{"id":3069,"date":"2018-10-29T18:47:37","date_gmt":"2018-10-29T13:17:37","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=3069"},"modified":"2018-10-29T18:47:37","modified_gmt":"2018-10-29T13:17:37","slug":"silenttrinity","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/","title":{"rendered":"SILENTTRINITY &#8211; A Post-Exploitation Agent Powered By Python, IronPython, C#\/.NET"},"content":{"rendered":"<p>SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3071\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\" alt=\"\" width=\"1001\" height=\"522\" \/><\/p>\n<h2><strong>SILENTTRINITY Requirements<\/strong><\/h2>\n<ul>\n<li>Server requires Python &gt;= 3.7<\/li>\n<li>SILENTTRINITY C# implant requires .NET &gt;= 4.5<\/li>\n<\/ul>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span><a href=\"https:\/\/kalilinuxtutorials.com\/autordpwn\/\" target=\"_blank\" rel=\"noopener\">AutoRDPwn \u2013 The Shadow Attack Framework<\/a><\/strong><\/p>\n<h2><strong>Notes<\/strong><\/h2>\n<h3 style=\"text-align: center;\"><strong>.NET runtime support<\/strong><\/h3>\n<p>The implant needs .NET 4.5 or greater due to the IronPython DLLs being compiled against .NET 4.0, also there is no ZipArchive .NET library prior to 4.5 which the implant relies upon to download the initial stage containing the IronPython DLLs and the main Python code.<\/p>\n<p>Reading the source for the IronPython Compiler it seems like we can get around the first issue by directly generating IL code through IKVM (I still don&#8217;t understand why this works). However this would require modifying the compiler to generate a completely new EXE stub (definitely feasible, just time consuming to find the proper IKVM API calls).<\/p>\n<h3 style=\"text-align: center;\"><strong>C2 Comms<\/strong><\/h3>\n<p>Currently the implant only supports C2 over HTTP 1.1, .NET 4.5 seems to have a native WebSocket library which makes implementing a WS C2 channel more than possible.<\/p>\n<p>HTTP\/2 client support for .NET&#8217;s HttpClient API is in the works, just not yet released.<\/p>\n<p>The implant and server design are very much &#8220;future proof&#8221; which should make implementing these C2 Channels pretty trivial when the time comes.<\/p>\n<h3 style=\"text-align: center;\"><strong>Python Standard Library<\/strong><\/h3>\n<p>We technically could load\/use IronPython&#8217;s stdlib instead of calling .NET APIs but this would require writing some &#8220;magic&#8221; dependency resolving code.<\/p>\n<p><a href=\"https:\/\/github.com\/byt3bl33d3r\/SILENTTRINITY\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY Requirements Server requires Python &gt;= 3.7 SILENTTRINITY C# implant requires .NET &gt;= 4.5 Also ReadAutoRDPwn \u2013 The Shadow Attack Framework Notes .NET runtime support The implant needs .NET 4.5 or greater due to the IronPython DLLs being compiled against .NET 4.0, also there is [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[50,511,1705,2676,3106],"class_list":["post-3069","post","type-post","status-publish","format-standard","hentry","category-kali","tag-net","tag-c-3","tag-ironpython","tag-python","tag-silenttrinity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc<\/title>\n<meta name=\"description\" content=\"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc\" \/>\n<meta property=\"og:description\" content=\"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-29T13:17:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"SILENTTRINITY &#8211; A Post-Exploitation Agent Powered By