{"id":10488,"date":"2020-05-05T20:33:07","date_gmt":"2020-05-05T15:03:07","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10488"},"modified":"2020-05-05T20:33:07","modified_gmt":"2020-05-05T15:03:07","slug":"thoron","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/thoron\/","title":{"rendered":"Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability"},"content":{"rendered":"\n<p><strong>Thoron <\/strong>Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework has the ability to generate simple payloads to provide Linux tcp attack.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-CfjF2jrZew4\/Xq7fVxqKfLI\/AAAAAAAAGJo\/S8ovjkfgBnYNLsEE5XbGC66lLyGiNho2ACLcBGAsYHQ\/s1600\/Thoron-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Getting Started<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Installation<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cd thoron<br>chmod +x install.sh<br>.\/install.sh<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>UN-Installation<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cd thoron<br>chmod +x uninstall.sh<br>.\/uninstall.sh<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Framework execution<\/strong><\/li><\/ul>\n\n\n\n<p>To execute Thoron Framework you should execute the following command.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>thoron<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211;  <a href=\"https:\/\/kalilinuxtutorials.com\/print-my-shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">Print-My-Shell : Process Of Generating Various Reverse Shells<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Why Thoron Framework<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Simple and clear UX\/UI.<\/strong><\/li><\/ul>\n\n\n\n<p>Thoron Framework has a simple and clear UX\/UI. It is easy to understand and it will be easier for you to master the Thoron Framework.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>A lot of different payloads<\/strong>.<\/li><\/ul>\n\n\n\n<p>There are a lot of different payloads in Thoron Framework such as Shell, Python and C payloads.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Powerful ThorCat listener.<\/strong><\/li><\/ul>\n\n\n\n<p>There is a powerful ThorCat listener in Thoron Framework that supports secure SSL connection and other useful functions.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-_dTsEY7M2xI\/Xq7fQGCcoII\/AAAAAAAAGJk\/Fj9oWDzzB0AW1k5v1JIJDNzSu2T7YU_bQCLcBGAsYHQ\/s1600\/Thoron-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Usage of the Thoron Framework for attacking targets without prior mutual consent is illegal. It is the end user&#8217;s responsibility to obey all applicable local, state, federal, and international laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/entynetproject\/thoron\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework has the ability to generate simple payloads to provide Linux tcp attack. Getting Started Installation cd thoronchmod +x install.sh.\/install.sh UN-Installation cd thoronchmod +x uninstall.sh.\/uninstall.sh Framework execution To execute Thoron Framework you should execute the following command. thoron [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16282,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","fifu_image_alt":"Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-10488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Thoron : A Linux Post-Exploitation Framework 2020<\/title>\n<meta name=\"description\" content=\"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/thoron\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Thoron : A Linux Post-Exploitation Framework 2020\" \/>\n<meta property=\"og:description\" content=\"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/thoron\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T15:03:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability\",\"datePublished\":\"2020-05-05T15:03:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/\"},\"wordCount\":208,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/thoron\/\",\"name\":\"Thoron : A Linux Post-Exploitation Framework 2020\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\",\"datePublished\":\"2020-05-05T15:03:07+00:00\",\"description\":\"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/thoron\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Thoron : A Linux Post-Exploitation Framework 2020","description":"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/thoron\/","og_locale":"en_US","og_type":"article","og_title":"Thoron : A Linux Post-Exploitation Framework 2020","og_description":"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework","og_url":"https:\/\/kalilinuxtutorials.com\/thoron\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-05T15:03:07+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/thoron\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/thoron\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability","datePublished":"2020-05-05T15:03:07+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/thoron\/"},"wordCount":208,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/thoron\/","url":"https:\/\/kalilinuxtutorials.com\/thoron\/","name":"Thoron : A Linux Post-Exploitation Framework 2020","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","datePublished":"2020-05-05T15:03:07+00:00","description":"Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/thoron\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/thoron\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-NUU1EQQdNWY\/Xq7fobfqQoI\/AAAAAAAAGJw\/DZ8Awlv0DoIhzP02ay9ESPKkhf6Nw8cXwCLcBGAsYHQ\/s1600\/Thoron.