{"id":27837,"date":"2022-12-27T10:28:17","date_gmt":"2022-12-27T10:28:17","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=27837"},"modified":"2022-12-27T10:37:18","modified_gmt":"2022-12-27T10:37:18","slug":"hacktronian-tool","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","title":{"rendered":"The Hackingsage\/Hacktronian &#8211; A Pentesting Tool for Linux and Android"},"content":{"rendered":"\n<p>Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.<\/p>\n\n\n\n<p>Hacktronian has different modules such as information gathering, and password attacks. Hacktronian is a complete package of different hacking tools\/modules such as\u00a0 Setoolkit,\u00a0Nmap, Host To IP Conversion, WAScan module, CMS Scanner module, and XSStrike module for cross-site scripting.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Hacktronian Tool Menu<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Gathering<\/li>\n\n\n\n<li>Password Attacks<\/li>\n\n\n\n<li>Wireless Testing<\/li>\n\n\n\n<li>Exploitation Tools<\/li>\n\n\n\n<li>Sniffing &amp; Spoofing<\/li>\n\n\n\n<li>Web Hacking<\/li>\n\n\n\n<li>Private Web Hacking<\/li>\n\n\n\n<li>Post Exploitation<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Installation of the Hacktronian tool:<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Installation in Linux :<\/h3>\n\n\n\n<p>This Tool Must Run As ROOT !!!<\/p>\n\n\n\n<p><code>git clone https:\/\/github.com\/thehackingsage\/hacktronian.git<\/code><\/p>\n\n\n\n<p><code>cd hacktronian<\/code><\/p>\n\n\n\n<p><code>chmod +x install.sh<\/code><\/p>\n\n\n\n<p><code>.\/install.sh<\/code><\/p>\n\n\n\n<p>That&#8217;s it.. you can execute the tool by typing&nbsp;<strong>hacktronian<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/thehackingsage\/hacktronian#installation-in-android-\"><\/a>Installation in Android :<\/h3>\n\n\n\n<p> Open&nbsp;<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.termux\" rel=\"nofollow\">Termux<\/a><\/p>\n\n\n\n<p><code>pkg install git<\/code><\/p>\n\n\n\n<p><code>pkg install python<\/code><\/p>\n\n\n\n<p><code>git clone https:\/\/github.com\/thehackingsage\/hacktronian.git<\/code><\/p>\n\n\n\n<p><code>cd hacktronian<\/code><\/p>\n\n\n\n<p><code>chmod +x hacktronian.py<\/code><\/p>\n\n\n\n<p><code>python2 hacktronian.py<\/code><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/thehackingsage\/hacktronian#video-tutorial-\"><\/a>Video Tutorial :<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"youtube-embed\" data-video_id=\"1LJlyQAQby4\"><iframe loading=\"lazy\" title=\"Hacktronian.py - Top Pentesting Tools for Linux | (in Hindi)\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/1LJlyQAQby4?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/thehackingsage\/hacktronian#license-\"><\/a>License :<\/h2>\n\n\n\n<p><a href=\"https:\/\/github.com\/thehackingsage\/hacktronian\/blob\/master\/LICENSE\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">MIT Licence<\/a><\/p>\n\n\n\n<p>With the tool, you can start with the scanning process and be continued up to post-exploitation. The Tool can be <a href=\"https:\/\/github.com\/thehackingsage\/hacktronian\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">found on GitHub<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications. Hacktronian has different modules such as information gathering, and password attacks. Hacktronian is a complete package of different hacking tools\/modules such as\u00a0 Setoolkit,\u00a0Nmap, Host To IP Conversion, WAScan [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":28115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1450,1776],"class_list":["post-27837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hacktronian","tag-kali-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacktronian - A Pentesting Tool for Linux and Android<\/title>\n<meta name=\"description\" content=\"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktronian - A Pentesting Tool for Linux and Android\" \/>\n<meta property=\"og:description\" content=\"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-27T10:28:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-27T10:37:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\" \/>\n<meta name=\"author\" content=\"Febi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Febi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\"},\"author\":{\"name\":\"Febi\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/87218c340ae9b17a237e6e57c44e377d\"},\"headline\":\"The Hackingsage\/Hacktronian &#8211; A Pentesting Tool for Linux and Android\",\"datePublished\":\"2022-12-27T10:28:17+00:00\",\"dateModified\":\"2022-12-27T10:37:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\"},\"wordCount\":166,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\",\"keywords\":[\"Hacktronian\",\"kali linux\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\",\"name\":\"Hacktronian - A Pentesting Tool