{"id":10720,"date":"2020-06-10T16:50:52","date_gmt":"2020-06-10T11:20:52","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10720"},"modified":"2020-06-10T16:50:52","modified_gmt":"2020-06-10T11:20:52","slug":"pivotnacci","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/","title":{"rendered":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents"},"content":{"rendered":"\n<p>Pivot into the internal network by deploying HTTP agents. <strong>Pivotnacci<\/strong> allows you to create a socks server which communicates with HTTP <code>agents<\/code>. The architecture looks like the following:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-xL40yZJyTek\/XtSOTi0HcGI\/AAAAAAAAGhU\/pMTOZhnQIzEga2860AxYP0eCUoQIaMPyQCLcBGAsYHQ\/s1600\/pivotnacci.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>This tool was inspired by the great <a href=\"https:\/\/github.com\/sensepost\/reGeorg\">reGeorg<\/a>. However, it includes some improvements:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Support for <strong>balanced servers<\/strong><\/li><li>Customizable polling interval, useful to reduce <strong>detection rates<\/strong><\/li><li>Auto drop connections closed by a server<\/li><li>Modular and cleaner code<\/li><li>Installation through pip<\/li><li>Password-protected agents<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Supported Socks Protocols<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Socks 4<\/li><li>Socks 5<ul><li>No authentication<\/li><li>User password<\/li><li>GSSAPI<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/carina\/\" target=\"_blank\" rel=\"noreferrer noopener\">Carina : Webshell, Virtual Private Server (VPS) &amp; cPanel Database<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>From python packages:<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pip3 install pivotnacci<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>From repository:<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/blackarrowsec\/pivotnacci.git <br>cd pivotnacci\/ <br>pip3 install -r requirements.txt # to avoid installing on the OS <br>python3 setup.py install # to install on the OS<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Upload the required agent (php, jsp or aspx) to a webserver<\/li><li>Start the socks server once the agent is deployed<\/li><li>Configure proxychains or any other proxy client (the default listening port for pivotnacci socks server is 1080)<\/li><\/ol>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ pivotnacci -h<br>Usage:<\/strong> pivotnacci [-h] [-s addr] [-p port] [&#8211;verbose] [&#8211;ack-message message]<br>[&#8211;password password] [&#8211;user-agent user_agent]<br>[&#8211;header header] [&#8211;proxy [protocol:\/\/]host[:port]]<br>[&#8211;type type] [&#8211;polling-interval milliseconds]<br>[&#8211;request-tries number] [&#8211;retry-interval milliseconds]<br>url<br>Socks server for HTTP agents<br><br><strong>Positional Arguments:<\/strong><br>url The url of the agent<br><br><strong>Optional Arguments:<\/strong><br>-h, &#8211;help show this help message and exit<br>-s addr, &#8211;source addr<br>The default listening address (default: 127.0.0.1)<br>-p port, &#8211;port port The default listening port (default: 1080)<br>&#8211;verbose, -v<br>&#8211;ack-message message, -a message<br>Message returned by the agent web page (default:<br>Server Error 500 (Internal Error))<br>&#8211;password password Password to communicate with the agent (default: )<br>&#8211;user-agent user_agent, -A user_agent<br>The User-Agent header sent to the agent (default:<br>pivotnacci\/0.0.1)<br>&#8211;header header, -H header<br>Send custom header. Specify in the form &#8216;Name: Value&#8217;<br>(default: None)<br>&#8211;proxy [protocol:\/\/]host[:port], -x [protocol:\/\/]host[:port]<br>Set the HTTP proxy to use.(Environment variables<br>HTTP_PROXY and HTTPS_PROXY are also supported)<br>(default: None)<br>&#8211;type type, -t type To specify agent type in case is not automatically<br>detected. Options are [&#8216;php&#8217;, &#8216;jsp&#8217;, &#8216;aspx&#8217;] (default:<br>None)<br>&#8211;polling-interval milliseconds<br>Interval to poll the agents (for recv operations)<br>(default: 100)<br>&#8211;request-tries number<br>The number of retries for each request to an agent. To<br>use in case of balanced servers (default: 50)<br>&#8211;retry-interval milliseconds<br>Interval to retry a failure request (due a balanced<br>server) (default: 100)<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Examples<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Using an agent with password s3cr3t (AGENT_PASSWORD variable must be modified at the agent side as well):<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pivotnacci https:\/\/domain.com\/agent.php &#8211;password &#8220;s3cr3t&#8221;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Using a custom HTTP Host header and a custom CustomAgent User-Agent:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pivotnacci https:\/\/domain.com\/agent.jsp -H &#8216;Host: vhost.domain.com&#8217; -A &#8216;CustomAgent&#8217;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Setting a different agent message 418 I&#8217;m a teapot (ACK_MESSAGE variable must be modified at the agent side as well):<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pivotnacci https:\/\/domain.com\/agent.aspx &#8211;ack-message &#8220;418 I&#8217;m a teapot&#8221;<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Reduce detection rate (e.g. WAF) by setting the polling interval to 2 seconds:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pivotnacci https:\/\/domain.com\/agent.php &#8211;polling-interval 2000<\/strong><\/p>\n\n\n\n<p><strong>Credit: <\/strong>Eloy P\u00e9rez<\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/blackarrowsec\/pivotnacci\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents. The architecture looks like the following: This tool was inspired by the great reGeorg. However, it includes some improvements: Support for balanced servers Customizable polling interval, useful to reduce detection rates Auto drop [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16341,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","fifu_image_alt":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1552,2533,3171],"class_list":["post-10720","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-http","tag-pivotnacci","tag-socks-connections"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents<\/title>\n<meta name=\"description\" content=\"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents\" \/>\n<meta property=\"og:description\" content=\"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-10T11:20:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents\",\"datePublished\":\"2020-06-10T11:20:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\"},\"wordCount\":494,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\",\"keywords\":[\"http\",\"Pivotnacci\",\"Socks Connections\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\",\"name\":\"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\",\"datePublished\":\"2020-06-10T11:20:52+00:00\",\"description\":\"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents","description":"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/","og_locale":"en_US","og_type":"article","og_title":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents","og_description":"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents","og_url":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-06-10T11:20:52+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents","datePublished":"2020-06-10T11:20:52+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/"},"wordCount":494,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","keywords":["http","Pivotnacci","Socks Connections"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/","url":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/","name":"Pivotnacci : A Tool To Make Socks Connections Through HTTP Agents","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","datePublished":"2020-06-10T11:20:52+00:00","description":"Pivot into the internal network by deploying HTTP agents. Pivotnacci allows you to create a socks server which communicates with HTTP agents","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/pivotnacci\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/pivotnacci\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-Z3rgaBm63Mw\/XtSOhoJG9SI\/AAAAAAAAGhY\/vbLZoxCIh68mOhrqNmwpAeWv_Tkg8cV6gCLcBGAsYHQ\/s1600\/pivotnacci%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":12364,"url":"https:\/\/kalilinuxtutorials.com\/invoke-socksproxy\/","url_meta":{"origin":10720,"position":0},"title":"Invoke SocksProxy : Socks Proxy &#038; Reverse Socks Server Using Powershell","author":"R K","date":"March 24, 2021","format":false,"excerpt":"Invoke SocksProxy is a tool that creates a local or \"reverse\" Socks proxy using powershell. The local proxy is a simple Socks 4\/5 proxy. The reverse proxy creates a tcp tunnel by initiating outbond SSL connections that can go through the system's proxy. The tunnel can then be used