{"id":31256,"date":"2023-11-14T07:14:34","date_gmt":"2023-11-14T07:14:34","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31256"},"modified":"2023-11-14T07:14:37","modified_gmt":"2023-11-14T07:14:37","slug":"no-consolation","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/no-consolation\/","title":{"rendered":"No-Consolation &#8211; Executing Unmanaged PEs Inline And Without Console Allocation"},"content":{"rendered":"\n<p>This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console (i.e. spawning\u00a0<code>conhost.exe<\/code>).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-features\"><strong><a href=\"https:\/\/github.com\/fortra\/No-Consolation#features\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Features<\/a><\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Supports 64 and 32 bits<\/li>\n\n\n\n<li>Supports EXEs and DLLs<\/li>\n\n\n\n<li>Does not create new processes<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"user-content-usage\"><strong><a href=\"https:\/\/github.com\/fortra\/No-Consolation#usage\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Usage<\/a><\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Summary: Run an unmanaged EXE\/DLL inside Beacon's memory.\n\nUsage: noconsolation &#91;--local] &#91;--timeout 60] &#91;-k] &#91;--method funcname] &#91;-w] &#91;--no-output] &#91;--alloc-console] &#91;--close-handles] &#91;--free-libraries] \/path\/to\/binary.exe arg1 arg2\n    --local, -l                           Optional. The binary should be loaded from the target Windows machine\n    --timeout NUM_SECONDS, -t NUM_SECONDS Optional. The number of seconds you wish to wait for the PE to complete running. Default 60 seconds. Set to 0 to disable\n    -k                                    Optional. Overwrite the PE headers\n    --method EXPORT_NAME, -m EXPORT_NAME  Optional. Method or function name to execute in case of DLL. If not provided, DllMain will be executed\n    -w                                    Optional. Command line is passed to unmanaged DLL function in UNICODE format. (default is ANSI)\n    --no-output, -no                      Optional. Do not try to obtain the output\n    --alloc-console, -ac                  Optional. Allocate a console. This will spawn a new process\n    --close-handles, -ch                  Optional. Close Pipe handles once finished. If PowerShell was already ran, this will break the output for PowerShell in the future\n    --free-libraries, -fl                 Optional. Free all loaded DLLs\n    \/path\/to\/binary.exe                   Required. Full path to the windows EXE\/DLL you wish you run inside Beacon\n    ARG1 ARG2                             Optional. Parameters for the PE. Must be provided after the path\n\n    Example: noconsolation --local C:\\windows\\system32\\windowspowershell\\v1.0\\powershell.exe $ExecutionContext.SessionState.LanguageMode\n    Example: noconsolation \/tmp\/mimikatz.exe privilege::debug token::elevate exit\n    Example: noconsolation --local C:\\windows\\system32\\cmd.exe \/c ipconfig\n\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console (i.e. spawning\u00a0conhost.exe). Features Usage<\/p>\n","protected":false},"author":12,"featured_media":31292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,6415],"class_list":["post-31256","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-no-consolation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>No-Consolation<\/title>\n<meta name=\"description\" content=\"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No-Consolation\" \/>\n<meta property=\"og:description\" content=\"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-14T07:14:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-14T07:14:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"No-Consolation &#8211; Executing Unmanaged PEs Inline And Without Console