{"id":31629,"date":"2024-01-05T08:49:15","date_gmt":"2024-01-05T08:49:15","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=31629"},"modified":"2024-01-05T08:49:16","modified_gmt":"2024-01-05T08:49:16","slug":"demonized-shell","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","title":{"rendered":"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications."},"content":{"rendered":"\n<p>The article &#8220;Demonized Shell: Advancing Linux Persistence Techniques and Security Implications&#8221; goes into great detail about D3m0n1z3dShell, a complex tool made for making things persistent in Linux settings. <\/p>\n\n\n\n<p>The opening would probably talk about how this tool is a big step forward in Linux system security and how it has many features for keeping access and control over Linux systems. Some of these features are automatic creation of SSH keypairs, persistence in the form of APT, Crontab, and Systemd, and the use of a tweaked LKM rootkit that can hide from tools like rkhunter and chkrootkit.<\/p>\n\n\n\n<p>The article could also talk about the tool&#8217;s more advanced features, such as its ICMP backdoor implementation, LD_PRELOAD setup for gaining more privileges, and a set of static binaries for different security-related jobs. <\/p>\n\n\n\n<p>Additionally, it would probably show the possible security risks of such a tool, since it has the power to change system processes, add code, and set up backdoors. The introduction would set the stage for a more in-depth look at D3m0n1z3dShell&#8217;s features, its place in the world of cybersecurity, and the continuing work that is being done to add even more advanced security features to Linux systems.<\/p>\n\n\n\n<p>Demonized Shell is an Advanced Tool for persistence in linux.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/MatheuZSecurity\/D3m0n1z3dShell#install\"><\/a><strong>Install<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/MatheuZSecurity\/D3m0n1z3dShell.git\r\ncd D3m0n1z3dShell\r\nchmod +x demonizedshell.sh\r\nsudo .\/demonizedshell.sh<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>One-Liner Install<\/strong><\/h2>\n\n\n\n<p>Download D3m0n1z3dShell with all files:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>curl -L https:\/\/github.com\/MatheuZSecurity\/D3m0n1z3dShell\/archive\/main.tar.gz | tar xz &amp;&amp; cd D3m0n1z3dShell-main &amp;&amp; sudo .\/demonizedshell.sh<\/code><\/pre>\n\n\n\n<p>Load D3m0n1z3dShell statically (without the static-binaries directory):<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo curl -s https:\/\/raw.githubusercontent.com\/MatheuZSecurity\/D3m0n1z3dShell\/main\/static\/demonizedshell_static.sh -o \/tmp\/demonizedshell_static.sh &amp;&amp; sudo bash \/tmp\/demonizedshell_static.sh<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Demonized Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Auto Generate SSH keypair for all users<\/li>\n\n\n\n<li>APT Persistence<\/li>\n\n\n\n<li>Crontab Persistence<\/li>\n\n\n\n<li>Systemd User level<\/li>\n\n\n\n<li>Systemd Root Level<\/li>\n\n\n\n<li>Bashrc Persistence<\/li>\n\n\n\n<li>Privileged user &amp; SUID bash<\/li>\n\n\n\n<li>LKM Rootkit Modified, Bypassing rkhunter &amp; chkrootkit<\/li>\n\n\n\n<li>LKM Rootkit With file encoder. persistent icmp backdoor and others features.<\/li>\n\n\n\n<li>ICMP Backdoor<\/li>\n\n\n\n<li>LD_PRELOAD Setup PrivEsc<\/li>\n\n\n\n<li>Static Binaries For Process Monitoring, Dump credentials, Enumeration, Trolling and Others Binaries.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/MatheuZSecurity\/D3m0n1z3dShell#pending-features\"><\/a><strong>Pending Features<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&nbsp;LD_PRELOAD Rootkit<\/li>\n\n\n\n<li>&nbsp;Process Injection<\/li>\n\n\n\n<li>&nbsp;install for example: curl github.com\/test\/test\/demonized.sh | bash<\/li>\n\n\n\n<li>&nbsp;Static D3m0n1z3dShell<\/li>\n\n\n\n<li>&nbsp;Intercept Syscall Write from a file<\/li>\n\n\n\n<li>&nbsp;ELF\/Rootkit Anti-Reversing Technique<\/li>\n\n\n\n<li>&nbsp;PAM Backdoor<\/li>\n\n\n\n<li>&nbsp;rc.local Persistence<\/li>\n\n\n\n<li>&nbsp;init.d Persistence<\/li>\n\n\n\n<li>&nbsp;motd Persistence<\/li>\n\n\n\n<li>&nbsp;Persistence via php webshell and aspx webshell<\/li>\n<\/ul>\n\n\n\n<p>And other types of features that will come in the future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The article &#8220;Demonized Shell: Advancing Linux Persistence Techniques and Security Implications&#8221; goes into great detail about D3m0n1z3dShell, a complex tool made for making things persistent in Linux settings. The opening would probably talk about how this tool is a big step forward in Linux system security and how it has many features for keeping access [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":31631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6484,6321,6052,6325],"class_list":["post-31629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-demonizedshell","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Demonized Shell<\/title>\n<meta name=\"description\" content=\"The article &quot;Demonized Shell: Advancing Linux Persistence Techniques and Security Implications&quot; goes into great detail about D3m0n1z3dShell\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demonized Shell\" \/>\n<meta property=\"og:description\" content=\"The article &quot;Demonized Shell: Advancing Linux Persistence Techniques and Security Implications&quot; goes into great detail about D3m0n1z3dShell\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-05T08:49:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-05T08:49:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.