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10535,"url":"https:\/\/kalilinuxtutorials.com\/sshprank\/","url_meta":{"origin":10488,"position":0},"title":"SSHPrank : A Fast SSH Mass-Scanner, Login Cracker &#038; Banner Grabber","author":"R K","date":"May 10, 2020","format":false,"excerpt":"SSHPrank is a fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan and shodan module. Usage Notes quick'n'dirty codesshprank is already packaged and available for BlackArch LinuxMy master-branches are always stable; dev-branches are created for current work.All of my public stuff you find are officially announced and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28063,"url":"https:\/\/kalilinuxtutorials.com\/shennina\/","url_meta":{"origin":10488,"position":1},"title":"Shennina : Automating Host Exploitation With AI","author":"R K","date":"December 23, 2022","format":false,"excerpt":"Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning\/analysis, and exploitation using Artificial Intelligence. Shennina is integrated with Metasploit and Nmap for performing the attacks, as well as being integrated with an in-house Command-and-Control Server for exfiltrating data from\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYAz4wmorKUemm-g0eme6tQsk6nZ_gVcSZ-Ffs5ENVIDRJ8IfWiRIqVFPLZv7cpYz80CR02FJ-B26AXrnI_RSb2bBccQrmmXf-dik3xH3Lt8XARoQtoQysPrbeVwNnggUx2mwi4PO-8LI-CMaMq89DYAEEFOP3r1ZcU8_iobdyuZqrGaisl3nl-NEN\/s728\/Shennina%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYAz4wmorKUemm-g0eme6tQsk6nZ_gVcSZ-Ffs5ENVIDRJ8IfWiRIqVFPLZv7cpYz80CR02FJ-B26AXrnI_RSb2bBccQrmmXf-dik3xH3Lt8XARoQtoQysPrbeVwNnggUx2mwi4PO-8LI-CMaMq89DYAEEFOP3r1ZcU8_iobdyuZqrGaisl3nl-NEN\/s728\/Shennina%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYAz4wmorKUemm-g0eme6tQsk6nZ_gVcSZ-Ffs5ENVIDRJ8IfWiRIqVFPLZv7cpYz80CR02FJ-B26AXrnI_RSb2bBccQrmmXf-dik3xH3Lt8XARoQtoQysPrbeVwNnggUx2mwi4PO-8LI-CMaMq89DYAEEFOP3r1ZcU8_iobdyuZqrGaisl3nl-NEN\/s728\/Shennina%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYAz4wmorKUemm-g0eme6tQsk6nZ_gVcSZ-Ffs5ENVIDRJ8IfWiRIqVFPLZv7cpYz80CR02FJ-B26AXrnI_RSb2bBccQrmmXf-dik3xH3Lt8XARoQtoQysPrbeVwNnggUx2mwi4PO-8LI-CMaMq89DYAEEFOP3r1ZcU8_iobdyuZqrGaisl3nl-NEN\/s728\/Shennina%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":4550,"url":"https:\/\/kalilinuxtutorials.com\/industrial-control-system\/","url_meta":{"origin":10488,"position":2},"title":"ISF : Industrial Control System Exploitation Framework","author":"R K","date":"April 11, 2019","format":false,"excerpt":"ISF(Industrial Control System Exploitation Framework)\uff0ca exploitation framework based on Python. Industrial Control System is based on open source project routersploit. ICS Protocol Clients NamePathDescriptionmodbus_tcp_clienticssploit\/clients\/modbus_tcp_client.pyModbus-TCP Clientwdb2_clienticssploit\/clients\/wdb2_client.pyWdbRPC Version 2 Client(Vxworks 6.x)s7_clienticssploit\/clients\/s7_client.pys7comm Client(S7 300\/400 PLC) Also Read - Darksplitz : Exploit Framework Exploit Module NamePathDescriptions7_300_400_plc_controlexploits\/plcs\/siemens\/s7_300_400_plc_control.pyS7-300\/400 PLC start\/stops7_1200_plc_controlexploits\/plcs\/siemens\/s7_1200_plc_control.pyS7-1200 PLC start\/stop\/resetvxworks_rpc_dosexploits\/plcs\/vxworks\/vxworks_rpc_dos.pyVxworks RPC remote dos\uff08CVE-2015-7599\uff09quantum_140_plc_controlexploits\/plcs\/schneider\/quantum_140_plc_control.pySchneider Quantum\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35055,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-for-penetration-testing\/","url_meta":{"origin":10488,"position":3},"title":"Metasploit for Penetration Testing and Exploitation &#8211; 2024","author":"Rajashekar Yasani","date":"August 7, 2024","format":false,"excerpt":"Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":37081,"url":"https:\/\/kalilinuxtutorials.com\/oscp\/","url_meta":{"origin":10488,"position":4},"title":"OSCP : Navigating The Essential Toolkit For Penetration Testing","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration testing skills. To achieve this certification, candidates must demonstrate proficiency in using various tools and techniques to identify vulnerabilities and exploit them. Here's an overview of some key tools and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2863,"url":"https:\/\/kalilinuxtutorials.com\/drozer-2-4-4-android\/","url_meta":{"origin":10488,"position":5},"title":"Drozer v2.4.4 &#8211; The Leading Security Assessment Framework For Android","author":"R K","date":"October 1, 2018","format":false,"excerpt":"Drozer 2.4.4\u00a0 is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. Drozer provides tools to help you use,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10488"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16282"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}