.) ripgrep has first class support on Windows, macOS and Linux, with binary downloads available [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":35642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[25],"tags":[737,6321,6052,6325,7015],"class_list":["post-35638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-ripgrep"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ripgrep : The Fast, Flexible Search Tool<\/title>\n<meta name=\"description\" content=\"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ripgrep : The Fast, Flexible Search Tool\" \/>\n<meta property=\"og:description\" content=\"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-06T08:19:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-06T08:19:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"ripgrep : The Fast, Flexible Search Tool\",\"datePublished\":\"2025-01-06T08:19:31+00:00\",\"dateModified\":\"2025-01-06T08:19:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\"},\"wordCount\":209,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"ripgrep\"],\"articleSection\":[\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\",\"name\":\"ripgrep : The Fast, Flexible Search Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\",\"datePublished\":\"2025-01-06T08:19:31+00:00\",\"dateModified\":\"2025-01-06T08:19:37+00:00\",\"description\":\"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ripgrep\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ripgrep : The Fast, Flexible Search Tool","description":"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/ripgrep\/","og_locale":"en_US","og_type":"article","og_title":"ripgrep : The Fast, Flexible Search Tool","og_description":"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect","og_url":"https:\/\/kalilinuxtutorials.com\/ripgrep\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-01-06T08:19:31+00:00","article_modified_time":"2025-01-06T08:19:37+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"ripgrep : The Fast, Flexible Search Tool","datePublished":"2025-01-06T08:19:31+00:00","dateModified":"2025-01-06T08:19:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/"},"wordCount":209,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","ripgrep"],"articleSection":["Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/ripgrep\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/","url":"https:\/\/kalilinuxtutorials.com\/ripgrep\/","name":"ripgrep : The Fast, Flexible Search Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","datePublished":"2025-01-06T08:19:31+00:00","dateModified":"2025-01-06T08:19:37+00:00","description":"ripgrep is a line-oriented search tool that recursively searches the current directory for a regex pattern. By default, ripgrep will respect","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/ripgrep\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/ripgrep\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgXMwyq0GTFS7b1y_lmPxevC5W7SVAiVwk1xVDc4qHJ0LLOB21bCGoMt8-TIlnMgQhxVfjWUhda6a2JhR8HmHB0uvpirNEEMJUVBksJyEvU9wM4_0TA_MFi6YWmEWo5EnUgD3xYanv0JGgbkV-G7AR0dOBQhuF-QaYfe4g3-c7IrcbP1ERkfCPvn_vVJF-B\/s1600\/ripgrep%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10497,"url":"https:\/\/kalilinuxtutorials.com\/intercept\/","url_meta":{"origin":35638,"position":0},"title":"Intercept : Policy As Code Static Analysis Auditing","author":"R K","date":"May 7, 2020","format":false,"excerpt":"Intercept stupidly easy to use, small footprint Policy as Code subsecond command-line scanner that leverages the power of the fastest multi-line search tool to scan your codebase. It can be used as a linter, guard rail control or simple data collector and inspector. Consider it a cross-platform weaponized ripgrep. Features\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":25250,"url":"https:\/\/kalilinuxtutorials.com\/dora\/","url_meta":{"origin":35638,"position":1},"title":"Dora : Find Exposed API Keys Based On RegEx And Get Exploitation Methods","author":"R K","date":"June 17, 2022","format":false,"excerpt":"Dora, a tool to Find Exposed API Keys Based On RegEx And Get Exploitation Methods For Some Of Keys That Are Found Features Blazing fast as we are using\u00a0ripgrep\u00a0in backendExploit\/PoC steps for many of the API key, allowing to write a good report for bug bounty huntingUnlike many other API\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgD8lEY0pKKrlBrmrAihDAjV9F8zF3P3yKJhl6c3DH2cjt101jGQbPkz5sseK8qzXd5q0x8vXHfaHQOjSez3iZGO1VfYW7sVj7sicfLhRk4EFeL0FYZLZ7DABNW2a-RaBM5ixQHe_1aA8rRlNCe5ym10SUy3Q4bCifpz_MaUChjXJ7NzBz_LfpF5AiG\/s728\/dora%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgD8lEY0pKKrlBrmrAihDAjV9F8zF3P3yKJhl6c3DH2cjt101jGQbPkz5sseK8qzXd5q0x8vXHfaHQOjSez3iZGO1VfYW7sVj7sicfLhRk4EFeL0FYZLZ7DABNW2a-RaBM5ixQHe_1aA8rRlNCe5ym10SUy3Q4bCifpz_MaUChjXJ7NzBz_LfpF5AiG\/s728\/dora%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgD8lEY0pKKrlBrmrAihDAjV9F8zF3P3yKJhl6c3DH2cjt101jGQbPkz5sseK8qzXd5q0x8vXHfaHQOjSez3iZGO1VfYW7sVj7sicfLhRk4EFeL0FYZLZ7DABNW2a-RaBM5ixQHe_1aA8rRlNCe5ym10SUy3Q4bCifpz_MaUChjXJ7NzBz_LfpF5AiG\/s728\/dora%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgD8lEY0pKKrlBrmrAihDAjV9F8zF3P3yKJhl6c3DH2cjt101jGQbPkz5sseK8qzXd5q0x8vXHfaHQOjSez3iZGO1VfYW7sVj7sicfLhRk4EFeL0FYZLZ7DABNW2a-RaBM5ixQHe_1aA8rRlNCe5ym10SUy3Q4bCifpz_MaUChjXJ7NzBz_LfpF5AiG\/s728\/dora%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":37410,"url":"https:\/\/kalilinuxtutorials.com\/my-awesome-list\/","url_meta":{"origin":35638,"position":2},"title":"My