{"id":10620,"date":"2020-05-25T09:51:13","date_gmt":"2020-05-25T04:21:13","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10620"},"modified":"2020-05-25T09:51:13","modified_gmt":"2020-05-25T04:21:13","slug":"evilreg","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/evilreg\/","title":{"rendered":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)"},"content":{"rendered":"\n<p><strong>Evilreg<\/strong> is a reverse shell using Windows Registry files (.reg)<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<p>Reverse TCP Port Forwarding using Ngrok.io<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Ngrok Authtoken (for TCP Tunneling): Sign up at: <a href=\"https:\/\/ngrok.com\/signup\">https:\/\/ngrok.com\/signup<\/a><\/li><li>Your authtoken is available on your dashboard: <a href=\"https:\/\/dashboard.ngrok.com\">https:\/\/dashboard.ngrok.com<\/a><\/li><li>Install your auhtoken: .\/ngrok authtoken &lt;YOUR_AUTHTOKEN&gt;<\/li><li>Target must reboot\/re-login after installing the .reg file<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/catchyou\/\" target=\"_blank\" rel=\"noreferrer noopener\">CatchYou : FUD Win32 Msfvenom Payload Generator<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/thelinuxchoice\/evilreg <br>cd evilreg <br>bash evilreg.sh <\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Usage of Evilreg for attacking targets without prior mutual consent is illegal. It&#8217;s the end user&#8217;s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/thelinuxchoice\/evilreg\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Evilreg is a reverse shell using Windows Registry files (.reg) Features Reverse TCP Port Forwarding using Ngrok.io Requirements Ngrok Authtoken (for TCP Tunneling): Sign up at: https:\/\/ngrok.com\/signup Your authtoken is available on your dashboard: https:\/\/dashboard.ngrok.com Install your auhtoken: .\/ngrok authtoken &lt;YOUR_AUTHTOKEN&gt; Target must reboot\/re-login after installing the .reg file Also Read &#8211; CatchYou : FUD [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16315,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","fifu_image_alt":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1101,2840,3714,3734],"class_list":["post-10620","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-evilreg","tag-reverse-shell","tag-windows","tag-windows-registry-files"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Evilreg : Reverse Shell Using Windows Registry Files (.reg)<\/title>\n<meta name=\"description\" content=\"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/evilreg\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evilreg : Reverse Shell Using Windows Registry Files (.reg)\" \/>\n<meta property=\"og:description\" content=\"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/evilreg\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T04:21:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Evilreg : Reverse Shell Using Windows Registry Files (.reg)\",\"datePublished\":\"2020-05-25T04:21:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/\"},\"wordCount\":137,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\",\"keywords\":[\"Evilreg\",\"Reverse Shell\",\"windows\",\"Windows Registry Files\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/\",\"name\":\"Evilreg : Reverse Shell Using Windows Registry Files (.reg)\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\",\"datePublished\":\"2020-05-25T04:21:13+00:00\",\"description\":\"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/evilreg\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)","description":"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/evilreg\/","og_locale":"en_US","og_type":"article","og_title":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)","og_description":"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io","og_url":"https:\/\/kalilinuxtutorials.com\/evilreg\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-05-25T04:21:13+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)","datePublished":"2020-05-25T04:21:13+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/"},"wordCount":137,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","keywords":["Evilreg","Reverse Shell","windows","Windows Registry Files"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/","url":"https:\/\/kalilinuxtutorials.com\/evilreg\/","name":"Evilreg : Reverse Shell Using Windows Registry Files (.reg)","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","datePublished":"2020-05-25T04:21:13+00:00","description":"Evilreg is a reverse shell using Windows Registry files (.reg). Reverse TCP Port Forwarding using