{"id":28274,"date":"2023-02-10T12:43:02","date_gmt":"2023-02-10T12:43:02","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=28274"},"modified":"2023-02-11T16:47:57","modified_gmt":"2023-02-11T16:47:57","slug":"aceldr","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/aceldr\/","title":{"rendered":"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion"},"content":{"rendered":"\n<p><strong>AceLdr <\/strong>is a position-independent reflective loader for Cobalt Strike. Zero results from <a href=\"https:\/\/github.com\/thefLink\/Hunt-Sleeping-Beacons\">Hunt-Sleeping-Beacons<\/a>, <a href=\"https:\/\/github.com\/3lp4tr0n\/BeaconHunter\">BeaconHunter<\/a>, <a href=\"https:\/\/github.com\/CCob\/BeaconEye\">BeaconEye<\/a>, <a href=\"https:\/\/github.com\/joe-desimone\/patriot\">Patriot<\/a>, <a href=\"https:\/\/github.com\/forrest-orr\/moneta\">Moneta<\/a>, <a href=\"https:\/\/github.com\/hasherezade\/pe-sieve\">PE-sieve<\/a>, or <a href=\"https:\/\/github.com\/waldo-irc\/MalMemDetect\">MalMemDetect<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\">Features<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#easy-to-use\"><\/a>Easy to Use<\/h4>\n\n\n\n<p>Import a single CNA script before generating shellcode.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#dynamic-memory-encryption\"><\/a>Dynamic Memory Encryption<\/h4>\n\n\n\n<p>Creates a new heap for any allocations from Beacon and encrypts entries before sleep.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#code-obfuscation-and-encryption\"><\/a>Code Obfuscation and Encryption<\/h4>\n\n\n\n<p>Changes the memory containing CS executable code to non-executable and encrypts it (FOLIAGE).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#return-address-spoofing-at-execution\"><\/a>Return Address Spoofing at Execution<\/h4>\n\n\n\n<p>Certain WinAPI calls are executed with a spoofed return address (InternetConnectA, NtWaitForSingleObject, RtlAllocateHeap).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#sleep-without-sleep\"><\/a>Sleep Without Sleep<\/h4>\n\n\n\n<p>Delayed execution using WaitForSingleObjectEx.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#rc4-encryption\"><\/a>RC4 Encryption<\/h4>\n\n\n\n<p>All encryption performed with SystemFunction032.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" style=\"font-style:normal;font-weight:600\"><a href=\"https:\/\/github.com\/kyleavery\/AceLdr#known-issues\"><\/a>Known Issues<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Not compatible with loaders that rely on the shellcode thread staying alive.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/github.com\/kyleavery\/AceLdr\" target=\"_blank\" rel=\"noreferrer noopener\">Click Here To Download<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye, Patriot, Moneta, PE-sieve, or MalMemDetect. Features Easy to Use Import a single CNA script before generating shellcode. Dynamic Memory Encryption Creates a new heap for any allocations from Beacon and encrypts entries before sleep. Code Obfuscation and Encryption Changes the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28276,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[5853,5855,5854],"class_list":["post-28274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-aceldr","tag-memory-scanner","tag-udrl"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion<\/title>\n<meta name=\"description\" content=\"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/aceldr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion\" \/>\n<meta property=\"og:description\" content=\"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/aceldr\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-10T12:43:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-11T16:47:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion\",\"datePublished\":\"2023-02-10T12:43:02+00:00\",\"dateModified\":\"2023-02-11T16:47:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/\"},\"wordCount\":124,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\",\"keywords\":[\"AceLdr\",\"Memory Scanner\",\"UDRL\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aceldr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/\",\"name\":\"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\",\"datePublished\":\"2023-02-10T12:43:02+00:00\",\"dateModified\":\"2023-02-11T16:47:57+00:00\",\"description\":\"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/aceldr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif\",\"width\":\"1080\",\"height\":\"608\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion","description":"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/aceldr\/","og_locale":"en_US","og_type":"article","og_title":"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion","og_description":"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye","og_url":"https:\/\/kalilinuxtutorials.com\/aceldr\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-02-10T12:43:02+00:00","article_modified_time":"2023-02-11T16:47:57+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion","datePublished":"2023-02-10T12:43:02+00:00","dateModified":"2023-02-11T16:47:57+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/"},"wordCount":124,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","keywords":["AceLdr","Memory Scanner","UDRL"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/aceldr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/","url":"https:\/\/kalilinuxtutorials.com\/aceldr\/","name":"AceLdr : Cobalt Strike UDRL For Memory Scanner Evasion","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","datePublished":"2023-02-10T12:43:02+00:00","dateModified":"2023-02-11T16:47:57+00:00","description":"AceLdr