{"id":10520,"date":"2020-05-09T09:21:08","date_gmt":"2020-05-09T03:51:08","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10520"},"modified":"2020-05-09T09:21:08","modified_gmt":"2020-05-09T03:51:08","slug":"invoker","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/invoker\/","title":{"rendered":"Invoker : Penetration Testing Utility"},"content":{"rendered":"\n<p><strong>Invoker <\/strong>is a penetration testing utility.  The goal is to use this tool when access to some Windows OS features through GUI is restricted.<\/p>\n\n\n\n<p>Some features require administrative privileges.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Capabilities<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>invoke the Command Prompt and PowerShell,<\/li><li>download a file,<\/li><li>add a registry key,<\/li><li>schedule a task,<\/li><li>connect to a remote host,<\/li><li>terminate a running process,<\/li><li>run a new process,<\/li><li>inject bytecode into a running process,<\/li><li>inject DLL into a running process,<\/li><li>enable access token privileges,<\/li><li>duplicate access token of a running process,<\/li><li>list unquoted service paths and restart a running service,<\/li><li>replace Sticky Keys.<\/li><\/ul>\n\n\n\n<p>Built with Dev-C++ IDE v5.11 (64 bit), compiled with TDM-GCC v4.9.2 (64 bit) and tested on Windows 10 Enterprise OS (64 bit). Download Dev-C++ from <a href=\"https:\/\/sourceforge.net\/projects\/orwelldevcpp\/files\/Portable%20Releases\/\">here<\/a>.<\/p>\n\n\n\n<p>Made for educational purposes. I hope it will help!<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Invoker Library<\/strong><\/p>\n\n\n\n<p>Check all the capabilities <a href=\"https:\/\/github.com\/ivan-sincek\/invoker\/tree\/master\/src\/lib\/invoker\">here<\/a>. Feel free to use the library.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>PowerShell Scripts<\/strong><\/p>\n\n\n\n<p>Check all the PowerShell scripts used in the main C++ program <a href=\"https:\/\/github.com\/ivan-sincek\/invoker\/tree\/master\/ps\">here<\/a>.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>How to Run?<\/strong><\/p>\n\n\n\n<p>Run <a href=\"https:\/\/github.com\/ivan-sincek\/invoker\/tree\/master\/exec\">&#8216;\\exec\\Invoker.exe&#8217;<\/a>.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Bytecode Injection<\/strong><\/p>\n\n\n\n<p>Elevate privileges by injecting bytecode into a higher-privileged process.<\/p>\n\n\n\n<p>This tool can parse an HTTP response and extract the payload from a custom element, i.e. from <code><strong>&lt;img class=\"bc\" src=\"data:image\/gif;base64,payload\" alt=\"bc\" hidden=\"hidden\"&gt;<\/strong><\/code> where <code><strong>payload<\/strong><\/code> is a binary code\/file encoded in Base64.<\/p>\n\n\n\n<p>This might be useful if antivirus is constantly deleting your local payloads.<\/p>\n\n\n\n<p>You can also specify your own custom element but you will have to modify the program source code and recompile it.<\/p>\n\n\n\n<p>Check an example at <a href=\"https:\/\/pastebin.com\/raw\/Nd1tCBv6\">pastebin.com\/raw\/Nd1tCBv6<\/a>.<\/p>\n\n\n\n<p><strong>Bytecode provided will most certainly not work for you.<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Generate a Reverse Shell Payload<\/strong><\/p>\n\n\n\n<p>Find out how to generate a reverse shell payload from my other <a href=\"https:\/\/github.com\/ivan-sincek\/penetration-testing-cheat-sheet#generate-a-reverse-shell-payload\">project<\/a>.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Get the LocalSystem Account (NT AUTHORITY\\SYSTEM)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run the Invoker.exe as administrator.<\/li><li>Enable all access token privileges.<\/li><li>Duplicate the access token from e.g. Windows Logon Application (winlogon.exe) and run a new instance of Invoker.exe.<\/li><li>Within the new Invoker.exe instance, open the Command Prompt and run <code><strong>whoami<\/strong><\/code>, you should now see <strong><code>nt authority\\system<\/code>.<\/strong><\/li><li>Enable all access token privileges once again.<\/li><li>Close the old instance of Invoker.exe.<\/li><li>P.S. You get more access token privileges from Local Security Authority Subsystem Service (lsass.exe).<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Images<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-iTmhMqQXd2I\/XrQW48dNv6I\/AAAAAAAAGMs\/qeY-NLVVeHMAvXI9Ri76HY4mTTN6PkEHACLcBGAsYHQ\/s1600\/Images-1.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-884r9Hh16nw\/XrQW6M5ZadI\/AAAAAAAAGM0\/N4P9P9pCnIEBxh71EaAymdqAp6Lgr_tYwCLcBGAsYHQ\/s1600\/Images-2.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-CxnP1KpUAdU\/XrQW5hrnj3I\/AAAAAAAAGMw\/ZsozY1cHwEsTk3Ngj7p5Fwwu9Z_0xYkNwCLcBGAsYHQ\/s1600\/Images-3.