Ngrok.io","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/evilreg\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/evilreg\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-ZxKBP9zdT3A\/XsTM76cY1hI\/AAAAAAAAGXw\/bT8pE08UdswZjIzaxn0FxRvWstHSQyNzgCLcBGAsYHQ\/s1600\/Evilreg%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":10629,"url":"https:\/\/kalilinuxtutorials.com\/badlnk\/","url_meta":{"origin":10620,"position":0},"title":"Badlnk : Reverse Shell In Shortcut File (.lnk)","author":"R K","date":"May 26, 2020","format":false,"excerpt":"Badlnk is a reverse shell in shortcut file (.lnk). How it works? Shortcut file (Microsoft Windows 9.x) LNK is a file extension for a shortcut file used by Microsoft Windows to point to an executable file. LNK stands for LiNK. Shortcut files are used as a direct link to an\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10573,"url":"https:\/\/kalilinuxtutorials.com\/catchyou\/","url_meta":{"origin":10620,"position":1},"title":"CatchYou : FUD Win32 Msfvenom Payload Generator","author":"R K","date":"May 15, 2020","format":false,"excerpt":"CatchYou is a tool used for FUD win32 msfvenom payload generator(meterpreter\/shell reverse tcp). Features Fully Undetectable Win32 MSFVenom Payload (meterpreter\/shell reverse tcp)Port Forwarding using ngrokTested: Win7\/Win10 Requirements Metasploit\/MSFVenommingw-w64: apt-get install mingw-w64Forwarding requirements:Ngrok Authtoken (for TCP Tunneling): Sign up at: https:\/\/ngrok.com\/signupYour authtoken is available on your dashboard: https:\/\/dashboard.ngrok.comInstall your auhtoken: .\/ngrok\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10883,"url":"https:\/\/kalilinuxtutorials.com\/evildll\/","url_meta":{"origin":10620,"position":2},"title":"EvilDLL &#8211; Malicious DLL (Reverse Shell) Generator For DLL Hijacking","author":"R K","date":"July 8, 2020","format":false,"excerpt":"EvilDLL is a malicious DLL (Reverse Shell) generator for DLL hijacking. Features Reverse TCP Port Forwarding using Ngrok.ioCustom Port Forwarding option (LHOST,LPORT)Example of DLL Hijacking included (Half-Life Launcher file)Tested on Win7 (7601), Windows 10 Requirements Mingw-w64 compiler: apt-get install mingw-w64Ngrok Authtoken (for TCP Tunneling): Sign up at: https:\/\/ngrok.com\/signupYour auth token\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10781,"url":"https:\/\/kalilinuxtutorials.com\/eviloffice\/","url_meta":{"origin":10620,"position":3},"title":"Eviloffice : Inject Macro &#038; DDE Code Into Excel &#038; Word Documents","author":"R K","date":"June 18, 2020","format":false,"excerpt":"Eviloffice is a tool used to inject macro and DDE code into Excel and Word documents (reverse shell). Features Inject malicious Macro on formats: docm, dotm, xlsm, xltmInject malicious DDE code on formats: doc, docx, dot, xls, xlsx, xlt, xltxPython2\/Python3 CompatibleTested: Win10 (MS Office 14.0) Requirements Microsoft Office (Word\/Excel)pywin32: python\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":10590,"url":"https:\/\/kalilinuxtutorials.com\/clipboardme\/","url_meta":{"origin":10620,"position":4},"title":"Clipboardme : Grab &#038; Inject Clipboard Content By Link","author":"R K","date":"May 20, 2020","format":false,"excerpt":"Clipboardme is a tool used to grab and inject clipboard content by link. Browsers are implementing a new JavaScript API for asynchronous clipboard access to integrate copy and paste into web applications. It is a replacement for the synchronous execCommand-based copy & paste. Async Clipboard requests doesn't block the page\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":38334,"url":"https:\/\/kalilinuxtutorials.com\/windows-registry-editor-guide\/","url_meta":{"origin":10620,"position":5},"title":"How to Use the Windows Registry to optimize and control your PC.","author":"Tamilselvan S","date":"October 30, 2025","format":false,"excerpt":"The Windows Registry Editor lets you easily view and control critical Windows system and application settings. It acts as a central hub, storing configuration information for your hardware, software, and personal preferences. Type regedit in the Start menu or the Run box. Inside, it arranges data into hives, keys, and\u2026","rel":"","context":"In &quot;Windows&quot;","block_context":{"text":"Windows","link":"https:\/\/kalilinuxtutorials.com\/category\/windows\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/10\/Screenshot-416.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10620","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10620"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10620\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16315"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10620"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10620"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10620"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}