is a position-independent reflective loader for Cobalt Strike. Zero results from Hunt-Sleeping-Beacons, BeaconHunter, BeaconEye","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/aceldr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/aceldr\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","width":"1080","height":"608"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiMPj5IS9l-hvw893lmHFLnWE9oZ2kW5Sjx73Xvf_C2T86fOO6AAP46Wkh4QOAg8EtD-f01aLlEGsfbBRgPljMqjC73JGtFFZv_eY9TPI3o5ViIMlNUEGjXKZikhYibF0dC6oSSh0-2GVUfUiN17U8Ef505OVeCNIWvgkb1G1nT-o1wQYZqQHF8ZfNp\/s1080\/AceLdr.gif","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36571,"url":"https:\/\/kalilinuxtutorials.com\/bokuloader\/","url_meta":{"origin":28274,"position":0},"title":"BokuLoader : Cobalt Strike Reflective Loader","author":"Varshini","date":"February 20, 2025","format":false,"excerpt":"BokuLoader is a User-Defined Reflective Loader (UDRL) designed to enhance the evasion capabilities of Cobalt Strike, a popular penetration testing and red-teaming tool. Created as a proof-of-concept, BokuLoader aims to recreate and improve upon the evasion features of Cobalt Strike's built-in reflective loader while supporting red teams in developing their\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/BokuLoader-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36201,"url":"https:\/\/kalilinuxtutorials.com\/odinldr\/","url_meta":{"origin":28274,"position":1},"title":"OdinLdr : Advancing Red Team Stealth And Efficiency With Draugr And Cobalt Strike\u2019s UDRLs","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"The OdinLdr and Draugr tools, alongside Cobalt Strike's User-Defined Reflective Loader (UDRL), represent advanced mechanisms for enhancing stealth and flexibility in red team operations. These tools leverage innovative techniques to bypass endpoint detection and response (EDR) systems and optimize post-exploitation tasks. Key Features Of OdinLdr And Draugr Synthetic Stackframe for\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/OdinLdr.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35296,"url":"https:\/\/kalilinuxtutorials.com\/ulfberht\/","url_meta":{"origin":28274,"position":2},"title":"Ulfberht : Advanced Techniques For Shellcode Loading And Evasion","author":"Varshini","date":"November 27, 2024","format":false,"excerpt":"Ulfberht is a sophisticated shellcode loader designed to enhance operational security and evasion capabilities in cyber operations. Equipped with features like indirect syscalls, module stomping, and encrypted payloads, it minimizes the digital footprint on targeted systems. This article delves into Ulfberht's functionality, offering a step-by-step guide on its deployment and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjnGAdS2LvFqOhcFvmA6kPYoWgAogm3VIuolKPIx58AnXDBw-z-rBAuioJs_JRdE82UaRN-tNZn1af-yUkzh_pIbt1wh26IekK3IR95-fw72K3iS26Rje3rT_LwyJLgorVmY-MtcSuu1EN50R71i7voZ3_SkPra33hYUYdgEucD99_ZWFzRErLKmD0wwgIi\/s1600\/Ulfberht%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20337,"url":"https:\/\/kalilinuxtutorials.com\/melting-cobalt\/","url_meta":{"origin":28274,"position":3},"title":"Melting-Cobalt : A Cobalt Strike Scanner That Retrieves Detected Team Server Beacons Into A JSON Object","author":"R K","date":"November 22, 2021","format":false,"excerpt":"Melting-Cobalt tool to hunt\/mine for Cobalt Strike beacons and \"reduce\" their beacon configuration for later indexing. Hunts can either be expansive and internet wide using services like Security Trails, Shodan, or ZoomEye or a list of IP's. Getting started Install\u00a0melting-cobaltConfigure\u00a0your tokens to begin the huntMine\u00a0Beacons to begin reducing themReview results\u00a0cat\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 2x"},"classes":[]},{"id":32034,"url":"https:\/\/kalilinuxtutorials.com\/cobalt-strike-profiles-for-edr-evasion-sourcepoint-is-a-c2-profile-generator-for-cobalt-strike\/","url_meta":{"origin":28274,"position":4},"title":"Cobalt-Strike-Profiles-For-EDR-Evasion + SourcePoint Is A C2 Profile Generator For Cobalt Strike","author":"Varshini","date":"February 12, 2024","format":false,"excerpt":"Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory scanners like BeaconEye and Hunt-Sleeping-Beacons. The following option will make this bypass possible: set sleep_mask \"true\"; By enabling this option, Cobalt Strike will XOR the heap and every image section\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31807,"url":"https:\/\/kalilinuxtutorials.com\/graphstrike\/","url_meta":{"origin":28274,"position":5},"title":"GraphStrike &#8211; Empowering Cobalt Strike With Microsoft Graph API Integration","author":"Varshini","date":"January 24, 2024","format":false,"excerpt":"GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use\u00a0Microsoft Graph API\u00a0for C2 communications. All Beacon traffic will be transmitted via two files created in the attacker's SharePoint site, and all communications from Beacon will route Why? Threat intelligence has been released regarding several different APTs\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=28274"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28274\/revisions"}],"predecessor-version":[{"id":28275,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/28274\/revisions\/28275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/28276"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=28274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=28274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=28274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}