{"id":10598,"date":"2020-05-20T16:02:42","date_gmt":"2020-05-20T10:32:42","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10598"},"modified":"2020-05-20T16:02:42","modified_gmt":"2020-05-20T10:32:42","slug":"kaiten","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kaiten\/","title":{"rendered":"Kaiten : A Undetectable Payload Generation"},"content":{"rendered":"\n<p>A Undetectable Payload Generation. This tool is for educational purpose only, usage of <strong>Kaiten<\/strong> for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage cause by this program.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>What is it and why was it made?<\/strong><\/p>\n\n\n\n<p>We intentionally made it for our penetration testing jobs and for learning purposes. Our Kaiten c2 now moved onto a better source. And antivirus is dumb. Source: <a href=\"https:\/\/www.shadowlabs.cc\/kaiten\">https:\/\/www.shadowlabs.cc\/kaiten<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>MingW (64 &amp; 32)<\/li><li>GCC<\/li><li>OSSLSIGNCODE<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/powersploit-a-powershell-post-exploitation-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerSploit : A PowerShell Post-Exploitation Framework<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Undetectable Payload Generation<\/li><li>Stealth FUD Payload<\/li><li>Self Signing Certificate<\/li><li>Random Junk code<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Affected Devices and Operating Systems<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows<\/li><li>Android (soon)<\/li><li>Mac\/Linux<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Diagrams (also its cool hehe)<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-yrmzrXjqRLM\/XsS7wW1ZLaI\/AAAAAAAAGWU\/gyybnnoy7CMLPyzDfh8V3sX5zjl2ASNsQCLcBGAsYHQ\/s1600\/Kaiten1.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/shadowlabscc\/Kaiten\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not responsible for any misuse or damage cause by this program. What is it and why was it made? We intentionally made it for our penetration [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16308,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","fifu_image_alt":"Kaiten : A Undetectable Payload Generation","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1774],"class_list":["post-10598","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-kaiten"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kaiten\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kaiten\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-20T10:32:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Kaiten : A Undetectable Payload Generation\",\"datePublished\":\"2020-05-20T10:32:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/\"},\"wordCount\":127,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\",\"keywords\":[\"Kaiten\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/\",\"name\":\"Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\",\"datePublished\":\"2020-05-20T10:32:42+00:00\",\"description\":\"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kaiten\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials","description":"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kaiten\/","og_locale":"en_US","og_type":"article","og_title":"Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials","og_description":"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent","og_url":"https:\/\/kalilinuxtutorials.com\/kaiten\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-20T10:32:42+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Kaiten : A Undetectable Payload Generation","datePublished":"2020-05-20T10:32:42+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/"},"wordCount":127,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","keywords":["Kaiten"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/","url":"https:\/\/kalilinuxtutorials.com\/kaiten\/","name":"Kaiten : A Undetectable Payload Generation!Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","datePublished":"2020-05-20T10:32:42+00:00","description":"A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kaiten\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kaiten\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-xtiYBxNLsrQ\/XsS7wdfVZDI\/AAAAAAAAGWQ\/qwYgr3LwmYgv5eR5VBaMTrLxA9gMLClEQCLcBGAsYHQ\/s1600\/Kaiten%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10665,"url":"https:\/\/kalilinuxtutorials.com\/carina\/","url_meta":{"origin":10598,"position":0},"title":"Carina : Webshell, Virtual Private Server (VPS) &#038; cPanel Database","author":"R K","date":"May 30, 2020","format":false,"excerpt":"Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so that we don't need to store webshell, VPS or cPanel data in \"strange places\". Install $ git clone https:\/\/github.com\/c0delatte\/carina && cd carinaRun composer updateEdit .env.example with your database configurationRun php\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10668,"url":"https:\/\/kalilinuxtutorials.com\/minimalistic\/","url_meta":{"origin":10598,"position":1},"title":"Minimalistic Offensive Security Tools","author":"R K","date":"May 30, 2020","format":false,"excerpt":"Minimalistic is a simple SMB login attack and password spraying tool. It takes a list of targets and credentials (username and password) as parameters and it tries to authenticate against each target using the provided credentials. Despite its minimalistic design, the tool keeps track of everything by writing every result\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10675,"url":"https:\/\/kalilinuxtutorials.com\/faraday\/","url_meta":{"origin":10598,"position":2},"title":"Faraday : Collaborative Penetration Test &#038; Vulnerability Management Platform","author":"R K","date":"May 30, 2020","format":false,"excerpt":"Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit. Made for true pentesters! It was made to let you take advantage of the available tools in the community in a truly\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12219,"url":"https:\/\/kalilinuxtutorials.com\/ratel\/","url_meta":{"origin":10598,"position":3},"title":"RATel : An Open Source Penetration Test Tool","author":"R K","date":"March 9, 2021","format":false,"excerpt":"RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10834,"url":"https:\/\/kalilinuxtutorials.com\/xeexe\/","url_meta":{"origin":10598,"position":4},"title":"Xeexe : Undetectable &#038; Xor Encrypting With Custom KEY","author":"R K","date":"June 23, 2020","format":false,"excerpt":"Xeexe is a undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender, Malwarebytes, Avast, ESET-NOD32, AVG,\u2026(PYTHON 3). Undetectable Reverse Shell (Metasploit Rat) It is an FUD exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10573,"url":"https:\/\/kalilinuxtutorials.com\/catchyou\/","url_meta":{"origin":10598,"position":5},"title":"CatchYou : FUD Win32 Msfvenom Payload Generator","author":"R K","date":"May 15, 2020","format":false,"excerpt":"CatchYou is a tool used for FUD win32 msfvenom payload generator(meterpreter\/shell reverse tcp). Features Fully Undetectable Win32 MSFVenom Payload (meterpreter\/shell reverse tcp)Port Forwarding using ngrokTested: Win7\/Win10 Requirements Metasploit\/MSFVenommingw-w64: apt-get install mingw-w64Forwarding requirements:Ngrok Authtoken (for TCP Tunneling): Sign up at: https:\/\/ngrok.com\/signupYour authtoken is available on your dashboard: https:\/\/dashboard.ngrok.comInstall your auhtoken: .\/ngrok\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10598"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16308"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}