{"id":36706,"date":"2025-02-26T10:58:20","date_gmt":"2025-02-26T10:58:20","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=36706"},"modified":"2025-02-26T10:58:22","modified_gmt":"2025-02-26T10:58:22","slug":"appflowy-cloud","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/","title":{"rendered":"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud Infrastructure"},"content":{"rendered":"\n<p><a href=\"https:\/\/kalilinuxtutorials.com\/tag\/appflowy-cloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">AppFlowy Cloud<\/a> is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and real-time WebSocket communication. <\/p>\n\n\n\n<p>Built with Rust, it ensures high performance and reliability for users seeking a seamless collaborative experience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Core Features<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>User Authentication<\/strong>: AppFlowy Cloud supports secure login mechanisms, including email-based Magic Links and third-party integrations like GitHub and Discord.<\/li>\n\n\n\n<li><strong>File Storage<\/strong>: It offers scalable and efficient storage solutions for user data, <a href=\"https:\/\/github.com\/AppFlowy-IO\/AppFlowy-Cloud\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ensuring accessibility <\/a>across devices.<\/li>\n\n\n\n<li><strong>Real-time Communication<\/strong>: WebSocket-based infrastructure enables instant updates and smooth collaboration within shared workspaces.<\/li>\n<\/ol>\n\n\n\n<p>Deploying AppFlowy Cloud is straightforward and flexible. Users can self-host the service on local servers or cloud platforms like AWS EC2. The process involves:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Setting up environment configurations (<code>.env<\/code> file).<\/li>\n\n\n\n<li>Running dependency servers using Docker Compose.<\/li>\n\n\n\n<li>Starting the server with Rust commands (<code>cargo run<\/code>).<\/li>\n<\/ul>\n\n\n\n<p>A detailed deployment guide is available to assist users in configuring their systems efficiently.<\/p>\n\n\n\n<p>Developers can contribute to AppFlowy Cloud by setting up a local development environment. Key steps include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Installing dependencies like Rust and Docker.<\/li>\n\n\n\n<li>Configuring the <code>.env<\/code> file for SMTP or other settings.<\/li>\n\n\n\n<li>Running the server locally using provided scripts (<code>.\/script\/run_local_server.sh<\/code>).<\/li>\n\n\n\n<li>Testing the setup with <code>cargo test<\/code>.<\/li>\n<\/ul>\n\n\n\n<p>The project encourages community contributions via GitHub, offering labeled issues for both novice and experienced developers.<\/p>\n\n\n\n<p>AppFlowy Cloud provides comprehensive debugging capabilities:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PostgreSQL<\/strong>: Manage databases with PgAdmin or command-line tools.<\/li>\n\n\n\n<li><strong>Redis<\/strong>: Use <code>redis-cli<\/code> for cache management.<\/li>\n\n\n\n<li><strong>Minio<\/strong>: Access a web-based UI for file storage management.<\/li>\n\n\n\n<li><strong>Portainer<\/strong>: Simplify Docker container management through its intuitive interface.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Contributing To AppFlowy Cloud<\/strong><\/h2>\n\n\n\n<p>Contributions are central to AppFlowy&#8217;s growth. Developers can propose features, fix bugs, or enhance existing functionalities by following GitHub workflows. The community-driven approach ensures continuous improvement of this open-source platform.<\/p>\n\n\n\n<p>AppFlowy Cloud exemplifies a privacy-first, extensible solution for collaborative workspaces, making it an excellent choice for individuals and organizations prioritizing data security and customization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and real-time WebSocket communication. Built with Rust, it ensures high performance and reliability for users seeking a seamless collaborative experience. Core Features Deploying AppFlowy Cloud is straightforward and flexible. Users can self-host the service on local [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":36709,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38],"tags":[7189,737,6321,6052,6325],"class_list":["post-36706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-software","tag-appflowy-cloud","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AppFlowy