{"id":24324,"date":"2022-05-16T11:22:23","date_gmt":"2022-05-16T11:22:23","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=24324"},"modified":"2022-05-16T11:22:24","modified_gmt":"2022-05-16T11:22:24","slug":"nimcrypt2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/","title":{"rendered":"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim"},"content":{"rendered":"\n<p><strong>Nimcrypt2<\/strong> is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original&nbsp;Nimcrypt&nbsp;project, with the main improvements being the use of direct syscalls and the ability to load regular PE files as well as raw shellcode.<\/p>\n\n\n\n<p>Before going any further, I must acknowledge those who did the VAST majority of work and research that this project depends on. Firstly, I must thank&nbsp;@byt3bl33d3r&nbsp;for his&nbsp;Offensive Nim repo, and&nbsp;@ShitSecure&nbsp;for all of the code snippets he&#8217;s publicly released. That is what the original version of this tool was created from, and the current version is no different. Particularly, the new PE loading functionality used in this tool is just an implementation of ShitSecure&#8217;s recently released&nbsp;Nim-RunPE&nbsp;code. As of 3\/14\/22, this code also uses his&nbsp;GetSyscallStub&nbsp;code for dynamic syscall usage. I highly encourage sponsoring him for access to his own&nbsp;Nim PE Packer, which is no doubt a much better and more featureful version of this.<\/p>\n\n\n\n<p>Additionally, I would like to thank&nbsp;@ajpc500&nbsp;for his&nbsp;NimlineWhispers2&nbsp;project that this tool uses for direct syscalls. I cannot stress enough how this project is simply an amalgamation of the public work of those previously mentioned, so all credit must go to them.<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>Nimcrypt v 2.0<br>Usage:<br>nimcrypt -f file_to_load -t csharp\/raw\/pe [-o ] [-p ] [-n] [-u] [-s] [-e] [-g] [-l] [-v]<br>nimcrypt (-h | &#8211;help)<br>Options:<br>-h &#8211;help Show this screen.<br>&#8211;version Show version.<br>-f &#8211;file filename File to load<br>-t &#8211;type filetype Type of file (csharp, raw, or pe)<br>-p &#8211;process process Name of process for shellcode injection<br>-o &#8211;output filename Filename for compiled exe<br>-u &#8211;unhook Unhook ntdll.dll<br>-v &#8211;verbose Enable verbose messages during execution<br>-e &#8211;encrypt-strings Encrypt strings using the strenc module<br>-g &#8211;get-syscallstub Use GetSyscallStub instead of NimlineWhispers2<br>-l &#8211;llvm-obfuscator Use Obfuscator-LLVM to compile binary<br>-n &#8211;no-randomization Disable syscall name randomization<br>-s &#8211;no-sandbox Disable sandbox checks<\/strong><\/p>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Features<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>NtQueueApcThread Shellcode Execution w\/ PPID Spoofing &amp; 3rd Party DLL Blocking<\/li><li>NimlineWhispers2 &amp; GetSyscallStub for Syscall Use<\/li><li>Syscall Name Randomization<\/li><li>Ability to load .NET and Regular PE Files<\/li><li>AES Encryption with Dynamic Key Generation<\/li><li>LLVM-Obfuscator Compatibility<\/li><li>String Encryption<\/li><li>Sandbox Evasion<\/li><\/ul>\n\n\n\n<h4 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/icyguider\/Nimcrypt2#tested-and-confirmed-working-on\"><\/a>Tested and Confirmed Working on<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Windows 11 (10.0.22000)<\/li><li>Windows 10 21H2 (10.0.19044)<\/li><li>Windows 10 21H1 (10.0.19043)<\/li><li>Windows 10 20H2 (10.0.19042)<\/li><li>Windows 10 19H2 (10.0.18363)<\/li><li>Windows Server 2019 (10.0.17763)<\/li><\/ul>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/icyguider\/Nimcrypt2#installationdependencies\"><\/a>Installation\/Dependencies<\/h4>\n\n\n\n<p>Nimcrypt2 is designed to be used on Linux systems with Nim installed. Before installing Nim, you must ensure that you have the following packages installed via your package manager:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo apt install<\/strong> <strong>gcc mingw-w64 xz-utils git<\/strong><\/p>\n\n\n\n<p>To install Nim, I prefer to use&nbsp;choosenim&nbsp;as follows:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>curl https:\/\/nim-lang.org\/choosenim\/init.sh -sSf | sh<br>echo &#8220;export PATH=$HOME\/.nimble\/bin:$PATH&#8221; &gt;&gt; ~\/.bashrc<br>export PATH=$HOME\/.nimble\/bin:$PATH<\/strong><\/p>\n\n\n\n<p>Nimcrypt2 also depends on a few packages that can be installed via Nimble. This can be done like so:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>nimble install winim nimcrypto docopt ptr_math strenc<\/strong><\/p>\n\n\n\n<p>With all the dependencies now installed, Nimcrypt2 can be compiled like so:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>nim c -d=release &#8211;cc:gcc &#8211;embedsrc=on &#8211;hints=on &#8211;app=console &#8211;cpu=amd64 &#8211;out=nimcrypt nimcrypt.nim<\/strong><\/p>\n\n\n\n<p><strong>OPTIONAL:<\/strong>&nbsp;To use the&nbsp;Obfuscator-LLVM&nbsp;flag, you must have it installed on your system alongside&nbsp;wclang. I&#8217;ve found this to be a bit of a pain but you should be able to do it with a little perseverance. Here&#8217;s a quick step-by-step that worked on my Kali Linux system:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone desired version of Obfuscator-LLVM and build it<\/li><li>Once compiled, backup the existing version of clang and move the new Obfuscator-LLVM version of clang to \/usr\/bin\/<\/li><li>Install wclang and add it&#8217;s binaries to your PATH<\/li><li>Backup existing clang library files, copy new newly built Obfuscator-LLVM library includes to \/usr\/lib\/clang\/OLD_VERSION\/<\/li><\/ul>\n\n\n\n<p>In addition, you must add the following lines to your&nbsp;<strong><code>nim.cfg<\/code>&nbsp;<\/strong>file to point nim to your wclang binaries:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>amd64.windows.clang.exe = &#8220;x86_64-w64-mingw32-clang&#8221;<br>amd64.windows.clang.linkerexe = &#8220;x86_64-w64-mingw32-clang&#8221;<br>amd64.windows.clang.cpp.exe = &#8220;x86_64-w64-mingw32-clang++&#8221;<br>amd64.windows.clang.cpp.linkerexe = &#8220;x86_64-w64-mingw32-clang++&#8221;<\/strong><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>amd64.windows.clang.cpp.linkerexe = \"x86_64-w64-mingw32-clang++\"<\/strong>\n<\/code><\/pre>\n\n\n\n<p>There is probably a better way to do this but this is what worked for me. If you have issues, just keep trying and ensure that you can run&nbsp;<strong><code>x86_64-w64-mingw32-clang -v<\/code>&nbsp;<\/strong>and it shows &#8220;Obfuscator-LLVM&#8221; in the output. Also ensure MinGW is using the Obfuscator-LLVM library files: Nim will give you an error if not.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/icyguider\/Nimcrypt2\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original&nbsp;Nimcrypt&nbsp;project, with the main improvements being the use of direct syscalls and the ability to load regular PE files as well as raw shellcode. Before going any further, I must acknowledge those who did the VAST majority of work [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":24355,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[50,5110,2455,5111],"class_list":["post-24324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-net","tag-nimcrypt2","tag-pe","tag-raw-shellcode-packer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim<\/title>\n<meta name=\"description\" content=\"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim\" \/>\n<meta property=\"og:description\" content=\"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-16T11:22:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-16T11:22:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim\",\"datePublished\":\"2022-05-16T11:22:23+00:00\",\"dateModified\":\"2022-05-16T11:22:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\"},\"wordCount\":750,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\",\"keywords\":[\".NET\",\"Nimcrypt2\",\"PE\",\"Raw Shellcode Packer\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\",\"name\":\"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\",\"datePublished\":\"2022-05-16T11:22:23+00:00\",\"dateModified\":\"2022-05-16T11:22:24+00:00\",\"description\":\"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim","description":"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/","og_locale":"en_US","og_type":"article","og_title":"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim","og_description":"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.","og_url":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-05-16T11:22:23+00:00","article_modified_time":"2022-05-16T11:22:24+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim","datePublished":"2022-05-16T11:22:23+00:00","dateModified":"2022-05-16T11:22:24+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/"},"wordCount":750,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","keywords":[".NET","Nimcrypt2","PE","Raw