{"id":26234,"date":"2022-07-28T07:19:01","date_gmt":"2022-07-28T07:19:01","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=26234"},"modified":"2022-07-28T07:19:04","modified_gmt":"2022-07-28T07:19:04","slug":"tofu","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/tofu\/","title":{"rendered":"Tofu : Windows Offline Filesystem Hacking Tool For Linux"},"content":{"rendered":"\n<p><strong>Tofu<\/strong> is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">How It Works <\/h1>\n\n\n\n<p>When a Windows machine is shut down, unless it has Bitlocker or another encryption service enabled, it&#8217;s storage device contains everything stored on the device as if it was unlocked. This means that you can boot from an operating system on a bootable USB and access it&#8217;s files &#8211; or even just connect the filesystem to another computer.<br>This tool helps for when you can access the Windows filesystem from Linux (using one of the mentioned methods); it has utilities that can dump NTLM password hashes, list users, install backdoors to spawn an elevated command prompt at the login screen and more.<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/puckblush\/tofu#modules--\"><\/a>Modules <\/h1>\n\n\n\n<p>Because tofu works on modules, it can be expanded for different purposes. See the &#8216;modules&#8217; section for examples.<br>Current Modules:<br>1.&nbsp;<em>hashdump.py<\/em>&nbsp;&#8211; Dumps NTLM hashes from the target Windows filesystem<br>2.&nbsp;<em>osk_backdoor.py<\/em>&nbsp;&#8211; Backdoor osk.exe to bypass the login; also includes an &#8216;unbackdoor&#8217; module<br>3.&nbsp;<em>list_users.py<\/em>&nbsp;&#8211; List the users with a profile on the Windows filesystem<br>4.&nbsp;<em>chrome.py<\/em>&nbsp;&#8211; Dump chrome history and login data of all users on the Windows filesystem<br>5.&nbsp;<em>get_dpapi_masterkeys.py<\/em>&nbsp;&#8211; Dump DPAPI master keys from the Windows filesystem<br>6.&nbsp;<em>enum_unattend.py<\/em>&nbsp;&#8211; Enumerate unattend files<br>7.&nbsp;<em>memory_strings.py<\/em>&nbsp;&#8211; Search through the memory of the computer to find data<br>8.&nbsp;<em>startup.py<\/em>&nbsp;&#8211; Inject a program into a user&#8217;s startup directory<br>9.&nbsp;<em>wifi.py<\/em>&nbsp;&#8211; Get Wi-Fi passwords with DPAPI<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/puckblush\/tofu#usage--\"><\/a>Usage <\/h1>\n\n\n\n<p>&#8216;list&#8217; : List all storage devices at \/dev\/ with a format of MSDOS, NTFS or -FVE-FS- (BITLOCKER) ; This will load the drive paths into memory<br>&#8216;usedrive&#8217; : Set the drive to use; can use numbers assigned from the &#8216;list&#8217; command<br>&#8216;modules&#8217; : List modules ; This will load the module names into memory, so you need to run this command before selecting a module<br>&#8216;use&#8217; : Use the selected module<\/p>\n\n\n\n<h1 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/puckblush\/tofu#setup--\"><\/a>Setup <\/h1>\n\n\n\n<p><strong>(need to run as root because PyPyKatz&#8217; import path directory is dependent on the current user, and this needs to run as root)<\/strong><br><em>sudo pip3 install -r requirements.txt<br>sudo python3 tofu.py<\/em><\/p>\n\n\n\n<h2 class=\"has-light-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/puckblush\/tofu#-built-with--\"><\/a>Built With <\/h2>\n\n\n\n<p>PyCryptodome<br>PypyKatz<\/p>\n\n\n\n<h3 class=\"has-luminous-vivid-amber-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/puckblush\/tofu#warning--if-youre-writing-a-module-make-sure-it-wont-do-any-damage-before-running-it-\"><\/a><strong>Warning : If you&#8217;re writing a module, make sure it won&#8217;t do any damage before running it<\/strong><\/h3>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/puckblush\/tofu\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors, user enumeration and more. How It Works When a Windows machine is shut down, unless it has Bitlocker or another encryption service enabled, it&#8217;s storage device contains everything stored on the device as if it was unlocked. [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":26241,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1183,1446,1896,5486,5487],"class_list":["post-26234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-filesystem","tag-hacking-tool","tag-linux","tag-tofu","tag-windows-offline"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tofu : Windows Offline Filesystem Hacking Tool For Linux<\/title>\n<meta name=\"description\" content=\"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/tofu\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tofu : Windows Offline Filesystem Hacking Tool For Linux\" \/>\n<meta property=\"og:description\" content=\"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/tofu\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-28T07:19:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-28T07:19:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Tofu : Windows Offline Filesystem Hacking Tool For Linux\",\"datePublished\":\"2022-07-28T07:19:01+00:00\",\"dateModified\":\"2022-07-28T07:19:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/\"},\"wordCount\":408,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\",\"keywords\":[\"Filesystem\",\"Hacking Tool\",\"linux\",\"Tofu\",\"Windows Offline\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tofu\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/tofu\/\",\"name\":\"Tofu : Windows Offline Filesystem Hacking Tool For Linux\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\",\"datePublished\":\"2022-07-28T07:19:01+00:00\",\"dateModified\":\"2022-07-28T07:19:04+00:00\",\"description\":\"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/tofu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tofu : Windows Offline Filesystem Hacking Tool For Linux","description":"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/tofu\/","og_locale":"en_US","og_type":"article","og_title":"Tofu : Windows Offline Filesystem Hacking Tool For Linux","og_description":"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.","og_url":"https:\/\/kalilinuxtutorials.com\/tofu\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-07-28T07:19:01+00:00","article_modified_time":"2022-07-28T07:19:04+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/tofu\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/tofu\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Tofu : Windows Offline Filesystem Hacking Tool For Linux","datePublished":"2022-07-28T07:19:01+00:00","dateModified":"2022-07-28T07:19:04+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tofu\/"},"wordCount":408,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","keywords":["Filesystem","Hacking Tool","linux","Tofu","Windows Offline"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/tofu\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/tofu\/","url":"https:\/\/kalilinuxtutorials.com\/tofu\/","name":"Tofu : Windows Offline Filesystem Hacking Tool For Linux","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","datePublished":"2022-07-28T07:19:01+00:00","dateModified":"2022-07-28T07:19:04+00:00","description":"Tofu is a modular tool for hacking offline Windows filesystems and bypassing login screens. Can do hashdumps, OSK-Backdoors.