{"id":34734,"date":"2024-09-09T06:13:37","date_gmt":"2024-09-09T06:13:37","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34734"},"modified":"2024-09-09T06:13:38","modified_gmt":"2024-09-09T06:13:38","slug":"deadpotato","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/deadpotato\/","title":{"rendered":"DeadPotato &#8211; Harnessing Advanced System Tools For Security And Administration"},"content":{"rendered":"\n<p>The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. <\/p>\n\n\n\n<p>This version adds new capabilities like domain data collection for BloodHound and enhanced compatibility with Windows 10. <\/p>\n\n\n\n<p>Learn how to leverage DeadPotato\u2019s suite of modules for system assessment and security exploitation.<\/p>\n\n\n\n<p>This version includes the following changes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>sharphound<\/strong>: Attempts to collect domain data for BloodHound. (NOTE: This will write SharpHound to disk!)<\/li>\n\n\n\n<li><strong>mimi &lt;sam\/lsa\/secrets><\/strong>: Added LSA &amp; Secrets dump with Mimikatz.<\/li>\n\n\n\n<li>Added banner compatibility for win10.<\/li>\n<\/ul>\n\n\n\n<p>Usage of this program in an unauthorized context is strictly forbidden. The author(s) take no responsibility over the misuse of this DeadPotato or any of it&#8217;s components.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Choose among many modules! (-cmd, -newadmin, -rev, -exe, ...).\nHere is an example with the -sharphound module!\n\nC:\\Users\\lypd0> DeadPotato.exe -sharphound\n      _.--,_\n   .-'      '-.          _           _ \n  \/            \\        | \\ _  _  _||_) _ _|_ _ _|_ _ \n '          _.  '       |_\/(\/_(_|(_||  (_) |_(_| |_(_)\n \\      \"\"\"\" \/  ~(      Open Source @ github.com\/lypd0\n  '=,,_ =\\__ `  &amp;             -= Version: 1.2 =-\n        \"\"  \"\"'; \\\\\\ \n\n\n_,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,__,.-'~'-.,_\n\n(*) Attempting to write XaOAZsTO.exe (SharpHound) in the current directory...\n(+) File written. Attempting to run enumeration...\n\n(*) Initiating procedure as NT AUTHORITY\\NETWORK SERVICE\n(+) Is impersonation possible in current context? YES\n(+) Currently running as user: NT AUTHORITY\\SYSTEM\n(+) Elevated process started with PID 3640\n\n-={          OUTPUT BELOW         }=-\n\n&lt;..SNIP..>\n2024-08-04T08:08:05.4023630-07:00|INFORMATION|SharpHound Enumeration Completed at 8:08 AM on 8\/4\/2024! Happy Graphing!\n\n(+) Removing SharpHound and exiting.<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>Binary<\/th><th>MD5 Checksum<\/th><\/tr><\/thead><tbody><tr><td>DeadPotato-NET4.exe<\/td><td><code>C76954078004EDD81B1836A09F9D0D66<\/code><\/td><\/tr><tr><td><a href=\"https:\/\/github.com\/ParrotSec\/mimikatz\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">mimikatz.exe<\/a>\u00a0(embedded)<\/td><td><code>E930B05EFE23891D19BC354A4209BE3E<\/code><\/td><\/tr><tr><td>[SharpHound.exe]<\/td><td><code>AAF1146EC9C633C4C3FBE8091F1596D8<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For more information click <a href=\"https:\/\/github.com\/lypd0\/DeadPotato\/releases\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new capabilities like domain data collection for BloodHound and enhanced compatibility with Windows 10. Learn how to leverage DeadPotato\u2019s suite of modules for system assessment and security exploitation. This version includes the following changes: Usage of this [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25,5840],"tags":[737,6922,6321,6052,6325],"class_list":["post-34734","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","category-penetration-testing-tools","tag-cybersecurity","tag-deadpotato","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DeadPotato - Harnessing Advanced System Tools For Security<\/title>\n<meta name=\"description\" content=\"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DeadPotato - Harnessing Advanced System Tools For Security\" \/>\n<meta property=\"og:description\" content=\"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T06:13:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-09T06:13:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"DeadPotato &#8211; Harnessing Advanced System Tools For Security And