{"id":4595,"date":"2019-04-14T10:10:49","date_gmt":"2019-04-14T04:40:49","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4595"},"modified":"2019-04-14T10:10:49","modified_gmt":"2019-04-14T04:40:49","slug":"qrljacking-a-attack-vector","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/","title":{"rendered":"QRLJacking : A New Social Engineering Attack Vector"},"content":{"rendered":"\n<p>QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the \u201cLogin with QR code\u201d feature as a secure way to login into accounts. <\/p>\n\n\n\n<p>In a nutshell, the victim scans the attacker\u2019s QR code which results in session hijacking.<\/p>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/mysql-magic-dump-mysql\/\" target=\"_blank\" rel=\"noreferrer noopener\">MySQL Magic: Dump MySQL Client Password From Memory<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Technical Paper<\/strong><\/p>\n\n\n\n<p>The technical paper clarifying everything about the QRLJacking attack vector can be found directly via our Wiki.<br>\nVulnerable Web Applications and Services<\/p>\n\n\n\n<p>There are a lot of well-known web applications and services which were vulnerable to this attack until the date we wrote this paper. Here are some examples (that we have reported) including, but not limited to:<br><\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Chat Applications<\/strong><\/p>\n\n\n\n<p>WhatsApp, WeChat, Line, Weibo, QQ Instant Messaging<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Mailing Services<\/strong><\/p>\n\n\n\n<p>QQ Mail (Personal and Business Corporate), Yandex Mail<\/p>\n\n\n\n<p><strong>eCommerce<\/strong><\/p>\n\n\n\n<p>Alibaba, Aliexpress, Taobao, Tmall, 1688.com, Alimama, Taobao Trips<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Online Banking<\/strong><\/p>\n\n\n\n<p>AliPay, Yandex Money, TenPay<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Passport Services \u201cCritical\u201d<\/strong><\/p>\n\n\n\n<p>Yandex Passport (Yandex Mail, Yandex Money, Yandex Maps, Yandex Videos, etc\u2026)<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Mobile Management Software<\/strong><\/p>\n\n\n\n<p>AirDroid<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Other Services<\/strong><\/p>\n\n\n\n<p>MyDigiPass, Zapper &amp; Zapper WordPress Login by QR Code plugin, Trustly App, Yelophone, Alibaba Yunos<\/p>\n\n\n\n<p style=\"text-align:left\"><strong>Demo Video<\/strong><\/p>\n\n\n\n<p>Attacking WhatsApp Web Application and performing a MITM attack to inject a bogus ad including WhatsApp QR Code<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.youtube.com\/watch?v=JCoPSdQvESc\n<\/div><\/figure>\n\n\n\n<p> <strong>Credit <\/strong>: Mohamed Abdelbasset Elnouby <\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/OWASP\/QRLJacking\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the \u201cLogin with QR code\u201d feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker\u2019s QR code which results in session hijacking. Also Read [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1058,2701],"class_list":["post-4595","post","type-post","status-publish","format-standard","hentry","category-kali","tag-engineering-attack-vector","tag-qrljacking"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>QRLJacking : A New Social Engineering Attack Vector<\/title>\n<meta name=\"description\" content=\"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"QRLJacking : A New Social Engineering Attack Vector\" \/>\n<meta property=\"og:description\" content=\"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-14T04:40:49+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"QRLJacking : A New Social Engineering Attack Vector\",\"datePublished\":\"2019-04-14T04:40:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\"},\"wordCount\":233,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"Engineering Attack Vector\",\"QRLJacking\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\",\"name\":\"QRLJacking : A New Social Engineering Attack Vector\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-04-14T04:40:49+00:00\",\"description\":\"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"QRLJacking : A New Social Engineering Attack