{"id":34952,"date":"2024-09-24T06:45:37","date_gmt":"2024-09-24T06:45:37","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=34952"},"modified":"2024-09-24T06:45:38","modified_gmt":"2024-09-24T06:45:38","slug":"zdocker-cobaltstrike","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/","title":{"rendered":"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With Docker"},"content":{"rendered":"\n<p>A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be seamlessly integrated into Docker to enhance security testing with scalability and ease of deployment. <\/p>\n\n\n\n<p>This article provides step-by-step instructions on building and running a Cobalt Strike Docker container, including how to set environment variables and expose necessary ports. <\/p>\n\n\n\n<p>By the end of this guide, you&#8217;ll be equipped to deploy Cobalt Strike using Docker, starting from setting up your license key to executing the container. <\/p>\n\n\n\n<p>Ideal for both beginners and seasoned professionals, this setup ensures a robust testing environment that is both efficient and secure.<\/p>\n\n\n\n<p>Set your CS License key in an Environment Variable<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>export COBALTSTRIKE_LICENSE=\"&lt;cobaltstrike_license\"<\/code><\/pre>\n\n\n\n<p>Build the docker container<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo docker build -t cobaltstrike:latest --build-arg COBALTSTRIKE_LICENSE=$COBALTSTRIKE_LICENSE .<\/code><\/pre>\n\n\n\n<p>Run the container and expose the ports<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>sudo .\/docker.sh<\/code><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be seamlessly integrated into Docker to enhance security testing with scalability and ease of deployment. This article provides step-by-step instructions on building and running a Cobalt Strike Docker container, including how to set environment [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":34955,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25],"tags":[737,6321,6052,6325],"class_list":["post-34952","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>zDocker-cobaltstrike : A Comprehensive Guide To Setting Up<\/title>\n<meta name=\"description\" content=\"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up\" \/>\n<meta property=\"og:description\" content=\"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-24T06:45:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-24T06:45:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With Docker\",\"datePublished\":\"2024-09-24T06:45:37+00:00\",\"dateModified\":\"2024-09-24T06:45:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\"},\"wordCount\":138,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\",\"name\":\"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\",\"datePublished\":\"2024-09-24T06:45:37+00:00\",\"dateModified\":\"2024-09-24T06:45:38+00:00\",\"description\":\"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp\",\"width\":\"1600\",\"height\":\"900\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up","description":"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/","og_locale":"en_US","og_type":"article","og_title":"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up","og_description":"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be","og_url":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2024-09-24T06:45:37+00:00","article_modified_time":"2024-09-24T06:45:38+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","type":"","width":"","height":""}],"author":"Varshini","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up Cobalt Strike With Docker","datePublished":"2024-09-24T06:45:37+00:00","dateModified":"2024-09-24T06:45:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/"},"wordCount":138,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools"],"articleSection":["Cyber security","Hacking Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/","url":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/","name":"zDocker-cobaltstrike : A