Cloud : Enhancing Collaboration With Secure Cloud<\/title>\n<meta name=\"description\" content=\"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud\" \/>\n<meta property=\"og:description\" content=\"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-26T10:58:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-26T10:58:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud Infrastructure\",\"datePublished\":\"2025-02-26T10:58:20+00:00\",\"dateModified\":\"2025-02-26T10:58:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\"},\"wordCount\":305,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp\",\"keywords\":[\"AppFlowy Cloud\",\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\",\"name\":\"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp\",\"datePublished\":\"2025-02-26T10:58:20+00:00\",\"dateModified\":\"2025-02-26T10:58:22+00:00\",\"description\":\"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud","description":"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/","og_locale":"en_US","og_type":"article","og_title":"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud","og_description":"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and","og_url":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-02-26T10:58:20+00:00","article_modified_time":"2025-02-26T10:58:22+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud Infrastructure","datePublished":"2025-02-26T10:58:20+00:00","dateModified":"2025-02-26T10:58:22+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/"},"wordCount":305,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","keywords":["AppFlowy Cloud","cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/","url":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/","name":"AppFlowy Cloud : Enhancing Collaboration With Secure Cloud","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","datePublished":"2025-02-26T10:58:20+00:00","dateModified":"2025-02-26T10:58:22+00:00","description":"AppFlowy Cloud is a robust component of the AppFlowy ecosystem, designed to provide secure user authentication, efficient file storage, and","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/appflowy-cloud\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/AppFlowy-Cloud.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":31039,"url":"https:\/\/kalilinuxtutorials.com\/gator\/","url_meta":{"origin":36706,"position":0},"title":"GATOR &#8211; A Comprehensive GCP Attack Toolkit For Offensive Research","author":"Varshini","date":"October 27, 2023","format":false,"excerpt":"GATOR\u00a0-\u00a0GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments. It offers a comprehensive range of modules tailored to support users in various attack stages, spanning from Reconnaissance to Impact. Modules Resource CategoryPrimary ModuleCommand GroupOperationDescriptionUser Authenticationauth-activateActivate a Specific Authentication Method-addAdd a New\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgMu4wPiygpUVTYXK_ZUVaOQHcrvkkLoG0vnBnFx9GhdXFyFSG1spuCtAVS1CgBgSgUrR3z_uKJQQhqCziWwaq0BtFJMZuMkrudpjBeQcnDqW8maIwltVxMGC37WGIh4qHERBdi-Ovxz3NAIQ4u3A446j-4QnVMhF72HOtaMlYKSeP6F7mpf_SSwklBVq62\/s16000\/Untitled%20design%20%2843%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33515,"url":"https:\/\/kalilinuxtutorials.com\/cloudbrute\/","url_meta":{"origin":36706,"position":1},"title":"CloudBrute &#8211; Unleashing Automated Security Testing Across Multiple Cloud Platforms","author":"Varshini","date":"June 27, 2024","format":false,"excerpt":"A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean, Alibaba, Vultr, Linode). The outcome is useful for bug bounty hunters, red teamers, and penetration testers alike. Motivation we are always thinking of something we can automate to make black-box\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh66s_yVDMz0lfxBLFXC8B-YBilehRPAwOEQfH5691eDIuIXCM-gSGjd9StuhPF2zCsPU-uxK08yjuUXD-D7dtxMHyDGMyIVu8F2HTVTmFk3fi-iuIJAaf6Cb5pa7w8kIGNGlf613G8a-If2jZU0FeAp12M6I4k48GlU-Vxutz9FOO1h9Fci4ebC3ojMRf6\/s16000\/CloudBrute%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36658,"url":"https:\/\/kalilinuxtutorials.com\/msftrecon\/","url_meta":{"origin":36706,"position":2},"title":"MSFTRecon : A Powerful Reconnaissance Tool For Microsoft 365 And Azure","author":"Varshini","date":"February 24, 2025","format":false,"excerpt":"MSFTRecon