Vector","description":"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/","og_locale":"en_US","og_type":"article","og_title":"QRLJacking : A New Social Engineering Attack Vector","og_description":"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications","og_url":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-04-14T04:40:49+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"QRLJacking : A New Social Engineering Attack Vector","datePublished":"2019-04-14T04:40:49+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/"},"wordCount":233,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["Engineering Attack Vector","QRLJacking"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/","url":"https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/","name":"QRLJacking : A New Social Engineering Attack Vector","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-04-14T04:40:49+00:00","description":"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/qrljacking-a-attack-vector\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10717,"url":"https:\/\/kalilinuxtutorials.com\/qrljacking\/","url_meta":{"origin":4595,"position":0},"title":"QRLJacking : Hijack Services That Relies On QR Code Authentication","author":"R K","date":"June 10, 2020","format":false,"excerpt":"QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the Login with QR code feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker\u2019s QR code which results\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4651,"url":"https:\/\/kalilinuxtutorials.com\/0d1n-web-security-tool\/","url_meta":{"origin":4595,"position":1},"title":"0d1n : Web Security Tool to Make Fuzzing at HTTP\/S","author":"R K","date":"April 16, 2019","format":false,"excerpt":"0d1n is a tool for automating customized attacks against web applications. Let us have a look on the features the Web Security Tool Supports. brute force login and passwords in auth formsdirectory disclosure ( use PATH list to brute, and find HTTP status code )test to find SQL Injection and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28962,"url":"https:\/\/kalilinuxtutorials.com\/social-engineering-toolkit-tutorial\/","url_meta":{"origin":4595,"position":2},"title":"How to Use Social Engineering Toolkit(SET) &#8211; A Complete Guide","author":"Varshini","date":"April 26, 2023","format":false,"excerpt":"The Social Engineering Toolkit (SET) is a Kali Linux operating system software program. SET is a powerful tool for conducting various social engineering attacks, including phishing, spear-phishing, and other social engineering attacks. Multiple attack vectors: SET provides a variety of attack vectors, including email, SMS, USB, and more. Easy customization:\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJgeY06JwB4UM99E0wsszcbTM8NPBkE3xJCQSRt5N5VCbnWJYI-UznQMpQxlNvUogNowm7T8IRgoOYSGV0aduEsWgPxKC-uooWZjBoNjGDU3zJZpB2Udg6vnlB49Mz5VULVu0-SIMfdMDZoOf2r1xTsxtmor8CsskGpV64_qKuPUX3oq2yxvmwbJvKMQ\/s16000\/kalilinuxtutorials.com.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJgeY06JwB4UM99E0wsszcbTM8NPBkE3xJCQSRt5N5VCbnWJYI-UznQMpQxlNvUogNowm7T8IRgoOYSGV0aduEsWgPxKC-uooWZjBoNjGDU3zJZpB2Udg6vnlB49Mz5VULVu0-SIMfdMDZoOf2r1xTsxtmor8CsskGpV64_qKuPUX3oq2yxvmwbJvKMQ\/s16000\/kalilinuxtutorials.com.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJgeY06JwB4UM99E0wsszcbTM8NPBkE3xJCQSRt5N5VCbnWJYI-UznQMpQxlNvUogNowm7T8IRgoOYSGV0aduEsWgPxKC-uooWZjBoNjGDU3zJZpB2Udg6vnlB49Mz5VULVu0-SIMfdMDZoOf2r1xTsxtmor8CsskGpV64_qKuPUX3oq2yxvmwbJvKMQ\/s16000\/kalilinuxtutorials.com.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjJgeY06JwB4UM99E0wsszcbTM8NPBkE3xJCQSRt5N5VCbnWJYI-UznQMpQxlNvUogNowm7T8IRgoOYSGV0aduEsWgPxKC-uooWZjBoNjGDU3zJZpB2Udg6vnlB49Mz5VULVu0-SIMfdMDZoOf2r1xTsxtmor8CsskGpV64_qKuPUX3oq2yxvmwbJvKMQ\/s16000\/kalilinuxtutorials.com.