Python, IronPython, C#\/.NET\",\"datePublished\":\"2018-10-29T13:17:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\"},\"wordCount\":239,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\",\"keywords\":[\".NET\",\"C\",\"IronPython\",\"Python\",\"SILENTTRINITY\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\",\"name\":\"SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\",\"datePublished\":\"2018-10-29T13:17:37+00:00\",\"description\":\"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc","description":"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/","og_locale":"en_US","og_type":"article","og_title":"SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc","og_description":"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered","og_url":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-10-29T13:17:37+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"SILENTTRINITY &#8211; A Post-Exploitation Agent Powered By Python, IronPython, C#\/.NET","datePublished":"2018-10-29T13:17:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/"},"wordCount":239,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png","keywords":[".NET","C","IronPython","Python","SILENTTRINITY"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/","url":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/","name":"SILENTTRINITY - A Post-Exploitation Agent Powered By Python etc","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png","datePublished":"2018-10-29T13:17:37+00:00","description":"SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#\/.NET. SILENTTRINITY is a post-exploitation agent powered","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/silenttrinity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/silenttrinity\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/10\/SILENTTRINITY1.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":3069,"position":0},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31340,"url":"https:\/\/kalilinuxtutorials.com\/hades-command-and-control\/","url_meta":{"origin":3069,"position":1},"title":"Hades Command And Control &#8211; Learning Malware Development and CTFsHades Command &#038; Control","author":"Varshini","date":"November 23, 2023","format":false,"excerpt":"Hades is a basic Command & Control server built using Python. It is currently extremely bare bones, but I plan to add more features soon. Features are a work in progress currently. Table Of Contents About the Project Getting Started Prerequisites Installation Roadmap Contributing License Authors Acknowledgements About The Project\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWaYJsEqpdXYxK8VK4SzlAcmWp7achdeAQ68Fm7AZ1ZfphWiH7cu4xXqzK20NonZ8Nl-HVKq8VtzW-eqyUmQ4_g-ODjnqJygY2yUYHQDfZB7Lv0fNA9XR9MzVohlapBOlGhbmfAx1YdrVDwrn_xJ9tV3ThBPN6rC8qBoj7QDzs3E3kUshkbHQjhk5ie8I\/s16000\/Untitled%20design.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32514,"url":"https:\/\/kalilinuxtutorials.com\/dotnet-metadata\/","url_meta":{"origin":3069,"position":2},"title":"DotNet-MetaData : A Deep Dive Into .NET Malware Analysis","author":"Varshini","date":"March 27, 2024","format":false,"excerpt":"\"DotNet-MetaData: A Deep Dive into .NET Malware Analysis\" unveils the advanced techniques for analyzing and classifying .NET-based malware. With a focus on practical tools like Yara rules and Python scripts, this guide provides cybersecurity professionals with the means to extract crucial metadata from .NET binaries, enhancing their malware hunting and\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjXlQCVoSerruNsBEdWcNVYAN487HsWuY9c1WliwlkVQq2JjDLoy0-kekNRQQW9w7Sl6EClJG-quy2oUogh7ZoMNdDGFVt5aWyS7rCmbfzv2GcZs6tFM7y1hWbf6JtqPjQkNCLdn4Zbb5zNALWUvrXzntkTxDYvvp7MpZXgQ5iwX5K9FPz83EqC4RC0JraA\/s16000\/ArtifactCollector%20%282%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17433,"url":"https:\/\/kalilinuxtutorials.com\/picklec2\/","url_meta":{"origin":3069,"position":3},"title":"PickleC2 : A Post-Exploitation And Lateral Movements Framework","author":"R