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-chJXMedVcNs\/XrQW8EBSU8I\/AAAAAAAAGM4\/bHHMdINOr4A3Kr9Y-9LkeEX_HK4qnHp0ACLcBGAsYHQ\/s1600\/Images-4.jpg\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/ivan-sincek\/invoker\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted. Some features require administrative privileges. Capabilities invoke the Command Prompt and PowerShell, download a file, add a registry key, schedule a task, connect to a remote host, terminate a running process, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","fifu_image_alt":"Invoker : Penetration Testing Utility","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1662,2464,2467],"class_list":["post-10520","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-invoker","tag-penetration","tag-penetration-testing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Invoker : Penetration Testing Utility!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/invoker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Invoker : Penetration Testing Utility!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/invoker\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-09T03:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Invoker : Penetration Testing Utility\",\"datePublished\":\"2020-05-09T03:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/\"},\"wordCount\":356,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\",\"keywords\":[\"Invoker\",\"Penetration\",\"Penetration Testing\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/invoker\/\",\"name\":\"Invoker : Penetration Testing Utility!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\",\"datePublished\":\"2020-05-09T03:51:08+00:00\",\"description\":\"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/invoker\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Invoker : Penetration Testing Utility!Kalilinuxtutorials","description":"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/invoker\/","og_locale":"en_US","og_type":"article","og_title":"Invoker : Penetration Testing Utility!Kalilinuxtutorials","og_description":"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.","og_url":"https:\/\/kalilinuxtutorials.com\/invoker\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-09T03:51:08+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/invoker\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/invoker\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Invoker : Penetration Testing Utility","datePublished":"2020-05-09T03:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/invoker\/"},"wordCount":356,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","keywords":["Invoker","Penetration","Penetration Testing"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/invoker\/","url":"https:\/\/kalilinuxtutorials.com\/invoker\/","name":"Invoker : Penetration Testing Utility!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","datePublished":"2020-05-09T03:51:08+00:00","description":"Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through GUI is restricted.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/invoker\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/invoker\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-ZbYsihuW-MQ\/XrQhyPVsDKI\/AAAAAAAAGNI\/Y_OKIYejF2oDdksRdmnko43IXUjk35g4QCLcBGAsYHQ\/s1600\/Images-1.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35881,"url":"https:\/\/kalilinuxtutorials.com\/process-inject-kit\/","url_meta":{"origin":10520,"position":0},"title":"Process Inject Kit : Elevating Penetration Testing With Advanced Injection Capabilities","author":"Varshini","date":"January 29, 2025","format":false,"excerpt":"The Process Inject Kit is a specialized toolkit designed to enhance and customize process injection techniques in Cobalt Strike, a popular penetration testing tool. Originally implemented in C, it has been ported to the C++ Beacon Object File (BOF) template, providing developers with greater flexibility and efficiency in defining and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":10734,"url":"https:\/\/kalilinuxtutorials.com\/andrax\/","url_meta":{"origin":10520,"position":1},"title":"ANDRAX : NH-Killer Penetration Testing On Android","author":"R K","date":"June 12, 2020","format":false,"excerpt":"ANDRAX is a\u00a0Penetration Testing\u00a0platform developed specifically for\u00a0Android\u00a0smartphones, it has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution! The development of the tool began on 08\/09\/2016 (DD\/MM\/YYYY) only for people in Brazil ANDRAX has been fully redefined\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":21175,"url":"https:\/\/kalilinuxtutorials.com\/threadboat\/","url_meta":{"origin":10520,"position":2},"title":"ThreadBoat : Program Uses Thread Execution Hijacking To Inject Native Shell-code Into A Standard Win32 Application","author":"R K","date":"January 14, 2022","format":false,"excerpt":"ThreadBoat is a Program uses Thread Hijacking to Inject Native Shellcode into a Standard Win32 Application. About I developed this small project to continue my experiences of different code injection methods and to allow RedTeam security professionals to utilize this method as a unique way to perform software penetration testing.