as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":18930,"url":"https:\/\/kalilinuxtutorials.com\/streamdivert\/","url_meta":{"origin":10720,"position":1},"title":"StreamDivert : Redirecting (Specific) TCP, UDP And ICMP Traffic To Another Destination","author":"R K","date":"October 6, 2021","format":false,"excerpt":"StreamDivert is a tool to man-in-the-middle or relay in and outgoing network connections on a system. It has the ability to, for example, relay all incoming SMB connections to port 445 to another server, or only relay specific incoming SMB connections from a specific set of source IP's to another\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-Zz3wjv0M-RU\/YVSABedat8I\/AAAAAAAAK-g\/Qc-I4NTlf0QhOuNYhJeFIMN0htLOkp3ogCLcBGAsYHQ\/s876\/streamdivert-5%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":25587,"url":"https:\/\/kalilinuxtutorials.com\/powerproxy\/","url_meta":{"origin":10720,"position":2},"title":"PowerProxy : PowerShell SOCKS Proxy With Reverse Proxy Capabilities","author":"R K","date":"June 27, 2022","format":false,"excerpt":"PowerProxy is a PowerShell SOCKS proxy with reverse proxy capabilities. PowerProxy is written with penetration testers in mind. Reverse proxy functionality is a priority, for traversing networks that block inbound connections. Reverse proxy connections are encrypted by default. Username\/Password authentication is supported for Socks 5 connections. Setup Import the script:\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPqRKWApKgOZgiCruNP8X3l36auUY7VDI-ozM0_o9AOGrq1f0pPm63ciscTO-bP2_gB0U8Egv2QaCGSbHlGzvWXl8IPbm6Wax9a6Ihcaq5dhy1lZL3ENyhpiFiXVQoY9GP35OgWra0wr5opoIFNBQvSEtVl1Y1zWK-nhOks6Hc-1CpAD8e3RKU_lQ6\/s728\/download%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPqRKWApKgOZgiCruNP8X3l36auUY7VDI-ozM0_o9AOGrq1f0pPm63ciscTO-bP2_gB0U8Egv2QaCGSbHlGzvWXl8IPbm6Wax9a6Ihcaq5dhy1lZL3ENyhpiFiXVQoY9GP35OgWra0wr5opoIFNBQvSEtVl1Y1zWK-nhOks6Hc-1CpAD8e3RKU_lQ6\/s728\/download%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPqRKWApKgOZgiCruNP8X3l36auUY7VDI-ozM0_o9AOGrq1f0pPm63ciscTO-bP2_gB0U8Egv2QaCGSbHlGzvWXl8IPbm6Wax9a6Ihcaq5dhy1lZL3ENyhpiFiXVQoY9GP35OgWra0wr5opoIFNBQvSEtVl1Y1zWK-nhOks6Hc-1CpAD8e3RKU_lQ6\/s728\/download%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjPqRKWApKgOZgiCruNP8X3l36auUY7VDI-ozM0_o9AOGrq1f0pPm63ciscTO-bP2_gB0U8Egv2QaCGSbHlGzvWXl8IPbm6Wax9a6Ihcaq5dhy1lZL3ENyhpiFiXVQoY9GP35OgWra0wr5opoIFNBQvSEtVl1Y1zWK-nhOks6Hc-1CpAD8e3RKU_lQ6\/s728\/download%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31057,"url":"https:\/\/kalilinuxtutorials.com\/commander\/","url_meta":{"origin":10720,"position":3},"title":"Commander &#8211; Secure Python C2 Framework","author":"Varshini","date":"January 29, 2025","format":false,"excerpt":"Commander is a command and control framework (C2) written in Python, Flask and SQLite. It\u00a0comes with two agents written in Python and C. Under Continuous Development Not script-kiddie friendly Features Fully encrypted communication (TLS) Multiple Agents Obfuscation Interactive Sessions Scalable Base64 data encoding RESTful API Agents Python 3 The python\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2023\/10\/Commander-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4800,"url":"https:\/\/kalilinuxtutorials.com\/okadminfinder-admin-panel\/","url_meta":{"origin":10720,"position":4},"title":"Okadminfinder 3 : To Find Admin Panel Of Site","author":"R K","date":"May 2, 2019","format":false,"excerpt":"OKadminFinder is an Apache2 Licensed utility, rewritten in Python 3.x, for admins\/pentesters who want to find admin panel of a website. There are many other tools but not as effective and secure. Yeah, it has the the ability to use tor and hide your identity Requirements Linux sudo apt install\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37366,"url":"https:\/\/kalilinuxtutorials.com\/adaptixc2\/","url_meta":{"origin":10720,"position":5},"title":"AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities","author":"Varshini","date":"March 28, 2025","format":false,"excerpt":"AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It offers a robust set of features that enhance the flexibility and effectiveness of security testing operations. The framework includes a server component written in Golang and a cross-platform GUI client developed using C++ QT, ensuring\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/AdaptixC2-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10720"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10720\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16341"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}