K","date":"September 8, 2021","format":false,"excerpt":"PickleC2 is a simple C2 framework written in python3 used to help the community in Penetration Testers in their red teaming engagements. PickleC2 has the ability to import your own PowerShell module for Post-Exploitation and Lateral Movement or automate the process. Features There is a one implant for the beta\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-MFx-3qOusmo\/YSckZ-rn5PI\/AAAAAAAAKkg\/gK81AmYmHzoRIKUIDTK8yIfkUDLu4XVUQCLcBGAsYHQ\/s728\/PickleC2_1_c2-792326%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-MFx-3qOusmo\/YSckZ-rn5PI\/AAAAAAAAKkg\/gK81AmYmHzoRIKUIDTK8yIfkUDLu4XVUQCLcBGAsYHQ\/s728\/PickleC2_1_c2-792326%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-MFx-3qOusmo\/YSckZ-rn5PI\/AAAAAAAAKkg\/gK81AmYmHzoRIKUIDTK8yIfkUDLu4XVUQCLcBGAsYHQ\/s728\/PickleC2_1_c2-792326%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-MFx-3qOusmo\/YSckZ-rn5PI\/AAAAAAAAKkg\/gK81AmYmHzoRIKUIDTK8yIfkUDLu4XVUQCLcBGAsYHQ\/s728\/PickleC2_1_c2-792326%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31257,"url":"https:\/\/kalilinuxtutorials.com\/invisibilitycloak\/","url_meta":{"origin":3069,"position":4},"title":"InvisibilityCloak &#8211; A Game-Changer In C# Post-Exploitation Tools","author":"Varshini","date":"November 14, 2023","format":false,"excerpt":"Proof-of-concept obfuscation toolkit for C# post-exploitation tools. This will perform the below actions for a C# visual studio project. Change the tool name Change the project GUID Obfuscate compatible strings in source code files based on obfuscation method entered by user Removes one-line comments (e.g. \/\/ this is a comment)\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNXSV_jL6DCGMtwLSafID8ZM4HQCSus60Pjs3mLgFSrD67FFj5iAh41o4eY1XxmWSCRJBXV0FraUcGQ4YbcmcLfvTn7jhyphenhyphencNi_G9XLN1_HK14Xd2B_g2-V4H9TdOXRKvfNNd-822-n2weUcxsHNxkm9yy8ZN0OzsB32F7Z3p3RZqM-6bnMPabgHp0Xeg\/s16000\/BEC%20%281%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNXSV_jL6DCGMtwLSafID8ZM4HQCSus60Pjs3mLgFSrD67FFj5iAh41o4eY1XxmWSCRJBXV0FraUcGQ4YbcmcLfvTn7jhyphenhyphencNi_G9XLN1_HK14Xd2B_g2-V4H9TdOXRKvfNNd-822-n2weUcxsHNxkm9yy8ZN0OzsB32F7Z3p3RZqM-6bnMPabgHp0Xeg\/s16000\/BEC%20%281%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNXSV_jL6DCGMtwLSafID8ZM4HQCSus60Pjs3mLgFSrD67FFj5iAh41o4eY1XxmWSCRJBXV0FraUcGQ4YbcmcLfvTn7jhyphenhyphencNi_G9XLN1_HK14Xd2B_g2-V4H9TdOXRKvfNNd-822-n2weUcxsHNxkm9yy8ZN0OzsB32F7Z3p3RZqM-6bnMPabgHp0Xeg\/s16000\/BEC%20%281%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhNXSV_jL6DCGMtwLSafID8ZM4HQCSus60Pjs3mLgFSrD67FFj5iAh41o4eY1XxmWSCRJBXV0FraUcGQ4YbcmcLfvTn7jhyphenhyphencNi_G9XLN1_HK14Xd2B_g2-V4H9TdOXRKvfNNd-822-n2weUcxsHNxkm9yy8ZN0OzsB32F7Z3p3RZqM-6bnMPabgHp0Xeg\/s16000\/BEC%20%281%29.webp?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":12827,"url":"https:\/\/kalilinuxtutorials.com\/paragon\/","url_meta":{"origin":3069,"position":5},"title":"Paragon : Red Team Engagement Platform With The Goal Of Unifying Offensive","author":"R K","date":"May 14, 2021","format":false,"excerpt":"Paragon is a Red Team engagement platform. It aims to unify offensive tools behind a simple UI, abstracting much of the backend work to enable operators to focus on writing implants and spend less time worrying about databases and css. The repository also provides some offensive tools already integrated with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3069","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=3069"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/3069\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=3069"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=3069"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=3069"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}