{"id":36453,"date":"2025-02-14T09:35:01","date_gmt":"2025-02-14T09:35:01","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=36453"},"modified":"2025-02-14T09:35:04","modified_gmt":"2025-02-14T09:35:04","slug":"rnote","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/rnote\/","title":{"rendered":"Rnote : Revolutionizing Digital Creativity With Open-Source Precision"},"content":{"rendered":"\n<p>Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents or images. <\/p>\n\n\n\n<p>Built using <strong>Rust<\/strong> and <strong>GTK4<\/strong>, Rnote offers a versatile platform suitable for students, educators, artists, and professionals. <\/p>\n\n\n\n<p>Its adaptive user interface ensures seamless functionality across devices of all sizes, making it particularly effective for stylus input.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stylus Support<\/strong>: Pressure-sensitive input with configurable stroke styles for precision drawing.<\/li>\n\n\n\n<li><strong>Shape and Selection Tools<\/strong>: Create shapes, move, rotate, resize, and modify content effortlessly.<\/li>\n\n\n\n<li><strong>Document Layouts<\/strong>: Offers fixed pages, continuous vertical scrolling, or infinite canvases to suit diverse workflows.<\/li>\n\n\n\n<li><strong>Customization<\/strong>: Personalize backgrounds, page formats, and even enable optional pen sounds.<\/li>\n\n\n\n<li><strong>File Import\/Export<\/strong>: Supports importing PDFs, bitmap images, and SVG files. Exports are available in formats like SVG, PDF, PNG, and JPEG.<\/li>\n\n\n\n<li><strong>Tabs and Autosave<\/strong>: Work on multiple documents simultaneously with autosave functionality to prevent data loss.<\/li>\n\n\n\n<li><strong>Workspace Integration<\/strong>: Features a workspace browser for quick access to related files and supports drag-and-drop operations.<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Students<\/strong>: Simplify note-taking during lectures or create diagrams for study materials.<\/li>\n\n\n\n<li><strong>Educators<\/strong>: Annotate course content or illustrate concepts for engaging presentations.<\/li>\n\n\n\n<li><strong>Artists<\/strong>: Experiment with sketches and digital art using advanced stylus tools.<\/li>\n\n\n\n<li><strong>Professionals<\/strong>: Ideal for visual brainstorming and document annotation in collaborative environments.<\/li>\n<\/ol>\n\n\n\n<p>Rnote is available on Linux (via Flatpak), macOS (as an app bundle), and Windows (installer or Winget). <\/p>\n\n\n\n<p>Despite its versatility, users should note that the native <code>.rnote<\/code> file format is still evolving and may face compatibility issues between versions. Exporting work before updating is recommended.<\/p>\n\n\n\n<p>While Rnote boasts many features, some known issues include drag-and-drop permissions errors or palm rejection inconsistencies on certain devices. These can often be resolved through system settings or additional drivers.<\/p>\n\n\n\n<p>In summary, Rnote combines simplicity with robust functionality to cater to a wide range of creative and professional needs. <\/p>\n\n\n\n<p>Its active development ensures continuous improvements, making it a promising tool in the digital note-taking landscape.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents or images. Built using Rust and GTK4, Rnote offers a versatile platform suitable for students, educators, artists, and professionals. Its adaptive user interface ensures seamless functionality across devices of all sizes, making it particularly effective for stylus input. Key Features [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":36458,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38,40],"tags":[6321,6052,6325,7149],"class_list":["post-36453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","category-tech","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-rnote"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Rnote : Revolutionizing Digital Creativity With Open-Source<\/title>\n<meta name=\"description\" content=\"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/rnote\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rnote : Revolutionizing Digital Creativity With Open-Source\" \/>\n<meta property=\"og:description\" content=\"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/rnote\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-14T09:35:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-14T09:35:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Rnote : Revolutionizing Digital Creativity With Open-Source