{"id":20467,"date":"2021-11-29T13:26:59","date_gmt":"2021-11-29T13:26:59","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=20467"},"modified":"2021-11-29T13:27:02","modified_gmt":"2021-11-29T13:27:02","slug":"tor-rootkit","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","title":{"rendered":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor"},"content":{"rendered":"\n<p><strong>Tor-Rootkit<\/strong> is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get&#8217;s established over the tor network.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>How To Use<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone the repo and change directory:<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/emcruise\/TorRootkit.git<br>cd .\/tor-rootkit<\/strong><\/p>\n\n\n\n<p>Build docker container:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker build -t listener .<\/strong><\/p>\n\n\n\n<p>Run docker container:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>docker run -v $(pwd)\/executables:\/executables\/ -it listener<\/strong><\/p>\n\n\n\n<p>Deploy the executables: When the listener is up and running it generates a &#8220;executables&#8221; directory containing different payloads for different plattforms.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>TorRootkit\/<br>\u2502 \u2026<br>\u2514 executables\/<\/strong><\/p>\n\n\n\n<p class=\"has-luminous-vivid-amber-background-color has-background\"><strong>Note: The client can take some time to connect because PyInstaller executables are a bit slower and it need&#8217;s to start tor.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/emcruise\/tor-rootkit#features\"><\/a><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Standalone executables for Windows and Linux, including python interpreter and tor<\/li><li>the whole communication works over tor hidden services which guarantees some degree of anonymity<\/li><li>The Listener can handle multiple clients<\/li><li>The Listener generates payloads for different platforms on startup<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/emcruise\/tor-rootkit#listener-shell-commands\"><\/a><strong>Listener Shell Commands<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Command<\/th><th>Explanation<\/th><\/tr><\/thead><tbody><tr><td><code>help<\/code><\/td><td>Shows the help menu<\/td><\/tr><tr><td><code>^C<\/code>&nbsp;or&nbsp;<code>exit<\/code><\/td><td>Exits the shell<\/td><\/tr><tr><td><code>list<\/code><\/td><td>lists all connected clients with their according index<\/td><\/tr><tr><td><code>select &lt;index&gt;<\/code><\/td><td>start shell with client<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/emcruise\/tor-rootkit#client-shell-commands\"><\/a><strong>Client Shell Commands<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Command<\/th><th>Explanation<\/th><\/tr><\/thead><tbody><tr><td><code>help<\/code><\/td><td>Shows the help menu<\/td><\/tr><tr><td><code>^C<\/code>&nbsp;or&nbsp;<code>exit<\/code><\/td><td>Exits the client shell and returns to listener shell<\/td><\/tr><tr><td><code>os &lt;command&gt;<\/code><\/td><td>Executes a command in the clients shell and returns the output<\/td><\/tr><tr><td><code>background<\/code><\/td><td>Keeps the connection to a client and returns to listener<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/emcruise\/tor-rootkit\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get&#8217;s established over the tor network. How To Use Clone the repo and change directory: git clone https:\/\/github.com\/emcruise\/TorRootkit.gitcd .\/tor-rootkit Build docker container: docker build -t listener . Run docker container: docker run -v $(pwd)\/executables:\/executables\/ -it listener Deploy the executables: When the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":20529,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4481,2678,4480,4479],"class_list":["post-20467","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-linux-rootkit","tag-python-3","tag-standalone-windows-10","tag-tor-rootkit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor<\/title>\n<meta name=\"description\" content=\"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get&#039;s established over the tor network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor\" \/>\n<meta property=\"og:description\" content=\"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get&#039;s established over the tor network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-29T13:26:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-29T13:27:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor\",\"datePublished\":\"2021-11-29T13:26:59+00:00\",\"dateModified\":\"2021-11-29T13:27:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\"},\"wordCount\":220,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\",\"keywords\":[\"Linux Rootkit\",\"Python 3\",\"Standalone Windows 10\",\"Tor-Rootkit\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\",\"name\":\"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\",\"datePublished\":\"2021-11-29T13:26:59+00:00\",\"dateModified\":\"2021-11-29T13:27:02+00:00\",\"description\":\"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get's established over the tor network.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor","description":"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get's established over the tor network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","og_locale":"en_US","og_type":"article","og_title":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor","og_description":"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get's established over the tor network.","og_url":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-11-29T13:26:59+00:00","article_modified_time":"2021-11-29T13:27:02+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor","datePublished":"2021-11-29T13:26:59+00:00","dateModified":"2021-11-29T13:27:02+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/"},"wordCount":220,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","keywords":["Linux Rootkit","Python 3","Standalone Windows 10","Tor-Rootkit"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","url":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","name":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","datePublished":"2021-11-29T13:26:59+00:00","dateModified":"2021-11-29T13:27:02+00:00","description":"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get's established over the tor network.