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/tofu\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/tofu\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgdFkY4OmAa1E62fRd18NpiQYzkZjRVSE1ZuT86lT8Phla4ETL3KwPeEcVHxSfObqapSaekzj0RRSFvV4rxNW9jPxdGnm7E7Bieg6nSv6-rlsrb2VGgUcRHwLLDFKtqSBd-pDUesZQDkh25gvjZlrzy77k41pOQaixaqwKpGiSg2YZQv-jejOqDWi6R\/s728\/tofu%20(1).png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":17790,"url":"https:\/\/kalilinuxtutorials.com\/meat\/","url_meta":{"origin":26234,"position":0},"title":"MEAT : This Toolkit Aims To Help Forensicators Perform Different Kinds Of Acquisitions On iOS Devices","author":"R K","date":"September 16, 2021","format":false,"excerpt":"MEAT aims to help forensicators perform different kinds of acquisitions on iOS devices (and Android in the future). Requirements to run from source Windows or LinuxPython 3.7.4 or 3.7.2Pip packages seen in requirements.txt Types of Acquisitions Supported iOS Devices Logical Using the logical acquisition flag on MEAT will instruct the\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-gfHki3AXkp4\/YTCRngdKLNI\/AAAAAAAAKpU\/_RErfzOpLmwuAyOT3RfWQmry83IizaKVgCLcBGAsYHQ\/s728\/MEAT%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":33099,"url":"https:\/\/kalilinuxtutorials.com\/m-e-a-t\/","url_meta":{"origin":26234,"position":1},"title":"M.E.A.T. &#8211; Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit","author":"Varshini","date":"May 16, 2024","format":false,"excerpt":"The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this toolkit facilitates comprehensive data acquisition from iOS devices, with planned expansion to Android. M.E.A.T. equips forensic experts with the tools needed to execute logical and filesystem acquisitions seamlessly, paving the way for advanced mobile forensics\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi4MaX0BzqlD9nQ-GIuGVssBH6V26vNgLybKgbNHYNIZy5yp_e0VUTfyn-zdFwvOr4zE_sNw6tfL1v2xlMyMMdUkqeCvcVToK8daiwtpFKmAI79s4XZu39fj2B7HOyRb8P3yBIXHuyGncmgbqmRL8C4_sp7mGGSOuyzq7Zw4ehr5yLCT_PaI3ZyETrDUAS0\/s16000\/OSINT%20Inception%20Links%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":6902,"url":"https:\/\/kalilinuxtutorials.com\/fsmon-monitor-filesystem\/","url_meta":{"origin":26234,"position":2},"title":"FSMon : Monitor Filesystem On iOS \/ OS X \/ Android \/ FirefoxOS \/ Linux","author":"R K","date":"October 17, 2019","format":false,"excerpt":"FSMon or FileSystem Monitor utility that runs on Linux, Android, iOS and OSX. Brought to you by Sergi \u00c0lvarez at Nowsecure and distributed under the MIT license. Usage The tool retrieves file system events from a specific directory and shows them in colorful format or in JSON. It is possible\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37370,"url":"https:\/\/kalilinuxtutorials.com\/bincrypter\/","url_meta":{"origin":26234,"position":3},"title":"Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation","author":"Varshini","date":"March 28, 2025","format":false,"excerpt":"Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to obfuscate and encrypt ELF binaries and #!-scripts, providing a robust layer of protection against reverse engineering and detection by antivirus and endpoint detection and response (EDR) systems. Key Features Of Bincrypter Obfuscation and Encryption: Bincrypter\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/Bincrypter-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1871,"url":"https:\/\/kalilinuxtutorials.com\/hawkeye-crawl-filesystem-directory\/","url_meta":{"origin":26234,"position":4},"title":"Hawkeye &#8211; A Tool To Crawl The Filesystem Or A Directory","author":"R K","date":"July 10, 2018","format":false,"excerpt":"HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password files, etc. Hawkeye uses a fast filesystem crawler to look through files recursively and then sends them for analysis in real time and presents the data\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":668,"url":"https:\/\/kalilinuxtutorials.com\/chntpw\/","url_meta":{"origin":26234,"position":5},"title":"chntpw &#8211; Windows Password, Account Forensics &#038; Change User Password","author":"Ravi Sankar","date":"June 18, 2018","format":false,"excerpt":"chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to administrator, as well as several other useful options. Using chntpw is a great way to\u00a0reset a Windows Password or otherwise gain access to a Windows machine\u2026","rel":"","context":"In &quot;Forensics&quot;","block_context":{"text":"Forensics","link":"https:\/\/kalilinuxtutorials.com\/category\/f\/"},"img":{"alt_text":"chntpw","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/chntpw1.png?resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/chntpw1.png?resize=350%2C200 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/chntpw1.png?resize=525%2C300 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2015\/09\/chntpw1.png?resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=26234"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26234\/revisions"}],"predecessor-version":[{"id":26240,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/26234\/revisions\/26240"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/26241"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=26234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=26234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=26234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}