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":38636,"url":"https:\/\/kalilinuxtutorials.com\/microsoft-authenticator-flaw-could-leak-login-codes\/","url_meta":{"origin":4595,"position":3},"title":"Microsoft Authenticator Flaw Could Leak Login Codes","author":"0xSnow","date":"March 13, 2026","format":false,"excerpt":"A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or authentication deep links to a malicious app installed on the same mobile device. The issue, tracked as CVE-2026-26123, affects both Android and iOS and was published on March 10, 2026. Public CVE data rates the\u2026","rel":"","context":"In &quot;News&quot;","block_context":{"text":"News","link":"https:\/\/kalilinuxtutorials.com\/category\/news\/"},"img":{"alt_text":"Microsoft Authenticator Flaw Could Leak Login Codes","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEJkP5VSUCvIWZcBhMkKCJlt_JO3aFht3tNBbFBAkKSQmGf4gHcIb3q7NOWRjwCMIZHcyvCzdo-wAWyvVsoccpbb5hyumCvF6VEjzh8a_xil2WY8Lm3bLgfCYHfsFR4Z8MeKNho82qbKx2D68ws96ITrFcdOpfEZnqn85hyphenhyphenCLBcxNg7UklX4fkJuV8vYA\/s963\/microsoft%20code%20leak%20flaw.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEJkP5VSUCvIWZcBhMkKCJlt_JO3aFht3tNBbFBAkKSQmGf4gHcIb3q7NOWRjwCMIZHcyvCzdo-wAWyvVsoccpbb5hyumCvF6VEjzh8a_xil2WY8Lm3bLgfCYHfsFR4Z8MeKNho82qbKx2D68ws96ITrFcdOpfEZnqn85hyphenhyphenCLBcxNg7UklX4fkJuV8vYA\/s963\/microsoft%20code%20leak%20flaw.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEJkP5VSUCvIWZcBhMkKCJlt_JO3aFht3tNBbFBAkKSQmGf4gHcIb3q7NOWRjwCMIZHcyvCzdo-wAWyvVsoccpbb5hyumCvF6VEjzh8a_xil2WY8Lm3bLgfCYHfsFR4Z8MeKNho82qbKx2D68ws96ITrFcdOpfEZnqn85hyphenhyphenCLBcxNg7UklX4fkJuV8vYA\/s963\/microsoft%20code%20leak%20flaw.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiEJkP5VSUCvIWZcBhMkKCJlt_JO3aFht3tNBbFBAkKSQmGf4gHcIb3q7NOWRjwCMIZHcyvCzdo-wAWyvVsoccpbb5hyumCvF6VEjzh8a_xil2WY8Lm3bLgfCYHfsFR4Z8MeKNho82qbKx2D68ws96ITrFcdOpfEZnqn85hyphenhyphenCLBcxNg7UklX4fkJuV8vYA\/s963\/microsoft%20code%20leak%20flaw.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32456,"url":"https:\/\/kalilinuxtutorials.com\/formthief\/","url_meta":{"origin":4595,"position":4},"title":"FormThief &#8211; A Deceptive Approach To Spoofing Windows Desktop Logins","author":"Varshini","date":"March 22, 2024","format":false,"excerpt":"FormThief is a project designed for spoofing Windows desktop login applications using WinForms and WPF. Below is an example run for KeePass\u00a0 Windows Forms (WinForms) and Windows Presentation Foundation (WPF) are two powerful UI frameworks provided by Microsoft for building desktop applications on the Windows platform. While they are primarily\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj372HCuiqr0PCpS2Fvwu1shE8vZaz6XJRTjE1o1JqQnvaoWVfz03pCiU5P9GIyof4XGSIG-FC18ZVBLMSHtowKF9jk2ap2_4HMYbDO6J7_Bq8YSEZjmLmF1P8TH_jzXCGR-Qgnllp1HGvf4xbZYpViRM_6uyUct2wu9Km1T7YGd6RarMKwxbOnkBmWUHmZ\/s16000\/AutoSmuggle%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":38657,"url":"https:\/\/kalilinuxtutorials.com\/ai-generated-malware-campaign-scales-threats-through-vibe-coding-techniques\/","url_meta":{"origin":4595,"position":5},"title":"AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques","author":"0xSnow","date":"March 19, 2026","format":false,"excerpt":"A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are increasingly using \u201cvibe coding\u201d to automate and scale malicious operations. This approach relies on large language models to generate functional code from simple prompts, reducing the need for advanced programming expertise and accelerating malware development\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFQIiRRRDeS4Z3WvrjfPr20R5ObtO-qSuuHA3Qk9FEXA0Q5MMlmYd_X0LWkGpFj-hIgqJsEacuR8mYhkXHJ9al3q0LRZzU6QNbuGg9m34vCaRXghOLSzuQmnVR_E0opQJZoHAbwC6CNLPmT3Pp-tu027cCCGQ9Cq2Nq3FLqCIVMFgzsrbeli__eiy6drU\/s700\/ai%20gen%20malware.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFQIiRRRDeS4Z3WvrjfPr20R5ObtO-qSuuHA3Qk9FEXA0Q5MMlmYd_X0LWkGpFj-hIgqJsEacuR8mYhkXHJ9al3q0LRZzU6QNbuGg9m34vCaRXghOLSzuQmnVR_E0opQJZoHAbwC6CNLPmT3Pp-tu027cCCGQ9Cq2Nq3FLqCIVMFgzsrbeli__eiy6drU\/s700\/ai%20gen%20malware.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFQIiRRRDeS4Z3WvrjfPr20R5ObtO-qSuuHA3Qk9FEXA0Q5MMlmYd_X0LWkGpFj-hIgqJsEacuR8mYhkXHJ9al3q0LRZzU6QNbuGg9m34vCaRXghOLSzuQmnVR_E0opQJZoHAbwC6CNLPmT3Pp-tu027cCCGQ9Cq2Nq3FLqCIVMFgzsrbeli__eiy6drU\/s700\/ai%20gen%20malware.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhFQIiRRRDeS4Z3WvrjfPr20R5ObtO-qSuuHA3Qk9FEXA0Q5MMlmYd_X0LWkGpFj-hIgqJsEacuR8mYhkXHJ9al3q0LRZzU6QNbuGg9m34vCaRXghOLSzuQmnVR_E0opQJZoHAbwC6CNLPmT3Pp-tu027cCCGQ9Cq2Nq3FLqCIVMFgzsrbeli__eiy6drU\/s700\/ai%20gen%20malware.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4595"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4595\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}