{"id":25711,"date":"2022-06-30T11:50:49","date_gmt":"2022-06-30T11:50:49","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=25711"},"modified":"2022-06-30T11:50:50","modified_gmt":"2022-06-30T11:50:50","slug":"tornado","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/tornado\/","title":{"rendered":"Tornado : Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Port forwarding"},"content":{"rendered":"\n<p><strong>Tornado<\/strong> is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers the possibility of making services in a machine accessible as hidden services without portforwarding, by taking advantage of the anonymity it offers and thereby preventing the real location of the machine from being exposed.<\/p>\n\n\n\n<p>tornado can do<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>create hidden service with tor network<\/li><li>generate cross platform msfvenom payload with fully undetectable shellcode execution not shikata_ga_nai things<\/li><li>hidden service becomes available outside tor network and ready to reverse shell connection<\/li><\/ul>\n\n\n\n<p>be careful with tor2web even onion network, the only suicide mission is wearing blinders. tornado not secure from victim&#8217;s point of view: the point of tor is that users can connect without being eavesdropped on and going through the clearnet with tor2web, even with https seriously cripples the efforts made to protect users.<\/p>\n\n\n\n<h3 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/samet-g\/tornado#built-with\"><\/a>Built With<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Tor<\/li><li>Metasploit<\/li><li>Tor2Web<\/li><\/ul>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/samet-g\/tornado#getting-started\"><\/a>Getting Started<\/h2>\n\n\n\n<p>To get a local copy up and running follow these simple steps.<\/p>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/samet-g\/tornado#installation\"><\/a>Installation<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>Clone the repo<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ git clone https:\/\/github.com\/samet-g\/tornado.git<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Setup tornado with requirement packages<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ sudo python3 setup.py install<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Run it with sudo permissions<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ sudo tornado<\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Usage<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Run tornado with sudo permissions &amp; -start flag<\/li><\/ul>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ sudo tornado -start<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/samet-g\/tornado\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services for your localhost .onion domain without portforwarding. If you have experience different remote administration tools, probably you know you need forward port with virtual private network or ngrok but in this sense with tornado, the tor network offers [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":25722,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5382,2840,5381],"class_list":["post-25711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hidden-services","tag-reverse-shell","tag-tornado"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tornado : Anonymously Reverse Shell Over Tor Network<\/title>\n<meta name=\"description\" content=\"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/tornado\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tornado : Anonymously Reverse Shell Over Tor Network\" \/>\n<meta property=\"og:description\" content=\"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/tornado\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-30T11:50:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-30T11:50:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Tornado : Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Port forwarding\",\"datePublished\":\"2022-06-30T11:50:49+00:00\",\"dateModified\":\"2022-06-30T11:50:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/\"},\"wordCount\":257,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\",\"keywords\":[\"Hidden Services\",\"Reverse Shell\",\"Tornado\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tornado\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/tornado\/\",\"name\":\"Tornado : Anonymously Reverse Shell Over Tor Network\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\",\"datePublished\":\"2022-06-30T11:50:49+00:00\",\"dateModified\":\"2022-06-30T11:50:50+00:00\",\"description\":\"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tornado\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tornado : Anonymously Reverse Shell Over Tor Network","description":"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/tornado\/","og_locale":"en_US","og_type":"article","og_title":"Tornado : Anonymously Reverse Shell Over Tor Network","og_description":"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .","og_url":"https:\/\/kalilinuxtutorials.com\/tornado\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-06-30T11:50:49+00:00","article_modified_time":"2022-06-30T11:50:50+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/tornado\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/tornado\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Tornado : Anonymously Reverse Shell Over Tor Network Using Hidden Services Without Port forwarding","datePublished":"2022-06-30T11:50:49+00:00","dateModified":"2022-06-30T11:50:50+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tornado\/"},"wordCount":257,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","keywords":["Hidden Services","Reverse Shell","Tornado"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/tornado\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/tornado\/","url":"https:\/\/kalilinuxtutorials.com\/tornado\/","name":"Tornado : Anonymously Reverse Shell Over Tor