{"id":20970,"date":"2021-12-25T13:50:00","date_gmt":"2021-12-25T13:50:00","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=20970"},"modified":"2021-12-22T19:36:09","modified_gmt":"2021-12-22T19:36:09","slug":"exocet","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/exocet\/","title":{"rendered":"EXOCET : AV-evading, Undetectable, Payload Delivery Tool"},"content":{"rendered":"\n<p><strong>EXOCET<\/strong> is superior to Metasploit&#8217;s &#8220;Evasive Payloads&#8221; modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode). Metasploit&#8217;s Evasion Payloads uses a easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult to ascertain the intent of the malware.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjr3X_IDfq6Ji0_r-BUagPu9k7MGRfvmAVrTeTKzWF5wWnXtNJLLDFuy9UiOs4pAvlPxW-oNEvvFNc8iXAZq595T7zg4vp-fQE0HE-g0HG2ugesD8GMUopqEoMW8aBqx94QNk92v-uofO4747iRs-HxdUkI82bUmOyrTNwTDA3cMuEcZ4xk7vbmEpSG=s1920\" alt=\"\" \/><\/figure>\n\n\n\n<p>However, it is possible to use Metasploit to build a Evasive Payload, and then chain that with EXOCET. So EXOCET will decrypt via AES-256, and then the Metasploit Evasive Payload then decrypts itself from RC4.<\/p>\n\n\n\n<p>Much like my previous project, DarkLordObama, this toolkit is designed to be a delivery\/launch vehicle, much like Veil-Evasion does.<\/p>\n\n\n\n<p>Dark Lord Obama Project<\/p>\n\n\n\n<p>However, EXOCET is not limited to a single codebase or platforms that are running Python. EXOCET works on ALL supported platforms and architectures that Go supports.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/tanc7\/EXOCET-AV-Evasion#exocet-overview\"><\/a><strong>Exocet Overview<\/strong><\/p>\n\n\n\n<p>EXOCET, is effectively a crypter-type malware dropper that can recycle easily detectable payloads like WannaCry, encrypt them using AES-GCM (Galois\/Counter Mode), which is more secure than AES-CBC, and then create a dropper file for a majority of architectures and platforms out there.<\/p>\n\n\n\n<p>Basically&#8230;<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>It ingests dangerous malware that are now detectable by antivirus engines<\/li><li>It then encrypts them and produces it&#8217;s own Go file<\/li><li>Then that Go file can be cross-compiled to 99% of known architectures<\/li><li>Upon execution, the encrypted payload is written to the disk and immediately executed on the command line<\/li><li>Alternatively, instead of a file-drop, it will execute the reconstitute shellcode in memory using amenzhinsky&#8217;s go-memexec module&nbsp;github.com\/amenzhinsky\/go-memexec<\/li><li><strong>A custom shellcode executor is in the works<\/strong>, it takes ordinary C shellcode and after num-transform, it will run it by creating a new process after allocating the correct virtual address space and granting it RWX permissions on Windows<\/li><\/ol>\n\n\n\n<p>That means 32-bit, and 64-bit architectures, and it works on Linux, Windows, Macs, Unix, Android, iPhone, etc. You take, anything, and I mean ANYTHING, like the 1988 Morris Worm that nearly brought down the internet (which exploited a flaw in the fingerd listener daemon on UNIX), and make it a viable cyberweapon again.<\/p>\n\n\n\n<p>EXOCET is designed to be used with the DSX Program, or the &#8220;Cyber Metal Gear&#8221; as I envisioned it. Being able to launch and proliferate dangerous malware without a traceable launch trail.<\/p>\n\n\n\n<p>EXOCET is written entirely in Go.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/tanc7\/EXOCET-AV-Evasion#how-to-use\"><\/a><strong>How to use<\/strong><\/p>\n\n\n\n<p>EXOCET, regardless of which binary you use to run it, requires Golang to work. By default, it generates a crypter .go file.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Windows users:&nbsp;Install Go Here<\/li><li>Linux users: run&nbsp;<code><strong>sudo apt-get update &amp;&amp; sudo apt-get install -y golang<\/strong><\/code><\/li><li>You must install the EXOCET source files in golang&nbsp;<code><strong>go get github.com\/tanc7\/EXOCET-AV-Evasion<\/strong><\/code><\/li><li>Sub-requirements will also be downloaded and installed<\/li><li>For Windows and Mac x64 Users, pre-compiled binaries are in the \/bin folder<\/li><\/ol>\n\n\n\n<p class=\"has-text-align-left has-light-green-cyan-background-color has-background\"><a href=\"https:\/\/github.com\/tanc7\/EXOCET-AV-Evasion#to-run-it\"><\/a><strong>To run it<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>go run EXOCET.go detectablemalware.exe outputmalware.go<\/strong><\/p>\n\n\n\n<p>A key is automatically generated for you. The key is 64-characters long and is entirely composed of bash and cmd.exe shell pipe redirectors to confuse and disrupt brute-forcing attempts against the key by causing unpredictable, destructive behavior on the forensic analyst&#8217;s device.