Precision\",\"datePublished\":\"2025-02-14T09:35:01+00:00\",\"dateModified\":\"2025-02-14T09:35:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/\"},\"wordCount\":317,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp\",\"keywords\":[\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Rnote\"],\"articleSection\":[\"software\",\"TECH\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/rnote\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/rnote\/\",\"name\":\"Rnote : Revolutionizing Digital Creativity With Open-Source\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp\",\"datePublished\":\"2025-02-14T09:35:01+00:00\",\"dateModified\":\"2025-02-14T09:35:04+00:00\",\"description\":\"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/rnote\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rnote : Revolutionizing Digital Creativity With Open-Source","description":"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/rnote\/","og_locale":"en_US","og_type":"article","og_title":"Rnote : Revolutionizing Digital Creativity With Open-Source","og_description":"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents","og_url":"https:\/\/kalilinuxtutorials.com\/rnote\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-02-14T09:35:01+00:00","article_modified_time":"2025-02-14T09:35:04+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/rnote\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/rnote\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Rnote : Revolutionizing Digital Creativity With Open-Source Precision","datePublished":"2025-02-14T09:35:01+00:00","dateModified":"2025-02-14T09:35:04+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rnote\/"},"wordCount":317,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","keywords":["informationsecurity","kalilinux","kalilinuxtools","Rnote"],"articleSection":["software","TECH"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/rnote\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/rnote\/","url":"https:\/\/kalilinuxtutorials.com\/rnote\/","name":"Rnote : Revolutionizing Digital Creativity With Open-Source","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","datePublished":"2025-02-14T09:35:01+00:00","dateModified":"2025-02-14T09:35:04+00:00","description":"Rnote is an open-source, vector-based drawing application tailored for sketching, handwritten note-taking, and annotating documents","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/rnote\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/rnote\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Rnote-.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":23962,"url":"https:\/\/kalilinuxtutorials.com\/codecat-v0-56\/","url_meta":{"origin":36453,"position":0},"title":"Codecat v0.56 : An Open-Source Tool To Help You Find\/Track User Input Sinks And Security Bugs","author":"R K","date":"April 13, 2022","format":false,"excerpt":"CodeCat is an open-source tool to help you find\/track user input sinks and security bugs using static code analysis. These points follow regex rules. Current rules for C,C++,GO, Python, javascript, Swift, PHP, Ruby, ASP, Kotlin, Dart and Java.(you can create your rules). How too install, step by step Go to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzEcDAcpUVpdT5ZUQHawgpr8SC9Gmn1NJxvPgHWStzN0NRlLD_fJ3Qi4kIPSzPp8fNvs5HAvdCq-CsmLhAE_wOhZ_L9ZNDS9FySosDbCFIVbv2eIUdqd5lS-S5wRHq6igVxA4C7IIis8CYKle4kxPYEgND7b664mNmaPIt_8EggQOxkKFY6XS4M8_S\/s728\/Top-5-Open-Source-Source-and-Free-Static-Code-Analysis-Tools-in-2020.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzEcDAcpUVpdT5ZUQHawgpr8SC9Gmn1NJxvPgHWStzN0NRlLD_fJ3Qi4kIPSzPp8fNvs5HAvdCq-CsmLhAE_wOhZ_L9ZNDS9FySosDbCFIVbv2eIUdqd5lS-S5wRHq6igVxA4C7IIis8CYKle4kxPYEgND7b664mNmaPIt_8EggQOxkKFY6XS4M8_S\/s728\/Top-5-Open-Source-Source-and-Free-Static-Code-Analysis-Tools-in-2020.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzEcDAcpUVpdT5ZUQHawgpr8SC9Gmn1NJxvPgHWStzN0NRlLD_fJ3Qi4kIPSzPp8fNvs5HAvdCq-CsmLhAE_wOhZ_L9ZNDS9FySosDbCFIVbv2eIUdqd5lS-S5wRHq6igVxA4C7IIis8CYKle4kxPYEgND7b664mNmaPIt_8EggQOxkKFY6XS4M8_S\/s728\/Top-5-Open-Source-Source-and-Free-Static-Code-Analysis-Tools-in-2020.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjzEcDAcpUVpdT5ZUQHawgpr8SC9Gmn1NJxvPgHWStzN0NRlLD_fJ3Qi4kIPSzPp8fNvs5HAvdCq-CsmLhAE_wOhZ_L9ZNDS9FySosDbCFIVbv2eIUdqd5lS-S5wRHq6igVxA4C7IIis8CYKle4kxPYEgND7b664mNmaPIt_8EggQOxkKFY6XS4M8_S\/s728\/Top-5-Open-Source-Source-and-Free-Static-Code-Analysis-Tools-in-2020.