{"id":5033,"date":"2019-05-18T20:58:56","date_gmt":"2019-05-18T15:28:56","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=5033"},"modified":"2019-05-18T20:58:56","modified_gmt":"2019-05-18T15:28:56","slug":"securetea","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/securetea\/","title":{"rendered":"SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access"},"content":{"rendered":"\n<p>T<strong>he OWASP SecureTea Project is an application designed to help secure a person&#8217;s laptop or computer \/ server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer \/ server.<\/strong><\/p>\n\n\n\n<p> This application uses the touchpad\/mouse\/wireless mouse to determine activity and is developed in Python and tested on various machines (Linux, Mac &amp; Windows).<\/p>\n\n\n\n<p>The software is still under development, and will eventually have it&#8217;s own IDS(Intrusion Detection System) \/ IPS(Intrusion Prevention System), firewall, anti-virus, intelligent log monitoring capabilities with web defacement detection, and support for much more communication medium. <\/p>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/ustealer-steal-ubuntu-information-in-local-pc\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Ustealer : Steal Ubuntu Information In Local PC (opens in a new tab)\">Ustealer : Steal Ubuntu Information In Local PC<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Target User<\/strong><\/p>\n\n\n\n<p>It was written to be used by anyone who is interested in IoT Security (Internet of Things) and still needs further development.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project#how-it-functions\"><\/a><strong>How it functions:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Keep track of the movement of the mouse\/touchpad<\/li><li>Detect who accesses your device(laptop\/server\/other iot device) with mouse\/touchpad installed.<\/li><li>Send warning messages on Twitter\/Twilio-SMS\/Slack\/Telegram. More features on the way.<\/li><\/ul>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project#objective\"><\/a><strong>Objective<\/strong><\/p>\n\n\n\n<p>To alert the user via various communication mechanism, whenever The Computer \/ Server had been accessed by someone \/ attacker. And also it can be used to monitor your system &amp; SecureTea firewall as Defense.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation Procedure<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project#user-guide\"><\/a><strong>User Guide<\/strong><\/p>\n\n\n\n<p>See more at&nbsp;<a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project\/blob\/master\/doc\/en-US\/user_guide.md\">User Guide<\/a>&nbsp;for translated user guides(\/doc)<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project#developer-guide\"><\/a><strong>Developer Guide<\/strong><\/p>\n\n\n\n<p>See more at&nbsp;<a href=\"https:\/\/github.com\/OWASP\/SecureTea-Project\/blob\/master\/doc\/en-US\/dev_guide.md\">Developer guide<\/a>&nbsp;for translated developer guides(\/doc)<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/OWASP\/SecureTea-Project\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The OWASP SecureTea Project is an application designed to help secure a person&#8217;s laptop or computer \/ server with IoT (Internet Of Things) and notify users (via various communication mechanisms), whenever someone accesses their computer \/ server. This application uses the touchpad\/mouse\/wireless mouse to determine activity and is developed in Python and tested on various [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15549,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","fifu_image_alt":"SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2379,2997],"class_list":["post-5033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-owasp","tag-securetea-project"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SecureTea: OWASP Application Designed To Secure Unauthorised Access<\/title>\n<meta name=\"description\" content=\"The OWASP SecureTea Project is an application designed to help secure a person&#039;s laptop or computer \/ server with IoT (Internet Of Things) and notify users\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/securetea\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SecureTea: OWASP Application Designed To Secure Unauthorised Access\" \/>\n<meta property=\"og:description\" content=\"The OWASP SecureTea Project is an application designed to help secure a person&#039;s laptop or computer \/ server with IoT (Internet Of Things) and notify users\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/securetea\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-18T15:28:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access\",\"datePublished\":\"2019-05-18T15:28:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/\"},\"wordCount\":247,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\",\"keywords\":[\"owasp\",\"SecureTea Project\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/securetea\/\",\"name\":\"SecureTea: OWASP Application Designed To Secure Unauthorised Access\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\",\"datePublished\":\"2019-05-18T15:28:56+00:00\",\"description\":\"The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer \/ server with IoT (Internet Of Things) and notify users\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/securetea\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SecureTea: OWASP Application Designed To Secure Unauthorised Access","description":"The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer \/ server with IoT (Internet Of Things) and notify users","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/securetea\/","og_locale":"en_US","og_type":"article","og_title":"SecureTea: OWASP Application Designed To Secure Unauthorised Access","og_description":"The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer \/ server with IoT (Internet Of Things) and notify users","og_url":"https:\/\/kalilinuxtutorials.com\/securetea\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-05-18T15:28:56+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/securetea\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/securetea\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access","datePublished":"2019-05-18T15:28:56+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/securetea\/"},"wordCount":247,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","keywords":["owasp","SecureTea