for Linux and Android\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\",\"datePublished\":\"2022-12-27T10:28:17+00:00\",\"dateModified\":\"2022-12-27T10:37:18+00:00\",\"description\":\"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png\",\"width\":\"578\",\"height\":\"391\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/87218c340ae9b17a237e6e57c44e377d\",\"name\":\"Febi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fcbcf405815be078ab768b045eecf9b4eae0978cebbf1d89d86dad5f0d87489d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fcbcf405815be078ab768b045eecf9b4eae0978cebbf1d89d86dad5f0d87489d?s=96&d=mm&r=g\",\"caption\":\"Febi\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/febi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktronian - A Pentesting Tool for Linux and Android","description":"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","og_locale":"en_US","og_type":"article","og_title":"Hacktronian - A Pentesting Tool for Linux and Android","og_description":"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.","og_url":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-12-27T10:28:17+00:00","article_modified_time":"2022-12-27T10:37:18+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","type":"","width":"","height":""}],"author":"Febi","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Febi","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/"},"author":{"name":"Febi","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/87218c340ae9b17a237e6e57c44e377d"},"headline":"The Hackingsage\/Hacktronian &#8211; A Pentesting Tool for Linux and Android","datePublished":"2022-12-27T10:28:17+00:00","dateModified":"2022-12-27T10:37:18+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/"},"wordCount":166,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","keywords":["Hacktronian","kali linux"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","url":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","name":"Hacktronian - A Pentesting Tool for Linux and Android","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","datePublished":"2022-12-27T10:28:17+00:00","dateModified":"2022-12-27T10:37:18+00:00","description":"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","width":"578","height":"391"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/87218c340ae9b17a237e6e57c44e377d","name":"Febi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fcbcf405815be078ab768b045eecf9b4eae0978cebbf1d89d86dad5f0d87489d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbcf405815be078ab768b045eecf9b4eae0978cebbf1d89d86dad5f0d87489d?s=96&d=mm&r=g","caption":"Febi"},"url":"https:\/\/kalilinuxtutorials.com\/author\/febi\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6288,"url":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","url_meta":{"origin":27837,"position":0},"title":"Hacktronian : All in One Hacking Tool for Linux &#038; Android","author":"R K","date":"August 23, 2019","format":false,"excerpt":"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing & Spoofing Web Hacking Private Web Hacking Post Exploitation Install The Hacking Tool Google Dorks Information Gathering: Nmap Setoolkit Port Scanning\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28031,"url":"https:\/\/kalilinuxtutorials.com\/xerror\/","url_meta":{"origin":27837,"position":1},"title":"Xerror &#8211; An Automated Penetration Testing Tool With GUI","author":"Febi","date":"January 17, 2023","format":false,"excerpt":"Xerror is an automated pentesting tool, which helps security professionals and nonprofessionals to automate their pentesting tasks. It will perform all tests and, at the end generate two reports for executives and analysts. Xerror provides GUI easy to use menu driven options. Internally it supports openVas for vulnerability scanning, Metasploit\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"xerror","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhx9a9MT9hC3DGAn0sRdsmwq_OwsWRkVy2hEnwMcz8lFINlQdXSf8WXbkwOT_72cpcj6BJBLeIeGrOB1cSDG5zkHBLY5qPBnrYmYOFCIXidA0W0NIh9TIhyoJTJoPvcAFCbRiqp83uPaRe8NMdUogVrlHaEZWUVagITJTx6xfYxC1glM3KKkU3nl3oE\/s16000\/xeror.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhx9a9MT9hC3DGAn0sRdsmwq_OwsWRkVy2hEnwMcz8lFINlQdXSf8WXbkwOT_72cpcj6BJBLeIeGrOB1cSDG5zkHBLY5qPBnrYmYOFCIXidA0W0NIh9TIhyoJTJoPvcAFCbRiqp83uPaRe8NMdUogVrlHaEZWUVagITJTx6xfYxC1glM3KKkU3nl3oE\/s16000\/xeror.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhx9a9MT9hC3DGAn0sRdsmwq_OwsWRkVy2hEnwMcz8lFINlQdXSf8WXbkwOT_72cpcj6BJBLeIeGrOB1cSDG5zkHBLY5qPBnrYmYOFCIXidA0W0NIh9TIhyoJTJoPvcAFCbRiqp83uPaRe8NMdUogVrlHaEZWUVagITJTx6xfYxC1glM3KKkU3nl3oE\/s16000\/xeror.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhx9a9MT9hC3DGAn0sRdsmwq_OwsWRkVy2hEnwMcz8lFINlQdXSf8WXbkwOT_72cpcj6BJBLeIeGrOB1cSDG5zkHBLY5qPBnrYmYOFCIXidA0W0NIh9TIhyoJTJoPvcAFCbRiqp83uPaRe8NMdUogVrlHaEZWUVagITJTx6xfYxC1glM3KKkU3nl3oE\/s16000\/xeror.