Administration\",\"datePublished\":\"2024-09-09T06:13:37+00:00\",\"dateModified\":\"2024-09-09T06:13:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\"},\"wordCount\":138,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\",\"keywords\":[\"cybersecurity\",\"DeadPotato\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\",\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\",\"name\":\"DeadPotato - Harnessing Advanced System Tools For Security\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\",\"datePublished\":\"2024-09-09T06:13:37+00:00\",\"dateModified\":\"2024-09-09T06:13:38+00:00\",\"description\":\"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/deadpotato\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DeadPotato - Harnessing Advanced System Tools For Security","description":"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/deadpotato\/","og_locale":"en_US","og_type":"article","og_title":"DeadPotato - Harnessing Advanced System Tools For Security","og_description":"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new","og_url":"https:\/\/kalilinuxtutorials.com\/deadpotato\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-09-09T06:13:37+00:00","article_modified_time":"2024-09-09T06:13:38+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"DeadPotato &#8211; Harnessing Advanced System Tools For Security And Administration","datePublished":"2024-09-09T06:13:37+00:00","dateModified":"2024-09-09T06:13:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/"},"wordCount":138,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","keywords":["cybersecurity","DeadPotato","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Hacking Tools","Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/deadpotato\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/","url":"https:\/\/kalilinuxtutorials.com\/deadpotato\/","name":"DeadPotato - Harnessing Advanced System Tools For Security","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","datePublished":"2024-09-09T06:13:37+00:00","dateModified":"2024-09-09T06:13:38+00:00","description":"The latest iteration of the versatile security tool designed for network administrators and cybersecurity professionals. This version adds new","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/deadpotato\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/deadpotato\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhG9bvzUniqt_lYhcb3XeAOFdMV7dZ3ddxGNhd3KRE6N-iXVfGKdUioqkzYfS7IKE0t1OzdRYhFbpqRBEV0RlAzCXDWJCEAoHHGt0C5Gt1cTIrcOeT_mgWCYhm1OU1JVVKRQU2ZQCRQaIobkcyQSevCe56yCF6MKVnmusgPFuh2QcCV_kDkZEA14Nsssr17\/s16000\/DeadPotato%20.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36223,"url":"https:\/\/kalilinuxtutorials.com\/hackthebox-ad-machines\/","url_meta":{"origin":34734,"position":0},"title":"HackTheBox AD Machines : Tools And Strategies For Mastering AD Penetration Testing","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"HackTheBox (HTB) offers a range of Active Directory (AD) machines designed to help cybersecurity enthusiasts and professionals practice enumeration, exploitation, and attack techniques on AD environments. These machines vary in difficulty, providing challenges for both beginners and advanced users. Below is an overview of tools commonly used for tackling AD\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/HackTheBox-AD-Machines.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35659,"url":"https:\/\/kalilinuxtutorials.com\/bloodhound-py\/","url_meta":{"origin":34734,"position":1},"title":"BloodHound.py : Installation, Usage, And Features","author":"Varshini","date":"January 13, 2025","format":false,"excerpt":"BloodHound.py is a Python based ingestor for BloodHound, based on Impacket. The code in this branch is only compatible with BloodHound 4.2 and 4.3. For BloodHound CE, check out the bloodhound-ce branch Installation There are different install methods for BloodHound Community Edition (CE) and BloodHound legacy. You can only have\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/BloodHound.py-1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":30877,"url":"https:\/\/kalilinuxtutorials.com\/rusthound\/","url_meta":{"origin":34734,"position":2},"title":"RustHound : A Cross-Platform BloodHound Collector Tool","author":"Varshini","date":"October 