Awesome List : Tools And Their Functions","author":"Varshini","date":"March 31, 2025","format":false,"excerpt":"\"My Awesome List\" is a curated collection of tools, libraries, and resources spanning various domains such as cybersecurity, programming, reverse engineering, and more. Below is an overview of some notable tools and their functions: Networking Tools Wireshark: A powerful network protocol analyzer used for troubleshooting, analysis, and development of communication\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/My-Awesome-List.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27649,"url":"https:\/\/kalilinuxtutorials.com\/slicer-2\/","url_meta":{"origin":35638,"position":3},"title":"Slicer : Tool To Automate The Boring Process Of APK Recon","author":"R K","date":"November 22, 2022","format":false,"excerpt":"Slicer is a tool to automate the recon process on an APK file. Slicer accepts a path to an extracted APK file and then returns all the activities, receivers, and services which are exported and have null permissions and can be externally provoked. Note: The APK has to be extracted\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiLZ37jSOJ6dzZWIr07K0n-mtjGCA_APuMybVW1Y43Wmkv4pRtzyCXD7i8EefLCQIpjgiU-Cz60jV34HknpbbuO-5B3zhwmWB7vfthKL6FN68jvWjTsqXa5TIh8l8Is_HeXxn7T6XlBLjeofKrOrC7mslNtG8yeqVxT9Sa2TrsPsgI4SNdXkxoIKk-_\/s728\/Slicer.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiLZ37jSOJ6dzZWIr07K0n-mtjGCA_APuMybVW1Y43Wmkv4pRtzyCXD7i8EefLCQIpjgiU-Cz60jV34HknpbbuO-5B3zhwmWB7vfthKL6FN68jvWjTsqXa5TIh8l8Is_HeXxn7T6XlBLjeofKrOrC7mslNtG8yeqVxT9Sa2TrsPsgI4SNdXkxoIKk-_\/s728\/Slicer.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiLZ37jSOJ6dzZWIr07K0n-mtjGCA_APuMybVW1Y43Wmkv4pRtzyCXD7i8EefLCQIpjgiU-Cz60jV34HknpbbuO-5B3zhwmWB7vfthKL6FN68jvWjTsqXa5TIh8l8Is_HeXxn7T6XlBLjeofKrOrC7mslNtG8yeqVxT9Sa2TrsPsgI4SNdXkxoIKk-_\/s728\/Slicer.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiLZ37jSOJ6dzZWIr07K0n-mtjGCA_APuMybVW1Y43Wmkv4pRtzyCXD7i8EefLCQIpjgiU-Cz60jV34HknpbbuO-5B3zhwmWB7vfthKL6FN68jvWjTsqXa5TIh8l8Is_HeXxn7T6XlBLjeofKrOrC7mslNtG8yeqVxT9Sa2TrsPsgI4SNdXkxoIKk-_\/s728\/Slicer.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32930,"url":"https:\/\/kalilinuxtutorials.com\/nutek-apple\/","url_meta":{"origin":35638,"position":4},"title":"Nutek-Apple : Unleashing Power On macOS And Linux","author":"Varshini","date":"May 3, 2024","format":false,"excerpt":"Nutek Security Platform for macOS and Linux operating systems. Tools for hackers, bug hunters and hobbiests. You might like it, you might not. It's a matter of taste. What It Does? This -\u00a0nutek-apple.rb\u00a0- script for macOS and Linux operating systems installs all the neccessairly tools for well prepared hacker, bug\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh69SuJiD9bEq1_Anz_OcoUIK0IbvAXVWmxQI8P6oI4sXGZKEi-i_9GcvzlzgnrLPiACRtSAMvu6GvCb9wPiDpkU8I8msnqS3ZGSSibCmS1hrvGqYwH-AkW07nCDTCE3k0cj7LZoVZphMSQ-RUcWzZgQYOwsn0f74E8zQeMjcqGi253VvTAHd63imSTjQ92\/s16000\/Nutek-Apple%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33990,"url":"https:\/\/kalilinuxtutorials.com\/iat-tracer-v2\/","url_meta":{"origin":35638,"position":5},"title":"IAT-Tracer V2 : Streamlining API Function Tracing For Enhanced Cybersecurity","author":"Varshini","date":"July 25, 2024","format":false,"excerpt":"IAT-Tracer V2 is a plugin for\u00a0Tiny-Tracer\u00a0framework (by @hasherezade) for automatically detecting and resolving functions' parameters out of the IAT or trace logs (.tag files) of PE files. The plugin has a GUI that allows the user to choose what imported or called functions to trace and watch and then automatically\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgHJJBiyCTxslH4MHAN3kzWdt5rj3pPQkoQRe1g3JLOuCigJEf8RwnGfEifzL8iJYYkwPFWa_e8TpsMZDtHLUkp5_JGGRwFkeOKpRxtPnpyL0-IZwHlgcfleLY00ReYM4uOvdPlUVyWQCGV_fl3YSFC3Hn6GsmWLjlCV6-WLOH9QFc64IRoenVuKl8YObOa\/s16000\/IAT.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=35638"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35638\/revisions"}],"predecessor-version":[{"id":35641,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/35638\/revisions\/35641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/35642"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=35638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=35638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=35638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}