Allocation\",\"datePublished\":\"2023-11-14T07:14:34+00:00\",\"dateModified\":\"2023-11-14T07:14:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\"},\"wordCount\":47,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"No-Consolation\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\",\"name\":\"No-Consolation\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\",\"datePublished\":\"2023-11-14T07:14:34+00:00\",\"dateModified\":\"2023-11-14T07:14:37+00:00\",\"description\":\"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/no-consolation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No-Consolation","description":"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/no-consolation\/","og_locale":"en_US","og_type":"article","og_title":"No-Consolation","og_description":"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console","og_url":"https:\/\/kalilinuxtutorials.com\/no-consolation\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2023-11-14T07:14:34+00:00","article_modified_time":"2023-11-14T07:14:37+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"No-Consolation &#8211; Executing Unmanaged PEs Inline And Without Console Allocation","datePublished":"2023-11-14T07:14:34+00:00","dateModified":"2023-11-14T07:14:37+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/"},"wordCount":47,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","No-Consolation"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/no-consolation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/","url":"https:\/\/kalilinuxtutorials.com\/no-consolation\/","name":"No-Consolation","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","datePublished":"2023-11-14T07:14:34+00:00","dateModified":"2023-11-14T07:14:37+00:00","description":"This is a Beacon Object File (BOF) that executes unmanaged PEs inline and retrieves their output without allocating a console","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/no-consolation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/no-consolation\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhHIHmIpVCIn9z0hx4YRkEyf1JwFZO5Pgo8u76C1LA9KM7kaoxRfka4qRWn_R49a-kTOSR70JgE4-eLQj4QKH8T4SjsaGmBst_pXqYfz90KKzA3xm7qqbB9In11WxrjWisIoGCwp5eKJNlHnii0vp6nropNdC1k1zCi0u1CwPSgRRj7DelhI2Fte4_3Rw\/s16000\/No-Consolation.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6669,"url":"https:\/\/kalilinuxtutorials.com\/ska-simple-karma-attack\/","url_meta":{"origin":31256,"position":0},"title":"SKA : Simple Karma Attack","author":"R K","date":"September 29, 2019","format":false,"excerpt":"SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice the fake AP name or, if you want, you could insert manually the name of AP (evil twin attack). When target has connected to your WLAN you could active the HTTP\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4520,"url":"https:\/\/kalilinuxtutorials.com\/powershellarsenal\/","url_meta":{"origin":31256,"position":1},"title":"PowerShellArsenal : A PowerShell Module Dedicated to Reverse Engineering","author":"R K","date":"April 9, 2019","format":false,"excerpt":"PowerShellArsenal is a PowerShell module used to aid a reverse engineer. The module can be used to disassemble managed and unmanaged code, perform .NET malware analysis, analyze\/scrape memory, parse file formats and memory structures, obtain internal system information, etc. PowerShellArsenal is comprised of the following tools: Disassembly Disassemble native and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35558,"url":"https:\/\/kalilinuxtutorials.com\/sharpexecute\/","url_meta":{"origin":31256,"position":2},"title":"SharpExecute : Advanced Techniques For Stealth .NET Execution And CLR Manipulation","author":"Varshini","date":"December 31, 2024","format":false,"excerpt":"Executing .NET Files from an Unmanaged Process with Manual CLR Loading. Manually loading the CLR in an unmanaged process and using hardware breakpoints can reveal when the CLR calls NtTraceEvent through the managed thread pool. To evade detection, this tool offers two approaches: Patchless execution by hooking NtTraceEvent AmsiScan and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFHmVDkrWnC28RpslEGPeyERfEdezdXJV0HPvzbWqOXieE8ZxliDOmvvAckMt-9jotRXa-syzdAu2V9OOCnTeawpYWthBIzGhji7VyQw3U85MPBehNmyJ-ruG90-I3AgnZjW1nwUvZSExSw7B4OEBHfqIiIe6zXjGgAojwhxYtsNDr28eGC9UnZCuy0hOk\/s1200\/sharp-execute.