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":2035,"url":"https:\/\/kalilinuxtutorials.com\/blackowl-tool-operative-framework\/","url_meta":{"origin":27837,"position":2},"title":"Blackowl &#8211; Tool To Gather Information, Based On Operative-Framework","author":"R K","date":"July 24, 2018","format":false,"excerpt":"Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests pythonwhois beautifulsoup4 Also Read\u00a0Scout2 \u2013 Security Auditing Tool For AWS Environments How To Use\u00a0Blackowl $ git clone https:\/\/github.com\/qqwaszx\/blackowl.git ; cd blackowl $ pip install -r\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":28004,"url":"https:\/\/kalilinuxtutorials.com\/mongoaudit\/","url_meta":{"origin":27837,"position":3},"title":"Mongoaudit &#8211; An Audit and Pentesting Tool for MongoDB Databases","author":"Febi","date":"January 17, 2023","format":false,"excerpt":"Databases typically store sensitive data or data that is important for the company. Mongoaudit helps to audit several technical aspects of running a MongoDB instance and get it properly secured. Usage and Audience Mongoaudit is commonly used for Application security or Database security.\u00a0 Target users for this tool are pentesters,\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"Mongoaudit","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiOunKAL9mG3BjMWRmIuGRapQrtp4WvubtrOwbjhRguQ7I8X-O3Qi8oNVUfGBbqK8D0rh49Sd8YAeBB7Z9LSBVxKjvq7lFZS5N9NX6ZfK87VG2hJ2Q_SEYc1ACYhrLEj6XIyIakIREH00j0OixoQYr-FIMRYzZa-I8isIlwvQMiX3OsX2ynaUp1x89g\/s16000\/Mongoaudit.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":29349,"url":"https:\/\/kalilinuxtutorials.com\/sashay-all-in-one-automatic-installer\/","url_meta":{"origin":27837,"position":4},"title":"Sashay all in one Automatic Installer","author":"Aman Mishra","date":"July 3, 2023","format":false,"excerpt":"Introduction In this article, we will see Sashay Installation. Sashay is an integrated automatic installer for practical Linux-based tools. More than 340 tools are offered. Installation pip install -U sashay Tool Categories Information Gathering\u00a0 Vulnerability Scanner\u00a0 Exploitation Tools\u00a0 Wireless Testing\u00a0 Forensics Tools\u00a0 Web Hacking\u00a0 Stress Testing\u00a0 Sniffing & Spoofing\u00a0 Password\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHp0Qtxp9O1MwAXJdXAXT1hnjAwuh-2oWlDi8Z6ToGVkkx56Q73LAtJVV3hFK3E-cn-jL4IxRsbapitJB0z8RzukVApGjX0OaVS0lC9JfErbOMKjiP1nTOTo55awfWlac8DJswRZxAKIZbOstXZ4bLIYc5gWEin9j0xXw2Jfj71DfT44GB4nrc3ohTKUUt\/s728\/sashay-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHp0Qtxp9O1MwAXJdXAXT1hnjAwuh-2oWlDi8Z6ToGVkkx56Q73LAtJVV3hFK3E-cn-jL4IxRsbapitJB0z8RzukVApGjX0OaVS0lC9JfErbOMKjiP1nTOTo55awfWlac8DJswRZxAKIZbOstXZ4bLIYc5gWEin9j0xXw2Jfj71DfT44GB4nrc3ohTKUUt\/s728\/sashay-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHp0Qtxp9O1MwAXJdXAXT1hnjAwuh-2oWlDi8Z6ToGVkkx56Q73LAtJVV3hFK3E-cn-jL4IxRsbapitJB0z8RzukVApGjX0OaVS0lC9JfErbOMKjiP1nTOTo55awfWlac8DJswRZxAKIZbOstXZ4bLIYc5gWEin9j0xXw2Jfj71DfT44GB4nrc3ohTKUUt\/s728\/sashay-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHp0Qtxp9O1MwAXJdXAXT1hnjAwuh-2oWlDi8Z6ToGVkkx56Q73LAtJVV3hFK3E-cn-jL4IxRsbapitJB0z8RzukVApGjX0OaVS0lC9JfErbOMKjiP1nTOTo55awfWlac8DJswRZxAKIZbOstXZ4bLIYc5gWEin9j0xXw2Jfj71DfT44GB4nrc3ohTKUUt\/s728\/sashay-1.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31324,"url":"https:\/\/kalilinuxtutorials.com\/top-penetration-testing-software-tools-essential-for-security-assessments\/","url_meta":{"origin":27837,"position":5},"title":"Top Penetration Testing Software &amp; Tools &#8211; Essential for Security Assessments","author":"Varshini","date":"November 22, 2023","format":false,"excerpt":"This article offers a comprehensive overview of the nine most commonly utilized penetration testing tools in the cybersecurity domain. The utilization of tools such as Netsparker, Wireshark, and Kali Linux is crucial in the process of identifying vulnerabilities across diverse digital environments. Each tool provides distinct functionalities for conducting web\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiF58nGUieMBctkJlhrtCI9TYDiMta4KxFlYaEweRxqNymnSiq-XXeA6IGouQsByk62jYgIBKxX2SJSpD4HHfuE90fq0pht8kxKq9GQhhz3qd91UsJZxPv6-eyBKfI6eBr3jGMytoZZc0EEMhiFbG0j_tYnzgNb199_Tv8eRSuvXaNu3SY0B9TW1JsFZw\/s16000\/Top%20Penetration%20Testing%20Software%20%26%20Tools.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=27837"}],"version-history":[{"count":5,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27837\/revisions"}],"predecessor-version":[{"id":28119,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/27837\/revisions\/28119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28115"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=27837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=27837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=27837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}