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/tor-rootkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":35549,"url":"https:\/\/kalilinuxtutorials.com\/blackpill\/","url_meta":{"origin":20467,"position":0},"title":"BlackPill : A Comprehensive Overview Of A Stealthy Linux Rootkit","author":"Varshini","date":"December 30, 2024","format":false,"excerpt":"Dive into the dark intricacies of BlackPill, a sophisticated Linux rootkit engineered in Rust that epitomizes stealth and versatility in cyber threats. This article unravels its multi-faceted modules, from evasion tactics to persistent attacks, outlining how it manipulates system operations to remain undetected. Features The rootkit is composed of multiple\u2026","rel":"","context":"In \"BlackPill\"","block_context":{"text":"BlackPill","link":"https:\/\/kalilinuxtutorials.com\/tag\/blackpill\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgAyQNIvQnjHxru0AxBkYqF_-2wfSxwyWRt-aqCQtzV8gmXkmt-beQXaRbHPNJySyeCPH8c33tRHQBkcZm6xAM5Jnj3jOdNteCQI0x9UMAtDWzdxCdbw6Ko9T-UKY64ysMwODxl2jHKtbxDkE9KzMyOHGBn7s5NAUlM52H7R-NklqC3z3EuZfmHCAj3XcKj\/s1600\/BlackPill%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3629,"url":"https:\/\/kalilinuxtutorials.com\/tyton-kernel-rootkit-hunter\/","url_meta":{"origin":20467,"position":1},"title":"Tyton : Kernel-Mode Rootkit Hunter","author":"R K","date":"January 22, 2019","format":false,"excerpt":"Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network Protocol Hooking Netfilter Hooking Zeroed Process Inodes Process Fops Hooking Interrupt Descriptor Table Hooking Also Read:Hatch \u2013 Brute Force Tool That Is Used To Brute Force Most Websites Additional Features Notifications: Users (including myself) do\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32873,"url":"https:\/\/kalilinuxtutorials.com\/magicdot\/","url_meta":{"origin":20467,"position":2},"title":"MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities","author":"Varshini","date":"April 29, 2024","format":false,"excerpt":"A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path conversion known issue. Presented at Black Hat Asia 2024 under the title -\u00a0MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces For a deeper understanding of the research, read this blog post -\u00a0MagicDot: A\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj_Ym8ELWxWKo7cv55JDLCxAfegO_25Ry0t9Vf1bS6H2W-ZoxdjFqdMxWIhsdEDkMeIIg7oMCC2xX2VEjsL8ILacHZOzokutZHZvgwtawT0eJi4X7WEpzTbTdzb8Pc-GDZtSGTQGWutbu7xWJ7WrqtnwIbC6Jtlbz3p2WjnfYacWTK3X3tVoswbQpRJgVYe\/s16000\/MagicDot%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":13061,"url":"https:\/\/kalilinuxtutorials.com\/r77-rootkit\/","url_meta":{"origin":20467,"position":3},"title":"R77 Rootkit : Fileless Ring 3 Rootkit With Installer And Persistence","author":"R K","date":"May 28, 2021","format":false,"excerpt":"R77 is a ring 3 Rootkit that hides following entities from all processes: Files, directories, junctions, named pipes, scheduled tasksProcessesCPU usageRegistry keys & valuesServicesTCP & UDP connections It is compatible with Windows 7 and Windows 10 in both x64 and x86 editions. Hiding By Prefix All entities where the name\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":31629,"url":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","url_meta":{"origin":20467,"position":4},"title":"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.","author":"Varshini","date":"January 5, 2024","format":false,"excerpt":"The article \"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\" goes into great detail about D3m0n1z3dShell, a complex tool made for making things persistent in Linux settings. The opening would probably talk about how this tool is a big step forward in Linux system security and how it has\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27260,"url":"https:\/\/kalilinuxtutorials.com\/osripper\/","url_meta":{"origin":20467,"position":5},"title":"OSRipper : AV Evading OSX Backdoor And Crypter Framework","author":"R K","date":"September 24, 2022","format":false,"excerpt":"OSripper is a fully undetectable Backdoor generator and Crypter which specialises in OSX M1 malware. It will also work on windows but for now there is no support for it and it IS NOT FUD for windows (yet at least) and for now i will not focus on windows. You\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEizROCakYtG-jzaelc9exJbxaaUQXbnaTsBZy78E_zUOFx28XCdCtCZkmdDWxhNNyW-hDPraMWuKPjCBHqm4uaQOAmG8bHckl4MrgNGyWKAe9Wo3FH4G-mlktyLxTx-9SFVjaMRvcyMeRN3-SFNM5Wx78lkfd1StOrs4ulhb9nLk2I-H7SmJDQMTusL\/s728\/OSRipper%20logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEizROCakYtG-jzaelc9exJbxaaUQXbnaTsBZy78E_zUOFx28XCdCtCZkmdDWxhNNyW-hDPraMWuKPjCBHqm4uaQOAmG8bHckl4MrgNGyWKAe9Wo3FH4G-mlktyLxTx-9SFVjaMRvcyMeRN3-SFNM5Wx78lkfd1StOrs4ulhb9nLk2I-H7SmJDQMTusL\/s728\/OSRipper%20logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEizROCakYtG-jzaelc9exJbxaaUQXbnaTsBZy78E_zUOFx28XCdCtCZkmdDWxhNNyW-hDPraMWuKPjCBHqm4uaQOAmG8bHckl4MrgNGyWKAe9Wo3FH4G-mlktyLxTx-9SFVjaMRvcyMeRN3-SFNM5Wx78lkfd1StOrs4ulhb9nLk2I-H7SmJDQMTusL\/s728\/OSRipper%20logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEizROCakYtG-jzaelc9exJbxaaUQXbnaTsBZy78E_zUOFx28XCdCtCZkmdDWxhNNyW-hDPraMWuKPjCBHqm4uaQOAmG8bHckl4MrgNGyWKAe9Wo3FH4G-mlktyLxTx-9SFVjaMRvcyMeRN3-SFNM5Wx78lkfd1StOrs4ulhb9nLk2I-H7SmJDQMTusL\/s728\/OSRipper%20logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=20467"}],"version-history":[{"count":7,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20467\/revisions"}],"predecessor-version":[{"id":20474,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20467\/revisions\/20474"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/20529"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=20467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=20467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=20467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}