{"id":4281,"date":"2019-03-20T20:52:13","date_gmt":"2019-03-20T15:22:13","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4281"},"modified":"2019-03-20T20:52:13","modified_gmt":"2019-03-20T15:22:13","slug":"armory-external-discovery-data","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/","title":{"rendered":"Armory : A Tool Meant to Take in a Lot of External &#038; Discovery Data"},"content":{"rendered":"\n<p>Armory is a tool meant to take in a lot of external and discovery \ndata from a lot of tools, add it to a database and correlate all of \nrelated information. It isn&#8217;t meant to replace any specific tool. It is \nmeant to take the output from various tools, and use it to feed other \ntools.<\/p>\n\n\n\n<p>Additionally, it is meant to be easily extendable. Don&#8217;t see a module  for your favorite tool? Write one up! Want to export data in just the  right format for your reporting? Create a new report!<\/p>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/mad-metasploit\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Mad Metasploit : Metasploit Custom Modules, Plugins &amp; Resource Script (opens in a new tab)\">Mad Metasploit : Metasploit Custom Modules, Plugins &amp; Resource Script<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>First, set up some kind of virtual environment of your choice.<\/p>\n\n\n\n<p>Clone the repo:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/depthsecurity\/armory<\/strong><\/p>\n\n\n\n<p>Install the module:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python setup.py install<\/strong><\/p>\n\n\n\n<p>You will want to run <code>armory<\/code> at least once in order to create the default config directory: <code><strong>~\/.armory<\/strong><\/code> with the default <code><strong>settings.ini<\/strong><\/code> and settings for each of the modules.<\/p>\n\n\n\n<p>Next edit <em>settings.ini<\/em> and modify the <strong>base_path<\/strong> option. This should point to the root path you are using <em>for your current project<\/em>.  <\/p>\n\n\n\n<p>You should change this with every project, so you will always be using a  clean database. All files generated by modules will be created in here,  as well as the sqlite3 database. <strong>By default it will be within the current directory-<code>.<\/code><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-text-color has-background has-very-dark-gray-color has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>Usage is split into modules and reports.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Modules<\/strong><\/p>\n\n\n\n<p>Modules run tools, ingest output, and write it to the database. To see a list of available modules, type:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>armory -lm<\/strong><\/p>\n\n\n\n<p>To see a list of module options, type:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>armory -m  -M<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong> Reports<\/strong><\/p>\n\n\n\n<p>Reports are similar to modules, except they are meant to pull data from the database, and display it in a usable format. To view all of the available reports:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>armory -lr<\/strong><\/p>\n\n\n\n<p>To view available report options:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>armory -r  -R<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Interactive Shell<\/strong><\/p>\n\n\n\n<p>There is also an interactive shell which uses IPython as the base and will allow you to run commands or change database values. It can be launched with: armory-shell. <\/p>\n\n\n\n<p>By default, the following will be available: Domain, BaseDomains, IPAddresses, CIDRs, Users, Creds, Vulns, Ports, Urls, ScopeCIDRs.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/depthsecurity\/armory\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information. It isn&#8217;t meant to replace any specific tool. It is meant to take the output from various tools, and use it to feed other [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[233,761,869],"class_list":["post-4281","post","type-post","status-publish","format-standard","hentry","category-kali","tag-armory","tag-database","tag-discovery-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Armory : A Tool Meant to Take in a Lot of External &amp; Discovery Data<\/title>\n<meta name=\"description\" content=\"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Armory : A Tool Meant to Take in a Lot of External &amp; Discovery Data\" \/>\n<meta property=\"og:description\" content=\"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-20T15:22:13+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Armory : A Tool Meant to Take in a Lot of External &#038; Discovery Data\",\"datePublished\":\"2019-03-20T15:22:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\"},\"wordCount\":368,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"Armory\",\"database\",\"Discovery Data\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\",\"name\":\"Armory : A Tool Meant to Take in a Lot of External & Discovery Data\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-03-20T15:22:13+00:00\",\"description\":\"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Armory : A Tool Meant to Take in a Lot of External & Discovery Data","description":"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/","og_locale":"en_US","og_type":"article","og_title":"Armory : A Tool Meant to Take in a Lot of External & Discovery