is a specialized reconnaissance tool designed for red teamers and security professionals to map and analyze Microsoft 365 and Azure tenant infrastructures. Its primary focus is on identifying potential security misconfigurations and attack vectors without requiring authentication, making it an invaluable asset for penetration testing and security assessments. Key\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/MSFTRecon-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":26416,"url":"https:\/\/kalilinuxtutorials.com\/terraformgoat\/","url_meta":{"origin":36706,"position":3},"title":"TerraformGoat\u00a0: &#8220;Vulnerable By Design&#8221; Multi Cloud Deployment Tool","author":"R K","date":"August 15, 2022","format":false,"excerpt":"TerraformGoat is selefra research lab's \"Vulnerable by Design\" multi cloud deployment tool. Currently supported cloud vendors include Alibaba Cloud, Tencent Cloud, Huawei Cloud, Amazon Web Services, Google Cloud Platform, Microsoft Azure. \u00a0Scenarios IDCloud Service CompanyTypes Of Cloud ServicesVulnerable Environment1Alibaba CloudNetworkingVPC Security Group Open All Ports2Alibaba CloudNetworkingVPC Security Group Open Common\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiGpmW6oj349WBwsplepSKvP-0OdFgHEM0T4RIvMFmKuQAbkk8o22DsNxpUHs5iqfTgFwCkPUDgsAPsFrceYgZqUUwB2iRLHf4f0HTq9XaP8T2DFsUfYByDHQE7EveGae4RqPVPNc6WtZDcyNUX9eKi5ItroQ3gZVk-QlGDOMS2clSe7cPqMoq3CdN0\/s676\/1620081912-blog-library-product-terraform-cloud.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiGpmW6oj349WBwsplepSKvP-0OdFgHEM0T4RIvMFmKuQAbkk8o22DsNxpUHs5iqfTgFwCkPUDgsAPsFrceYgZqUUwB2iRLHf4f0HTq9XaP8T2DFsUfYByDHQE7EveGae4RqPVPNc6WtZDcyNUX9eKi5ItroQ3gZVk-QlGDOMS2clSe7cPqMoq3CdN0\/s676\/1620081912-blog-library-product-terraform-cloud.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiGpmW6oj349WBwsplepSKvP-0OdFgHEM0T4RIvMFmKuQAbkk8o22DsNxpUHs5iqfTgFwCkPUDgsAPsFrceYgZqUUwB2iRLHf4f0HTq9XaP8T2DFsUfYByDHQE7EveGae4RqPVPNc6WtZDcyNUX9eKi5ItroQ3gZVk-QlGDOMS2clSe7cPqMoq3CdN0\/s676\/1620081912-blog-library-product-terraform-cloud.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":31562,"url":"https:\/\/kalilinuxtutorials.com\/photo-location-finder\/","url_meta":{"origin":36706,"position":4},"title":"Photo Location Finder: Using Google Cloud Vision API to Detect Landmarks and Labels in Images","author":"Varshini","date":"December 20, 2023","format":false,"excerpt":"This is a Python code to detect landmarks, labels and web entities in a set of images using Google Cloud Vision API. The code takes a JSON configuration file that contains the API key and credentials file path for the Google Cloud Vision API, as well as other optional parameters,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhs4u8juunFvay-IM3daqxhfjScnASDaUpM0V0Rg8pukllM-7jnNiaOTaJqchKTKLuUVhQPdeZs0mjnGKHlatvpHqAYz-Cmt6Oi3wCIrJSQ2q_zENJCRcEsmYipQuHwtIpaNlN9IaBVsFmjyE7hS0HupX2Xm5A7FqhKB6jhVQ22TgfY0SsotbDINvu5kQ\/s16000\/Photo%20Location%20Finder.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":34603,"url":"https:\/\/kalilinuxtutorials.com\/veiltransfer\/","url_meta":{"origin":36706,"position":5},"title":"VeilTransfer &#8211; Mastering Data Exfiltration Simulation For Enhanced Cybersecurity","author":"Varshini","date":"August 27, 2024","format":false,"excerpt":"VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data exfiltration techniques used by advanced threat actors, allowing organizations to evaluate and improve their security posture. By leveraging multiple exfiltration methods such as MEGA, Github, SFTP, WebDAV, and more, VeilTransfer helps\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjdcnXfsO54mtdqlnoGH7oiKrkioqCgj_NVGb54PSMiDn4FlkSyTk6XTe6aKM_o1_0-VwwkH4LDYLS6CwFqnPNaDCdWIb4UYeJpQUC8FQo1xvZ3XzPt4xucThZMSIsU6Ss3vzmna4ZzX_qyWcG8LQZjHJ4_YYbqhpTzXdIFqcb8M-cw3BL36yitMR6VT8fE\/s16000\/VeilTransfer%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=36706"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36706\/revisions"}],"predecessor-version":[{"id":36711,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/36706\/revisions\/36711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/36709"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=36706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=36706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=36706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}