<\/p>\n\n\n\n<p>For 64-bit Windows Targets&#8230;<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>env GOOS=windows GOARCH=amd64 go build -ldflags &#8220;-s -w&#8221; -o outputMalware.exe outputmalware.go<\/strong><\/p>\n\n\n\n<p>And out comes a&nbsp;<strong><code>outputmalware.exe<\/code>&nbsp;<\/strong>file<\/p>\n\n\n\n<p>For 64-bit MacOS Targets<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>env GOOS=darwin GOARCH=amd64 go build -ldflags &#8220;-s -w&#8221; -o outputMalware.macho outputmalware.go<\/strong><\/p>\n\n\n\n<p>For 64-bit Linux Targets<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>env GOOS=linux GOARCH=amd64 go build -ldflags &#8220;-s -w&#8221; -o outputMalware.elf outputmalware.go<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/tanc7\/EXOCET-AV-Evasion\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>EXOCET is superior to Metasploit&#8217;s &#8220;Evasive Payloads&#8221; modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode). Metasploit&#8217;s Evasion Payloads uses a easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult to ascertain the intent of the malware. However, it is possible to use Metasploit to build a Evasive [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":20984,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4543,4542,2441],"class_list":["post-20970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-av-evading","tag-exocet","tag-payload"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EXOCET : AV-evading, Undetectable, Payload Delivery Tool<\/title>\n<meta name=\"description\" content=\"EXOCET is superior to Metasploit&#039;s &quot;Evasive Payloads&quot; modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/exocet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EXOCET : AV-evading, Undetectable, Payload Delivery Tool\" \/>\n<meta property=\"og:description\" content=\"EXOCET is superior to Metasploit&#039;s &quot;Evasive Payloads&quot; modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/exocet\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-25T13:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"EXOCET : AV-evading, Undetectable, Payload Delivery Tool\",\"datePublished\":\"2021-12-25T13:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\",\"keywords\":[\"AV-evading\",\"EXOCET\",\"Payload\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/exocet\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/exocet\/\",\"name\":\"EXOCET : AV-evading, Undetectable, Payload Delivery Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\",\"datePublished\":\"2021-12-25T13:50:00+00:00\",\"description\":\"EXOCET is superior to Metasploit's \\\"Evasive Payloads\\\" modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/exocet\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EXOCET : AV-evading, Undetectable, Payload Delivery Tool","description":"EXOCET is superior to Metasploit's \"Evasive Payloads\" modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/exocet\/","og_locale":"en_US","og_type":"article","og_title":"EXOCET : AV-evading, Undetectable, Payload Delivery Tool","og_description":"EXOCET is superior to Metasploit's \"Evasive Payloads\" modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).","og_url":"https:\/\/kalilinuxtutorials.com\/exocet\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-12-25T13:50:00+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/exocet\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/exocet\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"EXOCET : AV-evading, Undetectable, Payload Delivery Tool","datePublished":"2021-12-25T13:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/exocet\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","keywords":["AV-evading","EXOCET","Payload"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/exocet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/exocet\/","url":"https:\/\/kalilinuxtutorials.com\/exocet\/","name":"EXOCET : AV-evading, Undetectable, Payload Delivery Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","datePublished":"2021-12-25T13:50:00+00:00","description":"EXOCET is superior to Metasploit's \"Evasive Payloads\" modules as EXOCET uses AES-256 in GCM Mode (Galois\/Counter Mode).","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/exocet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/exocet\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEj18Y6FddSTTa3NJBiLhkIWgtU60mfwb6Ihmqlnh2p70T94p-dtRfpjRAeTZp5rNfAJLTAOgcn9wfjMEotHto9cgKfweKQoRZWxnjJv2MAFWa5wtUj10qZLLitBhSh2nb56UTJ_Fj67bYvG-fd2DZWSyCxiXgDeLzb8ZxkruLgTSE3ZdUDmw-7CTk6P=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":29943,"url":"https:\/\/kalilinuxtutorials.com\/supernova\/","url_meta":{"origin":20970,"position":0},"title":"Supernova : The Ultimate Shellcode Encryption &#038; Conversion Toolkit","author":"Varshini","date":"September 1, 2023","format":false,"excerpt":"Meet Supernova, the new and improved shellcode encryption tool made for today's ethical hackers. Supernova is written in Golang and works with both Windows and Linux. It has a wide range of encryption ciphers, such as ROT, XOR, RC4, and AES. What makes it different? It's not just an encryptor;\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiyaOitxQBBA3AwOg7X-HTmPct_P4g6vt-b9vu5cWciwmChpDuipbsESqquffTGtAS2q1ieI6xMGA-_6ivXOqeMqSn8lKIs9b1v8T_VodHZpnizMMJ94ThXASZaot9cEI53ds6F7r71xh4fSt5ucDKDjDtCWKtLZLmLftF9UishfKvSb8C4pXOoDpZWVz14\/s16000\/supernova.