Network","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","datePublished":"2022-06-30T11:50:49+00:00","dateModified":"2022-06-30T11:50:50+00:00","description":"Tornado is implements tor network with metasploit-framework tool and msfvenom module, you can easily create hidden services .","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/tornado\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/tornado\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEj9fDMDQK3Rc4jRBnZ5jBdZEQC5aLijrQPq9fI1qjYEHZQXj7eJ7N019fx0Puk6gWhMawJsV-TjIgIxVx2r4-JyLxkXLJAKH3MQjyKa--9CwAopBdwqREuT6TVDN6OWFB4lLM6EiN2LzMFPwqsE-UKjYLoZFBGMEdrDWuSwkZyBAJ59jtVMiJnhjMll\/s728\/twister%20logo%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2985,"url":"https:\/\/kalilinuxtutorials.com\/docker-tor-hidden-service-nginx\/","url_meta":{"origin":25711,"position":0},"title":"Docker Tor Hidden Service Nginx &#8211; Easily Setup A Hidden Service Inside The Tor Network","author":"R K","date":"October 10, 2018","format":false,"excerpt":"Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the skeleton configuration for you hidden service, replace for your hidden service pattern name. Example, if you want to your hidden service contain the word 'boss', just use this word as\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Docker-Tor-Hidden-Service-Nginx.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Docker-Tor-Hidden-Service-Nginx.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Docker-Tor-Hidden-Service-Nginx.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Docker-Tor-Hidden-Service-Nginx.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":20467,"url":"https:\/\/kalilinuxtutorials.com\/tor-rootkit\/","url_meta":{"origin":25711,"position":1},"title":"Tor-Rootkit : A Python 3 Standalone Windows 10 \/ Linux Rootkit Using Tor","author":"R K","date":"November 29, 2021","format":false,"excerpt":"Tor-Rootkit is a Python 3 standalone Windows 10 \/ Linux Rootkit. The networking communication get's established over the tor network. How To Use Clone the repo and change directory: git clone https:\/\/github.com\/emcruise\/TorRootkit.gitcd .\/tor-rootkit Build docker container: docker build -t listener . Run docker container: docker run -v $(pwd)\/executables:\/executables\/ -it listener\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEg1qpS510FeY095KImUn-o9fd6VpE2onyq6K2zYCt4w-EHT-nN75Iq2TdFhJ-O9XHo14S1_17KZQ_Hh6ca5uss3bsOqok2Qk4eq1d3sxRJTfqs1zo6DcI3ZZa5OFNciZaMf3iJbF3100m-YilAxNeY_AORESiwPW_w-GXZ7EW79M4evA-z5cWAnwa6K=s728 2x"},"classes":[]},{"id":1172,"url":"https:\/\/kalilinuxtutorials.com\/onion-nmap-scan-hidden-services\/","url_meta":{"origin":25711,"position":2},"title":"Onion nmap To Scan Hidden Onion Services","author":"R K","date":"July 12, 2018","format":false,"excerpt":"Utilize nmap to scan hidden \"onion\" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and dnsmasq are keep running as daemons by means of s6, and proxychains wraps nmap to utilize the Tor SOCKS intermediary on port 9050. Tor is likewise\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":21374,"url":"https:\/\/kalilinuxtutorials.com\/xc\/","url_meta":{"origin":25711,"position":3},"title":"XC : A Small Reverse Shell For Linux And Windows","author":"R K","date":"January 26, 2022","format":false,"excerpt":"XC is a Netcat like reverse shell for Linux & Windows. Features Windows Usage:\u2514 Shared Commands: !exit!upload uploads a file to the target!downloaddownloads a file from the target!lfwdlocal portforwarding (like ssh -L)!rfwdremote portforwarding (like ssh -R)!lsfwdlists active forwards!rmfwdremoves forward by index!pluginslists available plugins!pluginexecute a plugin!spawnspawns another client on the specified\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 2x"},"classes":[]},{"id":32061,"url":"https:\/\/kalilinuxtutorials.com\/xc-2\/","url_meta":{"origin":25711,"position":4},"title":"XC : A Comprehensive Guide To Netcat &#8211; Like Reverse Shell For Linux And Windows","author":"Varshini","date":"February 15, 2024","format":false,"excerpt":"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation, port forwarding, and plugin execution, XC offers versatile capabilities for penetration testers and ethical hackers. This article provides a detailed overview and setup guide for leveraging XC's functionalities effectively.\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20%2822%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3032,"url":"https:\/\/kalilinuxtutorials.com\/metadata-attacker\/","url_meta":{"origin":25711,"position":5},"title":"Metadata-Attacker : A Tool To Generate Media Files With Malicious Metadata","author":"R K","date":"October 30, 2018","format":false,"excerpt":"Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file containing your custom metadata or a set of cross-site scripting vectors to test any webservice against possible XSS vulnerabilities when displaying unfiltered meta data. Metadata-Attacker Installation \/ Usage First install\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Metadata-Attacker-1.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Metadata-Attacker-1.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Metadata-Attacker-1.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Metadata-Attacker-1.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/Metadata-Attacker-1.png?resize=1050%2C600&ssl=1 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25711","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=25711"}],"version-history":[{"count":9,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25711\/revisions"}],"predecessor-version":[{"id":25721,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/25711\/revisions\/25721"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/25722"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=25711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=25711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=25711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}