{"id":10020,"date":"2020-03-30T21:03:54","date_gmt":"2020-03-30T15:33:54","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10020"},"modified":"2020-03-30T21:03:54","modified_gmt":"2020-03-30T15:33:54","slug":"ninja","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/ninja\/","title":{"rendered":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations"},"content":{"rendered":"\n<p><strong>Ninja C2<\/strong> is an Open source C2 server created by Purple Team to do  stealthy computer and Active directory enumeration without being  detected by SIEM and AVs , it still in beta version and when the  stable version released it will contains many more stealthy techniques  and anti-forensic to create a real challenge for blue team to make sure  all the defenses configured correctly and they can detect sophisticated  attacks.<\/p>\n\n\n\n<p>It use python to server the payload and control the agents . the  agents are based on C# and powershell which can bypass leading AVs .  Ninja communicate with the agents in secure channel encrypted with  AES-256 and the key is not hard coded but randomly generated on the  campaign start , every agent connect to the C2 get the key and if the C2  restarted a new key will be used by all old agents and the new. Ninja  also randomize the callback URLs for every campaign to bypass static  detection.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>The main feature in Ninja is called DA ( Defense Analysis ), which  will do the required enumeration to get below important information and  do analysis on them to get score for system defenses and sandbox  detection .<\/li><li>Detect SIEM solutions : right now it detect SPlUNK , Log beat collector ,  sysmon.<\/li><li>detect AV using two ways , using powershell command and using processes.<\/li><li>check if the powershell logging enabled<\/li><li>check if the user have admin privileges<\/li><li>provide information about system : host name , OS , build number , local time , time zone , last boot and bios .<\/li><li>provide information about the installed security updates.<\/li><li>provide a System pwn hardness score based on multiple factors.<\/li><li>provide a sandbox detection score based on ( privileges , bios  manufacturer , joined to domain  or  not ,  existence of  sysinternals  processes ).<\/li><li>show all domain  users ( using powershell commands ).<\/li><li>show all domain groups ( using powershell commands ) .<\/li><li>show all domain computers  ( using powerview.ps1 &#8211; taken from : <a href=\"https:\/\/github.com\/PowerShellEmpire\/PowerTools\/blob\/master\/PowerView\/powerview.ps1\">https:\/\/github.com\/PowerShellEmpire\/PowerTools\/blob\/master\/PowerView\/powerview.ps1<\/a> ).<\/li><li>show available shares.<\/li><\/ul>\n\n\n\n<p>Ninja is designed to be easy to setup and to add more commands and do  automation for boring tasks. you can find many short commands that a  red teamer struggle to memorize and search for them. please check this  article to know more about ninja : <a href=\"https:\/\/shells.systems\/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations\/\">https:\/\/shells.systems\/introducing-ninja-c2-the-c2-built-for-stealth-red-team-operations\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/xxexploiter\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"XXExploiter : Tool To Help Exploit XXE Vulnerabilities (opens in a new tab)\">XXExploiter : Tool To Help Exploit XXE Vulnerabilities<\/a><\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/ahmedkhlief\/Ninja#ninja-key-features\"><\/a><\/h1>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<p>It is packed with a number of features that allows you to gain an  insight into your upcoming engagement before you actually need to deploy  your full aresenal or tools and techniques, such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Defense Analysis<\/li><li>automation for kerberoast attack from generating the kerberos tickets to extracting the SPN hashes into hashcat format.<\/li><li>automation for dc_sync to get hashes for a list of users or domain admin group.<\/li><li>Undetected Automation to get groups the user belong to and the users member in a group.<\/li><li>Automation for bloodhound AD data collection .<\/li><li>customized c# payloads that encrypt strings to bypass static detection.<\/li><li>encode any command you want to unicode base64 to be used in powershell encoded commands.<\/li><li>full encryption of all communications between Agent and command and control to bypass AV and IPS detection.