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFHmVDkrWnC28RpslEGPeyERfEdezdXJV0HPvzbWqOXieE8ZxliDOmvvAckMt-9jotRXa-syzdAu2V9OOCnTeawpYWthBIzGhji7VyQw3U85MPBehNmyJ-ruG90-I3AgnZjW1nwUvZSExSw7B4OEBHfqIiIe6zXjGgAojwhxYtsNDr28eGC9UnZCuy0hOk\/s1200\/sharp-execute.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFHmVDkrWnC28RpslEGPeyERfEdezdXJV0HPvzbWqOXieE8ZxliDOmvvAckMt-9jotRXa-syzdAu2V9OOCnTeawpYWthBIzGhji7VyQw3U85MPBehNmyJ-ruG90-I3AgnZjW1nwUvZSExSw7B4OEBHfqIiIe6zXjGgAojwhxYtsNDr28eGC9UnZCuy0hOk\/s1200\/sharp-execute.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFHmVDkrWnC28RpslEGPeyERfEdezdXJV0HPvzbWqOXieE8ZxliDOmvvAckMt-9jotRXa-syzdAu2V9OOCnTeawpYWthBIzGhji7VyQw3U85MPBehNmyJ-ruG90-I3AgnZjW1nwUvZSExSw7B4OEBHfqIiIe6zXjGgAojwhxYtsNDr28eGC9UnZCuy0hOk\/s1200\/sharp-execute.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjFHmVDkrWnC28RpslEGPeyERfEdezdXJV0HPvzbWqOXieE8ZxliDOmvvAckMt-9jotRXa-syzdAu2V9OOCnTeawpYWthBIzGhji7VyQw3U85MPBehNmyJ-ruG90-I3AgnZjW1nwUvZSExSw7B4OEBHfqIiIe6zXjGgAojwhxYtsNDr28eGC9UnZCuy0hOk\/s1200\/sharp-execute.webp?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":7391,"url":"https:\/\/kalilinuxtutorials.com\/redpeanut-small-rat-developed-in-net-core\/","url_meta":{"origin":31256,"position":3},"title":"RedPeanut : Small RAT Developed in .Net Core 2 &#038; Its Agent in .Net 3.5 \/ 4.0","author":"R K","date":"November 23, 2019","format":false,"excerpt":"RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 \/ 4.0. RedPeanut code execution is based on shellcode generated with DonutCS. It is therefore a hybrid, although developed in .Net it does not rely solely on the Assembly.Load. This increases the detection surface,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28711,"url":"https:\/\/kalilinuxtutorials.com\/nimplant-2\/","url_meta":{"origin":31256,"position":4},"title":"NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim","author":"R K","date":"April 6, 2023","format":false,"excerpt":"NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Lightweight and configurable implant written in the Nim programming language Pretty web GUI that will make you look cool during all your ops Encryption and compression of all traffic by default, obfuscates static strings in implant\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgELxmtiOdNWjBYu5XTXJDJ7GTzNzHuZJbJfjM8s5eERtDdqPdIgKpkdcf_atDxKfrPgYxCOCgpkMmi2kZvkgw4vC0QyrtF7s3GAwjcFw6SjVR-jOvecl83a2vGzO3f0pFmFOQ3u--D1JBvO2S23xBqLEteiNM4gCt59XHsRZvkmm-cKaKshIIIry3m\/s16000\/nimplant-logo.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgELxmtiOdNWjBYu5XTXJDJ7GTzNzHuZJbJfjM8s5eERtDdqPdIgKpkdcf_atDxKfrPgYxCOCgpkMmi2kZvkgw4vC0QyrtF7s3GAwjcFw6SjVR-jOvecl83a2vGzO3f0pFmFOQ3u--D1JBvO2S23xBqLEteiNM4gCt59XHsRZvkmm-cKaKshIIIry3m\/s16000\/nimplant-logo.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgELxmtiOdNWjBYu5XTXJDJ7GTzNzHuZJbJfjM8s5eERtDdqPdIgKpkdcf_atDxKfrPgYxCOCgpkMmi2kZvkgw4vC0QyrtF7s3GAwjcFw6SjVR-jOvecl83a2vGzO3f0pFmFOQ3u--D1JBvO2S23xBqLEteiNM4gCt59XHsRZvkmm-cKaKshIIIry3m\/s16000\/nimplant-logo.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgELxmtiOdNWjBYu5XTXJDJ7GTzNzHuZJbJfjM8s5eERtDdqPdIgKpkdcf_atDxKfrPgYxCOCgpkMmi2kZvkgw4vC0QyrtF7s3GAwjcFw6SjVR-jOvecl83a2vGzO3f0pFmFOQ3u--D1JBvO2S23xBqLEteiNM4gCt59XHsRZvkmm-cKaKshIIIry3m\/s16000\/nimplant-logo.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11520,"url":"https:\/\/kalilinuxtutorials.com\/grat2\/","url_meta":{"origin":31256,"position":5},"title":"GRAT2 : Command And Control (C2) Project For Learning Purpose","author":"R K","date":"September 24, 2020","format":false,"excerpt":"GRAT2 is a Command and Control (C2) tool written in python3 and the client in .NET 4.0. The main idea came from Georgios Koumettou who initiated the project. Why we developed GRAT2 ? We are aware that there are numerous C2 tools out there but, we developed this tool due\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31256","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31256"}],"version-history":[{"count":2,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31256\/revisions"}],"predecessor-version":[{"id":31291,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31256\/revisions\/31291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31292"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}