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiZsODXPrG4zjrQlAjSAPMnYAgP-e5mf7wQJYl3_RXs5svQfdwfsapk2HV5vLw_8E2gq62BPym8rcbgKCfr3Gaf_ZTS0QuhboCvYROBc9xKE8_VufEgbHheIFoZ0qQmhddbVKe9YekdUidovOFy2zW-7FCq5ir7Dd2EYaTti8XiffdsvTJ3iPf6djIM=s728","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiZsODXPrG4zjrQlAjSAPMnYAgP-e5mf7wQJYl3_RXs5svQfdwfsapk2HV5vLw_8E2gq62BPym8rcbgKCfr3Gaf_ZTS0QuhboCvYROBc9xKE8_VufEgbHheIFoZ0qQmhddbVKe9YekdUidovOFy2zW-7FCq5ir7Dd2EYaTti8XiffdsvTJ3iPf6djIM=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiZsODXPrG4zjrQlAjSAPMnYAgP-e5mf7wQJYl3_RXs5svQfdwfsapk2HV5vLw_8E2gq62BPym8rcbgKCfr3Gaf_ZTS0QuhboCvYROBc9xKE8_VufEgbHheIFoZ0qQmhddbVKe9YekdUidovOFy2zW-7FCq5ir7Dd2EYaTti8XiffdsvTJ3iPf6djIM=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiZsODXPrG4zjrQlAjSAPMnYAgP-e5mf7wQJYl3_RXs5svQfdwfsapk2HV5vLw_8E2gq62BPym8rcbgKCfr3Gaf_ZTS0QuhboCvYROBc9xKE8_VufEgbHheIFoZ0qQmhddbVKe9YekdUidovOFy2zW-7FCq5ir7Dd2EYaTti8XiffdsvTJ3iPf6djIM=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEiZsODXPrG4zjrQlAjSAPMnYAgP-e5mf7wQJYl3_RXs5svQfdwfsapk2HV5vLw_8E2gq62BPym8rcbgKCfr3Gaf_ZTS0QuhboCvYROBc9xKE8_VufEgbHheIFoZ0qQmhddbVKe9YekdUidovOFy2zW-7FCq5ir7Dd2EYaTti8XiffdsvTJ3iPf6djIM=s728 2x"},"classes":[]},{"id":31496,"url":"https:\/\/kalilinuxtutorials.com\/elevation-station\/","url_meta":{"origin":10520,"position":3},"title":"Elevation Station: Mastering Privilege Escalation with Advanced Token Manipulation Techniques","author":"Varshini","date":"December 11, 2023","format":false,"excerpt":"ElevationStation is a privilege escalation tool. It works by borrowing from commonly used escalation techniques involving manipulating\/duplicating process and thread tokens. Why reinvent the wheel with yet another privilege escalation utility? This was a combined effort between avoiding AV alerts using Metasploit and furthering my research into privilege escalation methods\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg0UqVOWbAviiRN1KePdZGerUWQvDYtuuyDT2VQRMH0WcTCeE2VEtWbKIYMPoxqzX6iUVvjjQSAfZ2xiC4K4VekkXX7Ki_yENEj-wfoTdWKAJkQ0XoLaj7uGUVH0yzmzuypNj95M3vWEIWjbFY1oyeN6ZSu4GfgHea_dBhbMGoG7H1cAkeIcDmahyphenhyphen-oHA\/s16000\/Elevation%20Station.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg0UqVOWbAviiRN1KePdZGerUWQvDYtuuyDT2VQRMH0WcTCeE2VEtWbKIYMPoxqzX6iUVvjjQSAfZ2xiC4K4VekkXX7Ki_yENEj-wfoTdWKAJkQ0XoLaj7uGUVH0yzmzuypNj95M3vWEIWjbFY1oyeN6ZSu4GfgHea_dBhbMGoG7H1cAkeIcDmahyphenhyphen-oHA\/s16000\/Elevation%20Station.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg0UqVOWbAviiRN1KePdZGerUWQvDYtuuyDT2VQRMH0WcTCeE2VEtWbKIYMPoxqzX6iUVvjjQSAfZ2xiC4K4VekkXX7Ki_yENEj-wfoTdWKAJkQ0XoLaj7uGUVH0yzmzuypNj95M3vWEIWjbFY1oyeN6ZSu4GfgHea_dBhbMGoG7H1cAkeIcDmahyphenhyphen-oHA\/s16000\/Elevation%20Station.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg0UqVOWbAviiRN1KePdZGerUWQvDYtuuyDT2VQRMH0WcTCeE2VEtWbKIYMPoxqzX6iUVvjjQSAfZ2xiC4K4VekkXX7Ki_yENEj-wfoTdWKAJkQ0XoLaj7uGUVH0yzmzuypNj95M3vWEIWjbFY1oyeN6ZSu4GfgHea_dBhbMGoG7H1cAkeIcDmahyphenhyphen-oHA\/s16000\/Elevation%20Station.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10931,"url":"https:\/\/kalilinuxtutorials.com\/pythem\/","url_meta":{"origin":10520,"position":4},"title":"Pythem &#8211; Penetration Testing Framework","author":"R K","date":"July 17, 2020","format":false,"excerpt":"Pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the law. I am not liable for any undue and unlawful act practiced by this tool, for more\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37081,"url":"https:\/\/kalilinuxtutorials.com\/oscp\/","url_meta":{"origin":10520,"position":5},"title":"OSCP : Navigating The Essential Toolkit For Penetration Testing","author":"Varshini","date":"March 14, 2025","format":false,"excerpt":"The OSCP (Offensive Security Certified Professional) certification is a highly respected credential in the cybersecurity industry, focusing on hands-on penetration testing skills. To achieve this certification, candidates must demonstrate proficiency in using various tools and techniques to identify vulnerabilities and exploit them. Here's an overview of some key tools and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/OSCP-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10520","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10520"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10520\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16288"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}