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35596,"url":"https:\/\/kalilinuxtutorials.com\/awesome-edr-bypass\/","url_meta":{"origin":20970,"position":1},"title":"Awesome EDR Bypass : A Comprehensive Guide For Ethical Hackers","author":"Varshini","date":"January 2, 2025","format":false,"excerpt":"EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities, knowledge that pentesters and incident responders should also be aware of. This repository is not intended to be used to escalate attacks. Use it for ethical hacking. PoC trickster0\/TartarusGate: TartarusGate, Bypassing EDRs am0nsec\/HellsGate: Original C\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhVTVrDfdHPNRElUbpPw_tvW5AwqBKo6aT_BPiSDbVANiKT5zDLza02RARdWbz92DVkEtwdIl6-LF_SiNDEBnlz8IUuOBkKt-NiPyMQkMMLL-cnxRVCPwjctjANd0kjESyNRQtjWobW4vlStkW-9EPJTIEFrsq4b3s4z0LmpsEpVaXZ4A1hl4PPPHZjB_1A\/s1600\/Awesome%20EDR%20Bypass.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34870,"url":"https:\/\/kalilinuxtutorials.com\/bear-c2\/","url_meta":{"origin":20970,"position":2},"title":"BEAR-C2 : Simulated Command And Control Framework For APT Attack Research","author":"Varshini","date":"September 18, 2024","format":false,"excerpt":"Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine. This C2 is for simulation\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgo1x3Yew6ASCNNpJYJu1EQs-dbmSFI8NsYXt6Osf1lizipxTOhJ20MFvi4xkvBSh_yxR8d7OZv7YXE_gUn8Lc4I2NJ4HLyP5U4KPz3Z8Ncd0TLlT3iHMTT_3ySMqU0zaG_IjMapavCZVhuHnULpqCrrAnDFgci5iCdbkIunMDn4F2q4nMic2fJ_luXYc8B\/s1600\/Untitled%20design%283%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35259,"url":"https:\/\/kalilinuxtutorials.com\/embedpayloadinpng\/","url_meta":{"origin":20970,"position":3},"title":"EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files","author":"Varshini","date":"November 21, 2024","format":false,"excerpt":"Embed a payload within a PNG file by splitting the payload across multiple IDAT sections. Each section is encrypted individually using its own 16-byte key with the RC4 encryption algorithm. Implementation This repository consists of two implementations: EmbedPayloadInPng.py - Python script to embed an input payload to a specified PNG\u2026","rel":"","context":"In &quot;Malware&quot;","block_context":{"text":"Malware","link":"https:\/\/kalilinuxtutorials.com\/category\/malware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8BX3AA9oxsLN7Cgg14sPInJ-JgacnJ7_Bl2jtMu5sNQ7Wi4CSRjii8dpIZ0Fnr-sS5lvRjyHomrx-d8xXw5zWO0oIJf29axUlu0yQSyDLrYiW2hEnycst4eMKqxJSJsTyx0ar_Ns09jOoTYC7hpBLTGuGEtPfNGiy6xR_GKxz_9Pyi478yR0PsQqg-pbz\/s1600\/EmbedPayloadInPng.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32246,"url":"https:\/\/kalilinuxtutorials.com\/pichichih0ll0wer\/","url_meta":{"origin":20970,"position":4},"title":"PichichiH0ll0wer : Mastering Nim-Based Process Hollowing For Efficient Payload Management","author":"Varshini","date":"March 11, 2024","format":false,"excerpt":"PichichiH0ll0wer revolutionizes payload management with its Nim-based process hollowing capabilities. This innovative tool offers configurable features, advanced injection methods, and robust protection mechanisms, making it a game-changer for Windows environments. Explore how PichichiH0ll0wer streamlines the deployment of payloads while enhancing security and efficiency. PichichiH0ll0wer About Features Injection methods Installation Usage\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiR3H2rnxWEOlDgN0J5P5ZURGhM4IvfLFI1ka5GKAWCH2UcvUxPas1VLbsA69DrqB0QpQQ2hdfJ0mcHslJg3ApIlTHp6bAt2bJw7ImY2_PF5SjX3HrAye2abgiC62CeZFjlnkohKooIoQ3sse1ZfLJBsrYq_9nhRkP7VoxVS0mK7B6W4Om-VggNpaEu8BLG\/s16000\/PichichiH0ll0wer%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35972,"url":"https:\/\/kalilinuxtutorials.com\/goredops\/","url_meta":{"origin":20970,"position":5},"title":"GoRedOps : A Golang Arsenal For Red Teamers And Security Professionals","author":"Varshini","date":"January 31, 2025","format":false,"excerpt":"GoRedOps is a comprehensive collection of Golang-based projects tailored for red teamers and offensive security professionals. This repository offers a wide array of tools and techniques essential for penetration testing, exploitation, and security research. Below is an overview of its structure and functionality. Project Structure And Tools GoRedOps is organized\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/GoRedOps.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=20970"}],"version-history":[{"count":14,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20970\/revisions"}],"predecessor-version":[{"id":21008,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/20970\/revisions\/21008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/20984"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=20970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=20970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=20970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}