<\/li><li>dynamic URLs for all function , just place your list of url names \nand the c2 will use it randomly to bypass any static detection.<\/li><li>get random encryption key on the fly ( not hard coded ) every time the agent connect ( even reconnection needs a new key )<\/li><li>take screenshots and send it encrypted to C2<\/li><li>upload files from C2 to victim encrypted to bypass AV and IPS<\/li><li>download files from the victim encrypted to bypass AV and IPS<\/li><li>staged payloads to bypass detection ( base64 and base52 )<\/li><li>bypasses AVs ( tested on kaspersky and trendmicro )<\/li><li>Bypasses SIEM detection ( tested on splunk collecting usual event \nlogs along with sysmon logs ) not tested on powershell v5 script block \nand module logging ( will be done in the next release ).<\/li><li>set the beacon interval dynamically even after the agent connected \nand provide a starting beacon interval in the campaign start \nconfigurations<\/li><li>logging for all commands and results in order to return to any data you missed in your operation.<\/li><li>set the configuration one time when you start the campaign and enjoy.<\/li><li>global kill switch to end campaigns.<\/li><li>delete table entries.<\/li><li>all the payload written to payloads folder for easy access and further customization.<\/li><li>easy to add automation for any command you want.<\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/ahmedkhlief\/Ninja#requirement\"><\/a><\/h1>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Requirement<\/strong><\/p>\n\n\n\n<p>Please note that compling C# depends on the <code><strong>System.Management.Automation.dll<\/strong><\/code> assembly with SHA1 hash c669667bb4d7870bc8bb65365d30071eb7fb86fe.<\/p>\n\n\n\n<p>Some Ninja Commands require below modules ( already exist in modules ) which you need to get updates from their repo :<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Invoke-Kerberoast : <a href=\"https:\/\/raw.githubusercontent.com\/xan7r\/kerberoast\/master\/autokerberoast.ps1\">https:\/\/raw.githubusercontent.com\/xan7r\/kerberoast\/master\/autokerberoast.ps1<\/a><\/li><li>Invoke-Mimikatz: <a href=\"https:\/\/github.com\/PowerShellMafia\/PowerSploit\/blob\/master\/Exfiltration\/Invoke-Mimikatz.ps1\">https:\/\/github.com\/PowerShellMafia\/PowerSploit\/blob\/master\/Exfiltration\/Invoke-Mimikatz.ps1<\/a><\/li><li>Sharphound: <a href=\"https:\/\/github.com\/BloodHoundAD\/BloodHound\/blob\/master\/Ingestors\/SharpHound.ps1\">https:\/\/github.com\/BloodHoundAD\/BloodHound\/blob\/master\/Ingestors\/SharpHound.ps1<\/a><\/li><li>PowerView: <a href=\"https:\/\/github.com\/PowerShellEmpire\/PowerTools\/blob\/master\/PowerView\/powerview.ps1\">https:\/\/github.com\/PowerShellEmpire\/PowerTools\/blob\/master\/PowerView\/powerview.ps1<\/a><\/li><\/ul>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/ahmedkhlief\/Ninja#installation\"><\/a><\/h1>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>First of all make sure to download the latest version of Ninja using the following command :<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/ahmedkhlief\/Ninja\/<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You need to setup Ninja by running install.sh script :<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>chmod +x .\/install.sh sudo .\/install.sh<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>After that you need to initialize the campagin :<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python start_campaign.py<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Now you can start the Ninja server  :<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python Ninja.py<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You will by greeted with the following once you run it :<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Ninja C2 | Stealthy Pwn like a Ninja<br>Command        Description                                                                        <br>&#8212;&#8212;-        &#8212;&#8212;&#8212;&#8211;  <\/strong>                                                                      <br>exit           Exit the console , or kill the agent                                               <br>list           List all agents                                                                    <br>help           Help menu                                                                          <br>show           Show Command and Controler variables                                               <br>use            Interact with AGENT                                                                <br>back           Back to the main                                                                   <br>payload        Show Payloads                                                                      <br>load           load modules                                                                       <br>kill_all       kill all agents                                                                    <br>delete         delete agent from the list                                                         <br>delete_all     delete all agents in the list                                                      <br>set-beacon     set the beacon interval live for agent                                             <br>download       download file from the vicitm                                                      <br>downloads      list downloaded files                                                              <br>upload         upload files to the victim                                                         <br>modules        list all the Available modules in Modules directory                                <br>encode64       encode any command to base64 encoded UTF-8 command ( can be decoded in powershell)<br>screenshot     take screenshot form  the victim                                                   <br>DA             Run defense Analysis Module                                                        <br>kerb           do kerberoast attack  and dump  service accounts hashes                            <br>dcsync_admins  do dcsync attack agains domain admins group                                        <br>dcsync_list    do dcsync attack agains custom user list                                           <br>get_groups     get all the groups user is member of                                               <br>get_users      get all the users member in group                                                  <br>bloodhound     run bloodhound to collect all the information about the AD <\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>To Do<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li> Enhance DA module and add more SIEM , AV and sandbox detection along with more important eenumeration data.<\/li><li> more focus on stealth to load agent parts only when needed<\/li><li> add more shortend commands for popular modules<\/li><li> add more customizations and ideas for phishing using C# payloads and macros<\/li><li> integration with curveball exploit<\/li><li> integration with new exchange RCE<\/li><li> Undetectable Persistence<\/li><li> create a wipe command to securly remove files on hard disk without being detected and analyzed by blue team.<\/li><li> make the agent blocks changes randomly to bypass any static detection<\/li><li> add obfuscation for the agents.<\/li><li> integrate cobalt strike payloads<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<p><strong> Main Screen <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-oopgW8RxVH0\/Xn-OYCtZRbI\/AAAAAAAAFuE\/kUMOzbLEB9Amf4l0-z8zUeEIXrwaczOEwCLcBGAsYHQ\/s1600\/Main%2BScreen.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Payloads<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-8HnqE0Re9n4\/Xn-OevgT_6I\/AAAAAAAAFuI\/4RNRH4z7ig8MUwztoacNiRjNfYYKgPwnwCLcBGAsYHQ\/s1600\/Payloads.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Agent List <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-BQp7xgxICi0\/Xn-OllyzxAI\/AAAAAAAAFuM\/kf0E7xKmzZABRdHXa_nI2bRF-ERdPRjMwCLcBGAsYHQ\/s1600\/Agent%2BList.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>DA <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-6Dmq27f7JHA\/Xn-O2QNIxJI\/AAAAAAAAFuc\/hmv33ZuURYUW-qCquesX0b2LREZ5ay5gwCLcBGAsYHQ\/s1600\/DA.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>DA <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-kp_wNgxHCW4\/Xn-O_iJ0gaI\/AAAAAAAAFug\/Vaa4aTdTyVIPl6dsDlIM50mvzZnf_RCEwCLcBGAsYHQ\/s1600\/DA-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>DA <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-Kb4cEYgBoxQ\/Xn-PQmNtuxI\/AAAAAAAAFus\/kl7PsW270lg9WudJ4zuZT8g1zS6LkB7zACLcBGAsYHQ\/s1600\/DA-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>DA<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-RkP_HolUQiA\/Xn-PYcuzC_I\/AAAAAAAAFuw\/gnAseDF_QSksb_n55NB6BcCNXYnBJoTfwCLcBGAsYHQ\/s1600\/DA-3.png\" alt=\"\"\/><\/figure><\/div>\n\n\n\n<p><strong>Upload File<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-UIpW149PLZU\/Xn-PgCrjR_I\/AAAAAAAAFu0\/Wcl792YAEiM70SExBVrA3t_AZzd3JJWUwCLcBGAsYHQ\/s1600\/Upload%2Bfile.