Data","og_description":"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.","og_url":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-03-20T15:22:13+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Armory : A Tool Meant to Take in a Lot of External &#038; Discovery Data","datePublished":"2019-03-20T15:22:13+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/"},"wordCount":368,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["Armory","database","Discovery Data"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/","url":"https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/","name":"Armory : A Tool Meant to Take in a Lot of External & Discovery Data","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-03-20T15:22:13+00:00","description":"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/armory-external-discovery-data\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1930,"url":"https:\/\/kalilinuxtutorials.com\/armory\/","url_meta":{"origin":4281,"position":0},"title":"Armory &#8211; Tool To Take Lot Of External &#038; Discovery Data","author":"R K","date":"July 15, 2018","format":false,"excerpt":"Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information. It isn't meant to replace any specific tool. It is meant to take the output from various tools, and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4296,"url":"https:\/\/kalilinuxtutorials.com\/remot3d-pentesters\/","url_meta":{"origin":4281,"position":1},"title":"Remot3d : A Simple Tool Created for Large Pentesters","author":"R K","date":"March 21, 2019","format":false,"excerpt":"Remot3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors. A tool made to generate backdoor to control and exploit a server where the server runs the PHP (Hypertext Preprocessor) program. Equipped with a backdoor that has\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35055,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-for-penetration-testing\/","url_meta":{"origin":4281,"position":2},"title":"Metasploit for Penetration Testing and Exploitation &#8211; 2024","author":"Rajashekar Yasani","date":"August 7, 2024","format":false,"excerpt":"Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":34572,"url":"https:\/\/kalilinuxtutorials.com\/findsploit\/","url_meta":{"origin":4281,"position":3},"title":"Findsploit &#8211; The Ultimate Tool For Exploit Discovery And Management","author":"Varshini","date":"August 23, 2024","format":false,"excerpt":"Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes \"copysploit\" to copy any exploit-db exploit to the current directory and \"compilesploit\" to automatically compile and run any C exploit (ie. .\/copysploit 1337.c && .\/compilesploit 1337.c). For updates to\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh6jqYzDFmokl0jauIklOSehFlNnjkKxO9wUp5VOgk-mSmZd8C2JSIzx8F-5CeKKjnVcNIS0qkDKse2gY3DIpmTxKhUYOzKE2WJgjRQhYnRaLwHlrjNsX-JiZ69HTO8b1-xfGg9x8t8XtmyxpOUtRbrpTMN1zTSZxCBYMvlDbti-F5NQbGoOXJvYKdHWPY3\/s16000\/Findsploit%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3968,"url":"https:\/\/kalilinuxtutorials.com\/top-10-best-web-hacking-tools\/","url_meta":{"origin":4281,"position":4},"title":"Top 10 Best Web Hacking Tools","author":"Pricilla","date":"February 20, 2019","format":false,"excerpt":"Here is the best web hacking tools that helps you in pen-testing and protecting the websites. Burp Suite: Burp Suite is a graphical tool used for testing Web application security. It helps you identify vulnerabilities and verify attack vectors that are affecting web applications. While browsing the target application, a\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":170,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-framework\/","url_meta":{"origin":4281,"position":5},"title":"Metasploit Framework &#8211; A Beginner\u2019s Guide for Penetration Testing &#038; Exploit Development","author":"Ravi Sankar","date":"December 15, 2022","format":false,"excerpt":"Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools bundled into a single framework. It is available in all major Linux, Windows, OS X platforms. Its main objective is to test your\/company's\/organization's defenses by attacking\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Metasploit Framework","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5-33tkRgJkO9Jcfd912Irh4FiJVbQgVYIt48TcJziyt2a_V-eZNnCO1KwxBAgzNWi1Z0xfu2AHUdRiOnNmMwW460tgmWfAtvVVBw9_ARx0wk8qD8jT_9obTHUWNwWb8V0r7izYycNgXhMkh3-rXl3AFIyQZyYZqcZln9nirZ3HIdTWas5BsSGMJKM\/s16000\/Metasploit%20Framework.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5-33tkRgJkO9Jcfd912Irh4FiJVbQgVYIt48TcJziyt2a_V-eZNnCO1KwxBAgzNWi1Z0xfu2AHUdRiOnNmMwW460tgmWfAtvVVBw9_ARx0wk8qD8jT_9obTHUWNwWb8V0r7izYycNgXhMkh3-rXl3AFIyQZyYZqcZln9nirZ3HIdTWas5BsSGMJKM\/s16000\/Metasploit%20Framework.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5-33tkRgJkO9Jcfd912Irh4FiJVbQgVYIt48TcJziyt2a_V-eZNnCO1KwxBAgzNWi1Z0xfu2AHUdRiOnNmMwW460tgmWfAtvVVBw9_ARx0wk8qD8jT_9obTHUWNwWb8V0r7izYycNgXhMkh3-rXl3AFIyQZyYZqcZln9nirZ3HIdTWas5BsSGMJKM\/s16000\/Metasploit%20Framework.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi5-33tkRgJkO9Jcfd912Irh4FiJVbQgVYIt48TcJziyt2a_V-eZNnCO1KwxBAgzNWi1Z0xfu2AHUdRiOnNmMwW460tgmWfAtvVVBw9_ARx0wk8qD8jT_9obTHUWNwWb8V0r7izYycNgXhMkh3-rXl3AFIyQZyYZqcZln9nirZ3HIdTWas5BsSGMJKM\/s16000\/Metasploit%20Framework.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4281","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4281"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4281\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}