\",\"datePublished\":\"2024-01-05T08:49:15+00:00\",\"dateModified\":\"2024-01-05T08:49:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\"},\"wordCount\":384,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\",\"keywords\":[\"cybersecurity\",\"DemonizedShell\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\",\"name\":\"Demonized Shell\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\",\"datePublished\":\"2024-01-05T08:49:15+00:00\",\"dateModified\":\"2024-01-05T08:49:16+00:00\",\"description\":\"The article \\\"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\\\" goes into great detail about D3m0n1z3dShell\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Demonized Shell","description":"The article \"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\" goes into great detail about D3m0n1z3dShell","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","og_locale":"en_US","og_type":"article","og_title":"Demonized Shell","og_description":"The article \"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\" goes into great detail about D3m0n1z3dShell","og_url":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-01-05T08:49:15+00:00","article_modified_time":"2024-01-05T08:49:16+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications.","datePublished":"2024-01-05T08:49:15+00:00","dateModified":"2024-01-05T08:49:16+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/"},"wordCount":384,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","keywords":["cybersecurity","DemonizedShell","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/demonized-shell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","url":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/","name":"Demonized Shell","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","datePublished":"2024-01-05T08:49:15+00:00","dateModified":"2024-01-05T08:49:16+00:00","description":"The article \"Demonized Shell: Advancing Linux Persistence Techniques and Security Implications\" goes into great detail about D3m0n1z3dShell","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/demonized-shell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/demonized-shell\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_D_MqBDJEk7bVW486QZaQigu5NqayhGiOF4YOBmBFHtOBvFE9L41LjYFpE11T4KzBsv6cWlNvZFxiA2F4vFo_QL_uVXMFjy_CC8AZ5DWlcB0k5W6UxngX-b9auVZatkKvpCk3wqtSVSEiBg6RobSaJCDil3pkeFUmuN_TqCt_OO77pFjeKaRyo8_GZw\/s16000\/Demonized%20Shell.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11968,"url":"https:\/\/kalilinuxtutorials.com\/torat\/","url_meta":{"origin":31629,"position":0},"title":"ToRat : A Remote Administration Tool Written In Go Using Tor As A Transport Mechanism &#038; RPC For Communication","author":"R K","date":"December 21, 2020","format":false,"excerpt":"ToRat is a Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. How to? TL;DR git clone https:\/\/github.com\/lu4p\/ToRat.git cd .\/ToRat sudo docker build . -t torat sudo docker run -it -v \"$(pwd)\"\/dist:\/dist_ext torat Prerequisites Install Docker on Linuxubuntu https:\/\/docs.docker.com\/install\/linux\/docker-ce\/ubuntu\/debian\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6551,"url":"https:\/\/kalilinuxtutorials.com\/tinkerershell-simple-python-reverse-shell\/","url_meta":{"origin":31629,"position":1},"title":"TinkererShell : A Simple Python Reverse Shell","author":"R K","date":"September 20, 2019","format":false,"excerpt":"TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just for fun. Actually it supports Windows and Linux OS and integrates some basic features like keylogging and AES encrypted communications. Supported operating systems: Windows Linux Functions and characteristics: Reverse connection. AES\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5492,"url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation\/","url_meta":{"origin":31629,"position":2},"title":"RedGhost : Linux Post Exploitation Framework Designed To Assist Red Teams","author":"R K","date":"June 26, 2019","format":false,"excerpt":"RedGhost is a Linux post exploitation framework designed to assist red teams in gaining persistence, reconnaissance and leaving no trace. Also Read - BlueGhost : Network Tool Designed To Assist Blue Teams In Banning Attackers From Linux Servers Features Payloads Function to generate various encoded reverse shells in netcat, bash,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6034,"url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-2\/","url_meta":{"origin":31629,"position":3},"title":"RedGhost : Linux Post Exploitation Framework","author":"R K","date":"August 3, 2019","format":false,"excerpt":"RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. Payloads : Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl.SudoInject : Function to inject sudo command with wrapper function to run a reverse\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5846,"url":"https:\/\/kalilinuxtutorials.com\/redghost-linux-post-exploitation-framework\/","url_meta":{"origin":31629,"position":4},"title":"RedGhost :  Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance &#038; Leaving No Trace","author":"R K","date":"July 19, 2019","format":false,"excerpt":"RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace. Payloads Function to generate various encoded reverse shells in netcat, bash, python, php, ruby, perl SudoInject Function to inject sudo command with wrapper function to run a reverse root\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":12490,"url":"https:\/\/kalilinuxtutorials.com\/poisonapple\/","url_meta":{"origin":31629,"position":5},"title":"PoisonApple : macOS Persistence Tool","author":"R K","date":"April 19, 2021","format":false,"excerpt":"PoisonApple is a command-line tool to perform various persistence mechanism techniques on macOS. This tool was designed to be used by threat hunters for cyber threat emulation purposes. Install Do it up: $ pip3 install poisonapple --user Note: PoisonApple was written & tested using Python 3.9, it should work using\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=31629"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31629\/revisions"}],"predecessor-version":[{"id":31630,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/31629\/revisions\/31630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/31631"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=31629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=31629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=31629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}