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Download File <\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-uy54B5menhQ\/Xn-PmXHzfzI\/AAAAAAAAFu4\/4zWeyitDHdohccrDhs2ejzQTra2lMZZugCLcBGAsYHQ\/s1600\/Download%2BFile.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/ahmedkhlief\/Ninja#todo\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs , it still in beta version and when the stable version released it will contains many more stealthy techniques and anti-forensic to create a real challenge for blue [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16204,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","fifu_image_alt":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2254,2255,2330,2768],"class_list":["post-10020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-ninja","tag-ninja-c2","tag-open-source","tag-red-team"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ninja : Open Source C2 Server Created For Stealth Red Team Operations<\/title>\n<meta name=\"description\" content=\"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/ninja\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ninja : Open Source C2 Server Created For Stealth Red Team Operations\" \/>\n<meta property=\"og:description\" content=\"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/ninja\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-30T15:33:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Ninja : Open Source C2 Server Created For Stealth Red Team Operations\",\"datePublished\":\"2020-03-30T15:33:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/\"},\"wordCount\":1182,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\",\"keywords\":[\"Ninja\",\"Ninja C2\",\"Open-source\",\"Red Team\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/ninja\/\",\"name\":\"Ninja : Open Source C2 Server Created For Stealth Red Team Operations\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\",\"datePublished\":\"2020-03-30T15:33:54+00:00\",\"description\":\"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/ninja\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations","description":"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/ninja\/","og_locale":"en_US","og_type":"article","og_title":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations","og_description":"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs","og_url":"https:\/\/kalilinuxtutorials.com\/ninja\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-03-30T15:33:54+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/ninja\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/ninja\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations","datePublished":"2020-03-30T15:33:54+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ninja\/"},"wordCount":1182,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","keywords":["Ninja","Ninja C2","Open-source","Red Team"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/ninja\/","url":"https:\/\/kalilinuxtutorials.com\/ninja\/","name":"Ninja : Open Source C2 Server Created For Stealth Red Team Operations","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","datePublished":"2020-03-30T15:33:54+00:00","description":"Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without being detected by SIEM and AVs","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/ninja\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/ninja\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-1qfhT5pLaxQ\/Xn-SBAp0R3I\/AAAAAAAAFvE\/RjF3SeoQXHUJGeWNePzTPk6DH6leM3cbgCLcBGAsYHQ\/s1600\/Main%2BScreen%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":10020,"position":0},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":25612,"url":"https:\/\/kalilinuxtutorials.com\/octopus\/","url_meta":{"origin":10020,"position":1},"title":"Octopus : Open Source Pre-Operation C2 Server Based On Python And Powershell","author":"R K","date":"June 28, 2022","format":false,"excerpt":"Octopus is an open source, pre-operation C2 server based on python which can control an Octopus powershell agent through HTTP\/S. The main purpose of creating Octopus is for use before any red team operation, where rather than starting the engagement with your full operational arsenal and infrastructure, you can