{"id":37205,"date":"2025-03-21T11:21:17","date_gmt":"2025-03-21T11:21:17","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=37205"},"modified":"2025-03-21T11:21:19","modified_gmt":"2025-03-21T11:21:19","slug":"squid","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/squid\/","title":{"rendered":"Squid : A RISC-V Emulator For Vulnerability Research"},"content":{"rendered":"\n<p><a href=\"https:\/\/kalilinuxtutorials.com\/tag\/squid\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Squid<\/strong> <\/a>is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT) compilation instead of Just-In-Time (JIT), allowing users to rewrite binary code before emulation. <\/p>\n\n\n\n<p>This feature provides full control over system calls and events during runtime, making it ideal for creating custom sanitizers and test programs to detect various vulnerabilities beyond just memory corruptions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Features Of Squid<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Fast Snapshots<\/strong>: Squid supports quick snapshots, which are useful for saving and restoring the state of the emulator during testing.<\/li>\n\n\n\n<li><strong>Byte-Level Permissions on Memory<\/strong>: This feature allows for precise control over memory access, enhancing the ability to detect and analyze memory-related vulnerabilities.<\/li>\n\n\n\n<li><strong>Rewriting Binaries Before Emulation<\/strong>: Users can modify the binary code before running it in the emulator, enabling the creation of custom test scenarios.<\/li>\n\n\n\n<li><strong>Integration with LibAFL<\/strong>: Squid integrates with the LibAFL fuzzing framework, enhancing its capabilities for vulnerability detection.<\/li>\n<\/ul>\n\n\n\n<p>Squid is designed to run single-threaded Linux user-space applications written in C. It requires the target binary to be compiled with specific flags:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">bash<code>-fPIE -pie -O0 -g -fno-jump-tables -mno-relax -D__thread=<\/code><\/pre>\n\n\n\n<p>This makes Squid unsuitable for blackbox fuzzing but highly effective for greybox fuzzing when combined with native fuzzers.<\/p>\n\n\n\n<p>One of Squid&#8217;s notable capabilities is overcoming the limitations of <a href=\"https:\/\/github.com\/fkie-cad\/squid\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">LLVM&#8217;s sanitizers<\/a>. For instance, LLVM does not allow combining multiple sanitizers like address and memory sanitizers in a single build. <\/p>\n\n\n\n<p>Squid resolves this by allowing binary rewriting, enabling users to recreate ASAN and MSAN instrumentation manually. <\/p>\n\n\n\n<p>This is achieved by compiling the target with the required flags and then instrumenting it using Squid&#8217;s custom IR and passes.<\/p>\n\n\n\n<p>To utilize Squid for enhanced vulnerability detection, users can follow these steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Load and Lift the Target Binary<\/strong>: Load the RISC-V binary into Squid&#8217;s custom Intermediate Representation (IR).<\/li>\n\n\n\n<li><strong>Run ASAN Pass<\/strong>: Insert redzones around global variables and register interceptors similar to LLVM&#8217;s ASAN.<\/li>\n\n\n\n<li><strong>Compile to Native Code<\/strong>: Translate the IR to C code and compile it with Clang.<\/li>\n\n\n\n<li><strong>Run the Binary<\/strong>: Handle system calls and interceptors during runtime to detect vulnerabilities.<\/li>\n<\/ol>\n\n\n\n<p>Squid is a versatile tool for vulnerability research, offering advanced features like binary rewriting and integration with fuzzing frameworks. <\/p>\n\n\n\n<p>While it has limitations, such as requiring specific compilation flags and supporting only single-threaded applications, Squid is a valuable asset for enhancing the detection of vulnerabilities in RISC-V systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT) compilation instead of Just-In-Time (JIT), allowing users to rewrite binary code before emulation. This feature provides full control over system calls and events during runtime, making it ideal for creating custom sanitizers and test programs to detect various [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":37207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22,25,43],"tags":[737,6321,6052,6325,7265],"class_list":["post-37205","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-et","category-hacking-tools","category-vulnerability-analysis-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-squid"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Squid : A RISC-V Emulator For Vulnerability Research<\/title>\n<meta name=\"description\" content=\"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/squid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Squid : A RISC-V Emulator For Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/squid\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T11:21:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T11:21:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Squid : A RISC-V Emulator For Vulnerability Research\",\"datePublished\":\"2025-03-21T11:21:17+00:00\",\"dateModified\":\"2025-03-21T11:21:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/\"},\"wordCount\":384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"Squid\"],\"articleSection\":[\"Exploitation Tools\",\"Hacking Tools\",\"Vulnerability Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/squid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/squid\/\",\"name\":\"Squid : A RISC-V Emulator For Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp\",\"datePublished\":\"2025-03-21T11:21:17+00:00\",\"dateModified\":\"2025-03-21T11:21:19+00:00\",\"description\":\"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/squid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Squid : A RISC-V Emulator For Vulnerability Research","description":"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/squid\/","og_locale":"en_US","og_type":"article","og_title":"Squid : A RISC-V Emulator For Vulnerability Research","og_description":"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)","og_url":"https:\/\/kalilinuxtutorials.com\/squid\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-03-21T11:21:17+00:00","article_modified_time":"2025-03-21T11:21:19+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/squid\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/squid\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Squid : A RISC-V Emulator For Vulnerability Research","datePublished":"2025-03-21T11:21:17+00:00","dateModified":"2025-03-21T11:21:19+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/squid\/"},"wordCount":384,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","Squid"],"articleSection":["Exploitation Tools","Hacking Tools","Vulnerability Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/squid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/squid\/","url":"https:\/\/kalilinuxtutorials.com\/squid\/","name":"Squid : A RISC-V Emulator For Vulnerability Research","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","datePublished":"2025-03-21T11:21:17+00:00","dateModified":"2025-03-21T11:21:19+00:00","description":"Squid is a powerful RISC-V emulator designed specifically for vulnerability research and fuzzing. It leverages Ahead-of-Time (AOT)","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/squid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/squid\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Squid.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36461,"url":"https:\/\/kalilinuxtutorials.com\/ghidra\/","url_meta":{"origin":37205,"position":0},"title":"Ghidra : A Comprehensive Tool For Software Reverse Engineering","author":"Varshini","date":"February 14, 2025","format":false,"excerpt":"Ghidra is a powerful open-source Software Reverse Engineering (SRE) framework developed by the U.S. National Security Agency (NSA). Designed to analyze compiled code from diverse platforms such as Windows, macOS, and Linux, Ghidra provides an extensive suite of tools for disassembly, decompilation, debugging, emulation, and scripting. Its versatility and extensibility\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Ghidra-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36799,"url":"https:\/\/kalilinuxtutorials.com\/spice86\/","url_meta":{"origin":37205,"position":1},"title":"Spice86 &#8211; A PC Emulator For Real Mode Reverse Engineering","author":"Varshini","date":"March 3, 2025","format":false,"excerpt":"Spice86 is an advanced PC emulator designed for reverse engineering and rewriting real-mode DOS programs, especially when the source code is unavailable. Built on .NET 8, it is compatible with Windows, macOS, and Linux, offering a robust platform for developers and researchers to dissect and reimplement legacy software. Below is\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Spice86-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36206,"url":"https:\/\/kalilinuxtutorials.com\/pebbleos\/","url_meta":{"origin":37205,"position":2},"title":"PebbleOS : A Guide To Its Framework And Development Tools","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"PebbleOS is an open-source software framework originally developed by Pebble Technology for their smartwatch ecosystem. While the repository has undergone modifications to remove proprietary components, it serves as a valuable resource for developers interested in exploring smartwatch operating systems or building custom firmware. Key Features And Functions Of PebbleOS Tools\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/PebbleOS.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":15355,"url":"https:\/\/kalilinuxtutorials.com\/radare2\/","url_meta":{"origin":37205,"position":3},"title":"Radare2 : UNIX-like Reverse Engineering Framework And Command-Line Toolset","author":"R K","date":"August 2, 2021","format":false,"excerpt":"Radare2 is a rewrite from scratch of radare. It provides a set of libraries, tools and plugins to ease reverse engineering tasks. The radare project started as a simple command-line hexadecimal editor focused on forensics, over time more features were added to support a scriptable command-line low level tool to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5336,"url":"https:\/\/kalilinuxtutorials.com\/yaazhini-vulnerability-scanner\/","url_meta":{"origin":37205,"position":4},"title":"Yaazhini &#8211; Free Android APK &#038; API Vulnerability Scanner","author":"R K","date":"June 14, 2019","format":false,"excerpt":"Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. It includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a report. System\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/t87zk2M-keg\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":11058,"url":"https:\/\/kalilinuxtutorials.com\/pentest\/","url_meta":{"origin":37205,"position":5},"title":"Pentest : Tools To Create An Pentest Environment Easily &#038; Quickly","author":"R K","date":"July 25, 2020","format":false,"excerpt":"Docker for Pentest is an image with the more used tools to create an pentest environment easily and quickly. Features OS, networking, developing and pentesting tools installed.Connection to HTB (Hack the Box) vpn to access HTB machines.Popular wordlists installed: SecLists, dirb, dirbuster, fuzzdb, wfuzz and rockyou.Proxy service to send traffic\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=37205"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37205\/revisions"}],"predecessor-version":[{"id":37208,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37205\/revisions\/37208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/37207"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=37205"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=37205"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=37205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}