16, 2023","format":false,"excerpt":"In the realm of cybersecurity and network reconnaissance, RustHound emerges as a versatile hero. This cross-platform BloodHound collector tool, built with Rust, breaks down the barriers between operating systems, making it a go-to solution for collecting critical network data. Join us on a journey to explore the power and potential\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiJ5NC5RpxEr0fBwIa8cfZX_F4PJXPPcYA5AG0uZehXlG1hHKOl3or3qiGYV-_59YygBGdwUtqbArE295EM7YjvufcWJEdgdQ8oZOEUBzRS887IMwQxPbgxarENJlqUCGtFZKkXbKnTPOkfpkG4jk4xDlACWbOdiWGp5vvYFF-vsB5-2Z-ri880r80LIfZo\/s16000\/Untitled%20design%20%2827%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36722,"url":"https:\/\/kalilinuxtutorials.com\/netexec-cheatsheet\/","url_meta":{"origin":34734,"position":3},"title":"NetExec Cheatsheet : A Comprehensive Guide","author":"Varshini","date":"February 26, 2025","format":false,"excerpt":"NetExec, also known as nxc, is a powerful network hacking tool designed to automate security assessments of large-scale networks. It builds upon the legacy of CrackMapExec, offering enhanced functionality for penetration testers, red teamers, and cybersecurity professionals. Below is a detailed cheatsheet to help you utilize NetExec effectively. To install\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/NetExec-Cheatsheet-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":24006,"url":"https:\/\/kalilinuxtutorials.com\/goodhound\/","url_meta":{"origin":34734,"position":4},"title":"GoodHound : Uses Sharphound, Bloodhound And Neo4j To Produce An Actionable List Of Attack Paths","author":"R K","date":"April 20, 2022","format":false,"excerpt":"GoodHound came about because I had a need to perform a repeatable assessment of attack paths using Bloodhound.I found that when used in a defensive way BloodHound was so good at identifying attack paths in a domain I was faced with several thousand to process with each review, with no\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgg8mL2LEO0bhtF2_G2zaad_wuC3K3wpHJjKeiy8QIUG6PL9eYHOnDnHO0I6n73TcI5LC1fBWo8_PzMd2gFAdIAx0VQqbSgLxxDDyal6QtkygB0FiDpTyJwEOhYEd7Qp263v9c_iTV7FxGjd09pFsSVFKSM8NvEKAheb8KayYX8_Hj2xoJhIwOQDSWR\/s728\/FOX6mmqXIAAFQii.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgg8mL2LEO0bhtF2_G2zaad_wuC3K3wpHJjKeiy8QIUG6PL9eYHOnDnHO0I6n73TcI5LC1fBWo8_PzMd2gFAdIAx0VQqbSgLxxDDyal6QtkygB0FiDpTyJwEOhYEd7Qp263v9c_iTV7FxGjd09pFsSVFKSM8NvEKAheb8KayYX8_Hj2xoJhIwOQDSWR\/s728\/FOX6mmqXIAAFQii.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgg8mL2LEO0bhtF2_G2zaad_wuC3K3wpHJjKeiy8QIUG6PL9eYHOnDnHO0I6n73TcI5LC1fBWo8_PzMd2gFAdIAx0VQqbSgLxxDDyal6QtkygB0FiDpTyJwEOhYEd7Qp263v9c_iTV7FxGjd09pFsSVFKSM8NvEKAheb8KayYX8_Hj2xoJhIwOQDSWR\/s728\/FOX6mmqXIAAFQii.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgg8mL2LEO0bhtF2_G2zaad_wuC3K3wpHJjKeiy8QIUG6PL9eYHOnDnHO0I6n73TcI5LC1fBWo8_PzMd2gFAdIAx0VQqbSgLxxDDyal6QtkygB0FiDpTyJwEOhYEd7Qp263v9c_iTV7FxGjd09pFsSVFKSM8NvEKAheb8KayYX8_Hj2xoJhIwOQDSWR\/s728\/FOX6mmqXIAAFQii.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":28098,"url":"https:\/\/kalilinuxtutorials.com\/autobloody\/","url_meta":{"origin":34734,"position":5},"title":"Autobloody : Tool To Automatically Exploit Active Directory Privilege Escalation Paths Shown By BloodHound","author":"R K","date":"January 3, 2023","format":false,"excerpt":"Autobloody is a tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound. Description This tool automates the AD privesc between two AD objects, the source (the one we own) and the target (the one we want) if a privesc path exists in BloodHound database. The automation is\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh7cWl56r2h8DBy_HcxWxzaTu1aElg-Vs3aDsV4nRODxfyId17snJbflkl55-vGRyJ9obbT4WHIdglszrNUHgBtSfYSYEgrqezqJ_oIxYIdLMXa6tv4jrsM7eOGWSxTeqrrQo9cY9dnsT7R-9wi-fmL1NM76elorCuYfYS06etmWth81r4AgK7rkPBq\/s728\/autobloody%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34734"}],"version-history":[{"count":4,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34734\/revisions"}],"predecessor-version":[{"id":34738,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34734\/revisions\/34738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34739"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}