Project"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/securetea\/","url":"https:\/\/kalilinuxtutorials.com\/securetea\/","name":"SecureTea: OWASP Application Designed To Secure Unauthorised Access","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","datePublished":"2019-05-18T15:28:56+00:00","description":"The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer \/ server with IoT (Internet Of Things) and notify users","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/securetea\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/securetea\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","contentUrl":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-RcUWcZClnoQ\/XNyzSBf3p-I\/AAAAAAAAAX8\/2AIa55IEP3cqBgyyPCbgziUZYkIuO9NfgCLcBGAs\/s1600\/setup_all.gif","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":8848,"url":"https:\/\/kalilinuxtutorials.com\/risk-assessment-framework-static-application-security-testing\/","url_meta":{"origin":5033,"position":0},"title":"Risk Assessment Framework : Static Application Security Testing","author":"R K","date":"February 6, 2020","format":false,"excerpt":"The OWASP Risk Assessment Framework consist of Static application security testing and Risk Assessment tools, Eventhough there are many SAST tools available for testers, but the compatibility and the Environment setup process is complex. By using OWASP Risk Assessment Framework's Static Application Security Testing tool Testers will be able to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-W64mUKfuKzY\/Xjtg2hxaNWI\/AAAAAAAAEuc\/u8Qb1EF84CAtxqTOlSSZCeXH1ZlnmqIQACLcBGAsYHQ\/s1600\/RiskAssessmentFramework_10.gif?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-W64mUKfuKzY\/Xjtg2hxaNWI\/AAAAAAAAEuc\/u8Qb1EF84CAtxqTOlSSZCeXH1ZlnmqIQACLcBGAsYHQ\/s1600\/RiskAssessmentFramework_10.gif?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-W64mUKfuKzY\/Xjtg2hxaNWI\/AAAAAAAAEuc\/u8Qb1EF84CAtxqTOlSSZCeXH1ZlnmqIQACLcBGAsYHQ\/s1600\/RiskAssessmentFramework_10.gif?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":28639,"url":"https:\/\/kalilinuxtutorials.com\/apkhunt\/","url_meta":{"origin":5033,"position":1},"title":"APKHunt : Comprehensive Static Code Analysis Tool For Android Apps That Is Based On The OWASP MASVS Framework","author":"R K","date":"March 27, 2023","format":false,"excerpt":"APKHunt is a comprehensive static code analysis tool for Android apps that is based on the OWASP MASVS framework. Although APKHunt is intended primarily for mobile app developers and security testers, it can be used by anyone to identify and address potential security vulnerabilities in their code. With APKHunt, mobile\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtSQOuwTK8mFbYq-KV7kAGHlXXRB8Eq6ZQL7VUJsN82id0SFo6N6a9JrhH38mzd_vI8l8reOnEDb__RJfA8JHWK1x3TDc-eqXAxm7S9VeGPBS6Fwwijo3xjYsEKEv5KLuexM5v4rWHOIccgau0eX3BKlCr8msdtk3fryFdQGQ2lONx25C-T35GDuwm\/s16000\/apk%20hunt.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtSQOuwTK8mFbYq-KV7kAGHlXXRB8Eq6ZQL7VUJsN82id0SFo6N6a9JrhH38mzd_vI8l8reOnEDb__RJfA8JHWK1x3TDc-eqXAxm7S9VeGPBS6Fwwijo3xjYsEKEv5KLuexM5v4rWHOIccgau0eX3BKlCr8msdtk3fryFdQGQ2lONx25C-T35GDuwm\/s16000\/apk%20hunt.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtSQOuwTK8mFbYq-KV7kAGHlXXRB8Eq6ZQL7VUJsN82id0SFo6N6a9JrhH38mzd_vI8l8reOnEDb__RJfA8JHWK1x3TDc-eqXAxm7S9VeGPBS6Fwwijo3xjYsEKEv5KLuexM5v4rWHOIccgau0eX3BKlCr8msdtk3fryFdQGQ2lONx25C-T35GDuwm\/s16000\/apk%20hunt.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhtSQOuwTK8mFbYq-KV7kAGHlXXRB8Eq6ZQL7VUJsN82id0SFo6N6a9JrhH38mzd_vI8l8reOnEDb__RJfA8JHWK1x3TDc-eqXAxm7S9VeGPBS6Fwwijo3xjYsEKEv5KLuexM5v4rWHOIccgau0eX3BKlCr8msdtk3fryFdQGQ2lONx25C-T35GDuwm\/s16000\/apk%20hunt.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32308,"url":"https:\/\/kalilinuxtutorials.com\/awesome-hacking\/","url_meta":{"origin":5033,"position":2},"title":"Awesome Hacking &#8211; An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration","author":"Varshini","date":"March 13, 2024","format":false,"excerpt":"A curated list of awesome Hacking. Inspired by\u00a0awesome-machine-learning If you want to contribute to this list (please do), send me a pull request! For a list of free hacking books available for download, go\u00a0here Table Of Contents System Tutorials Tools Docker General Reverse Engineering Tutorials Tools General Web Tools General\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10992,"url":"https:\/\/kalilinuxtutorials.com\/owasp-threat-dragon-desktop\/","url_meta":{"origin":5033,"position":3},"title":"OWASP Threat Dragon Desktop","author":"R K","date":"July 21, 2020","format":false,"excerpt":"Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats\/mitigations. It is an OWASP Incubator Project. The focus of the project is on great UX, a powerful rule engine and integration with other development lifecycle tools. There is a good\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3468,"url":"https:\/\/kalilinuxtutorials.com\/crs-owasp-modsecurity\/","url_meta":{"origin":5033,"position":4},"title":"CRS &#8211; OWASP ModSecurity Core Rule Set","author":"R K","date":"December 16, 2018","format":false,"excerpt":"The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. It aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts. Also ReadXSS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2251,"url":"https:\/\/kalilinuxtutorials.com\/owasp-joomla-vulnerability-scanner\/","url_meta":{"origin":5033,"position":5},"title":"Joomscan &#8211; OWASP Joomla Vulnerability Scanner Project","author":"R K","date":"August 13, 2018","format":false,"excerpt":"JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability assurance in Joomla CMS deployments. Implemented in Perl, this tool enables seamless and effortless scanning of Joomla installations, while leaving a minimal footprint with its lightweight\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=5033"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/5033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15549"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=5033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=5033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=5033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}