use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTZbCWORa02MXvHjn018KDN2jEKWcD4kF_ep1xUYB8Ye2yKGc97r06piLAVHyy8sdmok0ITN9z_s1GJPy8ur0T-skzoIx_dXzKddrxc4_L6hgG5naLDg5CNNrZmsrE11wp_B1ytKB3VpWwYrgmYmnBeuDZJDAlfR5Q-YlGc6W-6MWqkN_MxYchjh1A\/s728\/images%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTZbCWORa02MXvHjn018KDN2jEKWcD4kF_ep1xUYB8Ye2yKGc97r06piLAVHyy8sdmok0ITN9z_s1GJPy8ur0T-skzoIx_dXzKddrxc4_L6hgG5naLDg5CNNrZmsrE11wp_B1ytKB3VpWwYrgmYmnBeuDZJDAlfR5Q-YlGc6W-6MWqkN_MxYchjh1A\/s728\/images%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTZbCWORa02MXvHjn018KDN2jEKWcD4kF_ep1xUYB8Ye2yKGc97r06piLAVHyy8sdmok0ITN9z_s1GJPy8ur0T-skzoIx_dXzKddrxc4_L6hgG5naLDg5CNNrZmsrE11wp_B1ytKB3VpWwYrgmYmnBeuDZJDAlfR5Q-YlGc6W-6MWqkN_MxYchjh1A\/s728\/images%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhTZbCWORa02MXvHjn018KDN2jEKWcD4kF_ep1xUYB8Ye2yKGc97r06piLAVHyy8sdmok0ITN9z_s1GJPy8ur0T-skzoIx_dXzKddrxc4_L6hgG5naLDg5CNNrZmsrE11wp_B1ytKB3VpWwYrgmYmnBeuDZJDAlfR5Q-YlGc6W-6MWqkN_MxYchjh1A\/s728\/images%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31057,"url":"https:\/\/kalilinuxtutorials.com\/commander\/","url_meta":{"origin":10020,"position":2},"title":"Commander &#8211; Secure Python C2 Framework","author":"Varshini","date":"January 29, 2025","format":false,"excerpt":"Commander is a command and control framework (C2) written in Python, Flask and SQLite. It\u00a0comes with two agents written in Python and C. Under Continuous Development Not script-kiddie friendly Features Fully encrypted communication (TLS) Multiple Agents Obfuscation Interactive Sessions Scalable Base64 data encoding RESTful API Agents Python 3 The python\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":13992,"url":"https:\/\/kalilinuxtutorials.com\/mythic\/","url_meta":{"origin":10020,"position":3},"title":"Mythic : A Collaborative, Multi-Platform, Red Teaming Framework","author":"R K","date":"July 2, 2021","format":false,"excerpt":"Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming. Installing Agents and C2 Profiles The Mythic repository itself does not host any Payload\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34979,"url":"https:\/\/kalilinuxtutorials.com\/c2-server-installation\/","url_meta":{"origin":10020,"position":4},"title":"C2 Server Installation &#8211; A Comprehensive Guide For Red Team Operations","author":"Varshini","date":"September 25, 2024","format":false,"excerpt":"Setting up a Command and Control (C2) server is a critical step in establishing a robust red team infrastructure. This guide provides a detailed walkthrough on how to install and configure your C2 server, ensuring seamless integration with tools like Filebeat and RedELK. Follow these essential steps to enhance your\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgC9jJPm3JYpODjyPBql7TFV93Yt5jXaIus-551YvveVZKNjCYVhyJs7m0GRWbOyMo4BaiYl7zR1Tzkqkb0gCnVklsdK8MT22rnYObFjWobAU2IrzpWKoZIYWvHvRxBZsRMRnHc9FK1JffzUbVaEyOKuutIplDA_6hmvNqsaZhv42tCXClwDBtPufGL8s2V\/s1600\/C2%20Server%20Installation.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":18009,"url":"https:\/\/kalilinuxtutorials.com\/zuthaka\/","url_meta":{"origin":10020,"position":5},"title":"Zuthaka : An Open Source Application Designed To Assist Red-Teaming Efforts, By Simplifying The Task Of Managing Different APTs And Other Post-Exploitation Tools","author":"R K","date":"September 20, 2021","format":false,"excerpt":"Zuthaka is a collaborative free open-source Command & Control integration framework that allows developers to concentrate on the core function and goal of their C2. About The Project Problem Statement The current C2s ecosystem has rapidly grown in order to adapt to modern red team operations and diverse needs (further\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-c7qcVezw4S0\/YTSXlgh8b_I\/AAAAAAAAKsg\/iLAuM-nnGFcIOT4kQ7HRABSFjKi0m5-4QCLcBGAsYHQ\/s1396\/variables-imagotipo-a-full-color-zuthaka-f-%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-c7qcVezw4S0\/YTSXlgh8b_I\/AAAAAAAAKsg\/iLAuM-nnGFcIOT4kQ7HRABSFjKi0m5-4QCLcBGAsYHQ\/s1396\/variables-imagotipo-a-full-color-zuthaka-f-%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-c7qcVezw4S0\/YTSXlgh8b_I\/AAAAAAAAKsg\/iLAuM-nnGFcIOT4kQ7HRABSFjKi0m5-4QCLcBGAsYHQ\/s1396\/variables-imagotipo-a-full-color-zuthaka-f-%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-c7qcVezw4S0\/YTSXlgh8b_I\/AAAAAAAAKsg\/iLAuM-nnGFcIOT4kQ7HRABSFjKi0m5-4QCLcBGAsYHQ\/s1396\/variables-imagotipo-a-full-color-zuthaka-f-%2B%25281%2529.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-c7qcVezw4S0\/YTSXlgh8b_I\/AAAAAAAAKsg\/iLAuM-nnGFcIOT4kQ7HRABSFjKi0m5-4QCLcBGAsYHQ\/s1396\/variables-imagotipo-a-full-color-zuthaka-f-%2B%25281%2529.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10020"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16204"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}