Shellcode Packer"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/","url":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/","name":"Nimcrypt2 : .NET, PE, And Raw Shellcode Packer\/Loader Written In Nim","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","datePublished":"2022-05-16T11:22:23+00:00","dateModified":"2022-05-16T11:22:24+00:00","description":"Nimcrypt2 is yet another PE packer\/loader designed to bypass AV\/EDR. It is an improvement on my original\u00a0Nimcrypt\u00a0project.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/nimcrypt2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/nimcrypt2\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj8WooNkgWDjr5IkWMnk27e1KJ80OA-PKtxI_aefhyXSgZFRLpHKVweeLPYiM_TWm7IKOwyRlEN7GLLceNMKw9xmMW3bxQ4R-zbApSqiJEjuHxtjrBjJaJZukLWTXi0POayoe7E_BL8EVn9w8Gs5PBMIR9-dsnChvNIBK3dD2lH_vW1IsSt1orUrTjG\/s728\/image_750x500_62561864e6a70.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":27560,"url":"https:\/\/kalilinuxtutorials.com\/protectmytooling\/","url_meta":{"origin":24324,"position":0},"title":"ProtectMyTooling : Multi-Packer Wrapper Letting Us Daisy-Chain Various Packers, Obfuscators And Other Red Team Oriented Weaponry","author":"R K","date":"November 8, 2022","format":false,"excerpt":"ProtectMyTooling is a script that wraps around multitude of packers, protectors, obfuscators, shellcode loaders, encoders, generators to produce complex protected Red Team implants. Your perfect companion in Malware Development CI\/CD pipeline, helping watermark your artifacts, collect IOCs, backdoor and more. ProtectMyToolingGUI.py With ProtectMyTooling you can quickly obfuscate your binaries without\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhSKGFPM_KojZEjFJ2K9TDcmJ0kuVNoeM_64Urm4n5e42LE0AiR3EbGH5QVkabBTCxgcWLp_Hd5GB1c4yp9fVHYhzRFuvjNnsM9SWmORi2wLTl9CyiNkNi6DFM4cYIDQBUSDmS9ruzjH5vzAlrlX_EjT4tok7373oJlVkqmP3BaSWDk9PcdBSUASyj7\/s728\/ProtectMyTooling.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":24779,"url":"https:\/\/kalilinuxtutorials.com\/nimpackt-v1\/","url_meta":{"origin":24324,"position":1},"title":"NimPackt-v1 : Nim-based Assembly Packer And Shellcode Loader For Opsec And Profit","author":"R K","date":"May 28, 2022","format":false,"excerpt":"NimPackt-v1 is among the worst code I have ever written (I was just starting out learning Nim). Because of this, I started on a full rewrite of NimPackt, dubbed 'NimPackt-NG' (currently still private). With this re-write, I decided to open-source the old branch (\"NimPackt-v1\"). As such, this branch is no\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPxCQwtniBw65fsASiHVJ58JDW8CA3rOrg1hkQJlW3F6i--_OcKc88kM4yfZp99CSKd48CbaNJWd1T9MwrHkNC7sAJee5zMgRrr8vNwgcKGy4GzJapINyGTu_Th83Dis_iHVGUHwzz1RXT_vnvCQRijcrugbmS9JdpCNhFj0ExNjvr4GgB3qvDrMhQ\/s728\/Nimpackt-Logo-Blacktext%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPxCQwtniBw65fsASiHVJ58JDW8CA3rOrg1hkQJlW3F6i--_OcKc88kM4yfZp99CSKd48CbaNJWd1T9MwrHkNC7sAJee5zMgRrr8vNwgcKGy4GzJapINyGTu_Th83Dis_iHVGUHwzz1RXT_vnvCQRijcrugbmS9JdpCNhFj0ExNjvr4GgB3qvDrMhQ\/s728\/Nimpackt-Logo-Blacktext%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPxCQwtniBw65fsASiHVJ58JDW8CA3rOrg1hkQJlW3F6i--_OcKc88kM4yfZp99CSKd48CbaNJWd1T9MwrHkNC7sAJee5zMgRrr8vNwgcKGy4GzJapINyGTu_Th83Dis_iHVGUHwzz1RXT_vnvCQRijcrugbmS9JdpCNhFj0ExNjvr4GgB3qvDrMhQ\/s728\/Nimpackt-Logo-Blacktext%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiPxCQwtniBw65fsASiHVJ58JDW8CA3rOrg1hkQJlW3F6i--_OcKc88kM4yfZp99CSKd48CbaNJWd1T9MwrHkNC7sAJee5zMgRrr8vNwgcKGy4GzJapINyGTu_Th83Dis_iHVGUHwzz1RXT_vnvCQRijcrugbmS9JdpCNhFj0ExNjvr4GgB3qvDrMhQ\/s728\/Nimpackt-Logo-Blacktext%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":19760,"url":"https:\/\/kalilinuxtutorials.com\/inceptor\/","url_meta":{"origin":24324,"position":2},"title":"Inceptor : Template-Driven AV\/EDR Evasion Framework","author":"R K","date":"October 29, 2021","format":false,"excerpt":"Inceptor is a modern Penetration testing and Red Teaming often requires to bypass common AV\/EDR appliances in order to execute code on a target. With time, defenses are becoming more complex and inherently more difficult to bypass consistently. Inceptor is a tool which can help to automate great part of\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEh2AaO3Wpu7SgBYBbqSLaQEzirbhU-ppbOFMOQipQD6WrxAUKk3n8uxC49u51KLuBNPefgSIkllMb-mtN9TH9TX4YdudAM2RV_mSFkOYI_MHM66J3vhJmVAwGMq76SifXd2n1quqYilV--Qn0a5Uo9DtV2i7Mfqo0V6Gvf8eGlneOykJCBgn1X9bErN=s698 1.5x"},"classes":[]},{"id":26906,"url":"https:\/\/kalilinuxtutorials.com\/nim-runpe\/","url_meta":{"origin":24324,"position":3},"title":"Nim-RunPE : A Nim Implementation Of Reflective PE-Loading From Memory","author":"R K","date":"September 13, 2022","format":false,"excerpt":"Nim-RunPE , is a Nim implementation of reflective PE-Loading from memory. The base for this code was taken from\u00a0RunPE-In-Memory\u00a0- which I ported to Nim. You'll need to install the following dependencies: nimble install ptr_math winim I did test this with Nim Version 1.6.2 only, so use that version for testing\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgLQ__J2dBDW5g2WCFhuIY4mVdb6tIA8jpGaVzpvIkquQVsACfoT6Qr1Rc07aARI2dxsqjgtub-xcPAr4bF5Z7xcR5bZfTA1IEQie-1qeZsvBTk8ipU9aXtCbCLpCqJupD0EWw4SebLurXih4EkBAwNdOBZ6P6qBsrbDjMiccwjo7_gMBn5JzONpvqG\/s894\/54%20%282%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgLQ__J2dBDW5g2WCFhuIY4mVdb6tIA8jpGaVzpvIkquQVsACfoT6Qr1Rc07aARI2dxsqjgtub-xcPAr4bF5Z7xcR5bZfTA1IEQie-1qeZsvBTk8ipU9aXtCbCLpCqJupD0EWw4SebLurXih4EkBAwNdOBZ6P6qBsrbDjMiccwjo7_gMBn5JzONpvqG\/s894\/54%20%282%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgLQ__J2dBDW5g2WCFhuIY4mVdb6tIA8jpGaVzpvIkquQVsACfoT6Qr1Rc07aARI2dxsqjgtub-xcPAr4bF5Z7xcR5bZfTA1IEQie-1qeZsvBTk8ipU9aXtCbCLpCqJupD0EWw4SebLurXih4EkBAwNdOBZ6P6qBsrbDjMiccwjo7_gMBn5JzONpvqG\/s894\/54%20%282%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgLQ__J2dBDW5g2WCFhuIY4mVdb6tIA8jpGaVzpvIkquQVsACfoT6Qr1Rc07aARI2dxsqjgtub-xcPAr4bF5Z7xcR5bZfTA1IEQie-1qeZsvBTk8ipU9aXtCbCLpCqJupD0EWw4SebLurXih4EkBAwNdOBZ6P6qBsrbDjMiccwjo7_gMBn5JzONpvqG\/s894\/54%20%282%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":7212,"url":"https:\/\/kalilinuxtutorials.com\/donut-x86-x64-or-amd64x86-shellcode\/","url_meta":{"origin":24324,"position":4},"title":"Donut : Generates x86, x64, or AMD64+x86 Position-Independent Shellcode","author":"R K","date":"November 11, 2019","format":false,"excerpt":"Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution. Given a supported file type, parameters and an entry point where applicable (such as Program.Main), it produces position-independent shellcode that loads and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35413,"url":"https:\/\/kalilinuxtutorials.com\/hooka\/","url_meta":{"origin":24324,"position":5},"title":"Hooka : Advanced Shellcode Loader Generation With Enhanced Evasion Techniques","author":"Varshini","date":"December 9, 2024","format":false,"excerpt":"Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on other tools like BokuLoader, Freeze or Shhhloader, and it tries to implement more evasion features. Why in Golang? Why not? Features This tool is able to generate loaders with this features: Multiple shellcode injection techniques:\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh1q82H7u4-OCqea0NREv05fAEws7ZYjswsEWKpQaw54CHMwp_pIgmsviPJMz85T88azhQNukGGjKvOFXz2nrrdS38l4XnisyPVzySoX1YeK0oirvrfsRFWPbih7oWhgfmEg4maiPcs1vyKFtAUAg6GrHBqCBcwj5ESDv8FhZUdjbOynhCeWsLGBWwNtWja\/s1600\/Hooka%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=24324"}],"version-history":[{"count":18,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24324\/revisions"}],"predecessor-version":[{"id":24358,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/24324\/revisions\/24358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/24355"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=24324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=24324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=24324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}