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":27560,"url":"https:\/\/kalilinuxtutorials.com\/protectmytooling\/","url_meta":{"origin":36453,"position":1},"title":"ProtectMyTooling : Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry","author":"R K","date":"November 8, 2022","format":false,"excerpt":"ProtectMyTooling is a script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected Red Team implants. Your perfect companion in Malware Development CI\/CD pipeline, helping watermark your artifacts, collect IOCs, backdoor and more. ProtectMyToolingGUI.py With ProtectMyTooling you can quickly obfuscate your binaries without\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32551,"url":"https:\/\/kalilinuxtutorials.com\/tracecat\/","url_meta":{"origin":36453,"position":2},"title":"Tracecat &#8211; Revolutionizing Security Automation With Open Source Excellence","author":"Varshini","date":"April 1, 2024","format":false,"excerpt":"Tracecat is currently in public alpha. If you'd like to use Tracecat in production, please reach out to us on Discord or\u00a0founders@tracecat.com!\u00a0Want to take Tracecat for a spin? Try out our\u00a0tutorials\u00a0with\u00a0Tracecat Cloud\u00a0or\u00a0self-hosted. Tracecat\u00a0is an open source automation platform for security teams. We're building the features of Tines \/ Splunk SOAR\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgzgjLvWWPzYpFu2O558YPMfsXTap-hmwHULhYYgrj0l-UzMGYFe_UiJkd01tB1MLhrM8jynmyTgCXrJ4e9CkOLsqv-ya6-Um9N7d5lQPskFOBV33Kch8dAjXuV4GOXPT1qkRDlg8jXEnqOJx4spjlty6EDXIHmOusw1s8-gj2hectt5S8KkufXpZvbukfy\/s16000\/NVIDIA%20ChatRTX%20Privilege%20Escalation%20Vulnerability%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27008,"url":"https:\/\/kalilinuxtutorials.com\/kics-2\/","url_meta":{"origin":36453,"position":3},"title":"kics : Find security vulnerabilities, compliance issues, and infrastructure misconfigurations","author":"R K","date":"September 16, 2022","format":false,"excerpt":"KICS, which stands for Keeping Infrastructure as Code Secure, is an essential component of every cloud-native project and is open source. Use KICS by Checkmarx to identify security flaws, legal compliance problems, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code. How it Works KICS's built-in extensibility is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtBN_X6UrAQUh5yvttS2CWTcqfGBEJEmm7Dsxdj36EOQUbPOGVaPWoj0uvVVxuqe8ohQ_lg3Weud4SSzMLeZFZhqyEzONeANhpEbhhFfJJMTDRLyIjTmYiG8lVQOBF1eivm8dhq-kN08qKTB5lxPRvkV_-XSAMsxfJHKx47dW3kcnqHNrTVew8H7ry\/s400\/kics_hat_color_new%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":34780,"url":"https:\/\/kalilinuxtutorials.com\/pentestgpt\/","url_meta":{"origin":36453,"position":4},"title":"PentestGPT &#8211; A Comprehensive Guide To Local And Hosted Deployment","author":"Varshini","date":"September 10, 2024","format":false,"excerpt":"PentestGPT provides advanced AI and integrated tools to help security teams conduct comprehensive penetration tests effortlessly. Scan, exploit, and analyze web applications, networks, and cloud environments with ease and precision, without needing expert skills. A Special Note Of Thanks Thank you so much,\u00a0@fkesheh\u00a0and\u00a0@Fx64b, for your amazing work and dedication to\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgllNRMRSW5voU1phzv7NGlQ4m4XLJ7WSw2fXIlfG5gqCZiJbpuxT9kcoMVwq1Jxb9dw2MQHim10-mStWfOtSa684S50owVMT8Actx4mHf0ztAZ2bsxdUsw0okS6oIW8_-l8cxVFQr8OA0fxHHRuBc7ldiQQFqWknchwGb6v9U7QX-ZaXYgY_LQ5lWG1Lsi\/s16000\/PentestGPT%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36210,"url":"https:\/\/kalilinuxtutorials.com\/obfuscar\/","url_meta":{"origin":36453,"position":5},"title":"Obfuscar : Minimalistic Obfuscation Tool For .NET Assemblies","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"Obfuscar is an open-source obfuscation tool specifically designed for .NET assemblies. Released under the MIT license, it provides developers with essential obfuscation features to protect sensitive information and intellectual property within .NET applications. The tool is maintained by LeXtudio Inc. and has gained popularity for its simplicity and effectiveness. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Obfuscar-1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=36453"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36453\/revisions"}],"predecessor-version":[{"id":36457,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36453\/revisions\/36457"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/36458"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=36453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=36453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=36453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}