Comprehensive Guide To Setting Up","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","datePublished":"2024-09-24T06:45:37+00:00","dateModified":"2024-09-24T06:45:38+00:00","description":"A detailed guide on setting up Cobalt Strike in a Docker environment. Cobalt Strike, a powerful tool for penetration testers, can be","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/zdocker-cobaltstrike\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","width":"1600","height":"900"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg_vm4auEyffJtdAmDXY3RplKp3u0v74D_6UnRVWQZFF3oM8a0XdrUuXQZGk6c1U51IkzFVg6v_ERLfAlZu4gPl57JtUb1tiXq4ecr-Z-Af66UCgHK0-MjiWtMV880Q_hqSicvAePAADlGAsaLEdfbyVc9e0uS7U9ZHU2Jf74aQQQmR-OJFQASJJAAKY7zz\/s1600\/zDocker-cobaltstrike.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":25598,"url":"https:\/\/kalilinuxtutorials.com\/c2concealer\/","url_meta":{"origin":34952,"position":0},"title":"C2concealer : Command Line Tool That Generates Randomized C2 Malleable Profiles For Use In Cobalt Strike","author":"R K","date":"June 28, 2022","format":false,"excerpt":"C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike. Installation chmod u+x install.sh.\/install.sh Building Docker Image docker build -t C2concealer . Running with Docker docker container run -it -v <cobalt_strike_location>:\/usr\/share\/cobaltstrike\/ C2concealer --hostname google.com --variant 3 Example Usage Usage:$ C2concealer --hostname google.com --variant\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh98RkPL9ItyuINfBVl8a0oCkzjlwKe5vjNB8gBGjSFfNdKFiTdJYODkfO9sl_OE0wkn11x4ry5W0q9vw9yvq3LA7JEdPniuXXNu1WnUFKcRJl18YC3h14HsPcyJ4WOnRovlob6enLjcl2nHEG2fdrzX1GGZWx4cCP5jyd2Z7vaCSqxc13YWC3wwX-\/s728\/images.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh98RkPL9ItyuINfBVl8a0oCkzjlwKe5vjNB8gBGjSFfNdKFiTdJYODkfO9sl_OE0wkn11x4ry5W0q9vw9yvq3LA7JEdPniuXXNu1WnUFKcRJl18YC3h14HsPcyJ4WOnRovlob6enLjcl2nHEG2fdrzX1GGZWx4cCP5jyd2Z7vaCSqxc13YWC3wwX-\/s728\/images.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh98RkPL9ItyuINfBVl8a0oCkzjlwKe5vjNB8gBGjSFfNdKFiTdJYODkfO9sl_OE0wkn11x4ry5W0q9vw9yvq3LA7JEdPniuXXNu1WnUFKcRJl18YC3h14HsPcyJ4WOnRovlob6enLjcl2nHEG2fdrzX1GGZWx4cCP5jyd2Z7vaCSqxc13YWC3wwX-\/s728\/images.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjh98RkPL9ItyuINfBVl8a0oCkzjlwKe5vjNB8gBGjSFfNdKFiTdJYODkfO9sl_OE0wkn11x4ry5W0q9vw9yvq3LA7JEdPniuXXNu1WnUFKcRJl18YC3h14HsPcyJ4WOnRovlob6enLjcl2nHEG2fdrzX1GGZWx4cCP5jyd2Z7vaCSqxc13YWC3wwX-\/s728\/images.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":32034,"url":"https:\/\/kalilinuxtutorials.com\/cobalt-strike-profiles-for-edr-evasion-sourcepoint-is-a-c2-profile-generator-for-cobalt-strike\/","url_meta":{"origin":34952,"position":1},"title":"Cobalt-Strike-Profiles-For-EDR-Evasion + SourcePoint Is A C2 Profile Generator For Cobalt Strike","author":"Varshini","date":"February 12, 2024","format":false,"excerpt":"Bypassing Memory Scanners The recent versions of Cobalt Strike have made it so easy for the operators to bypass memory scanners like BeaconEye and Hunt-Sleeping-Beacons. The following option will make this bypass possible: set sleep_mask \"true\"; By enabling this option, Cobalt Strike will XOR the heap and every image section\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgh2GSCVWG2-De-3NWXmi-AtPzXNk4SbiUCz52rg_X1MIsxFqKIE9S_AgRgkv8D8FpCwoyTISOLhXGs2zMJ15icuW36E_e3oju1guVsSMt5jBaDw4bSHklGtqsUg1XdSYvUwJca-jP7UnbID-piqXUjW9_YN_WCVPfx_ilS_x2LA1YN73O0sppr-9Y625JF\/s16000\/Untitled%20design%20%2815%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":20337,"url":"https:\/\/kalilinuxtutorials.com\/melting-cobalt\/","url_meta":{"origin":34952,"position":2},"title":"Melting-Cobalt : A Cobalt Strike Scanner That Retrieves Detected Team Server Beacons Into A JSON Object","author":"R K","date":"November 22, 2021","format":false,"excerpt":"Melting-Cobalt tool to hunt\/mine for Cobalt Strike beacons and \"reduce\" their beacon configuration for later indexing. Hunts can either be expansive and internet wide using services like Security Trails, Shodan, or ZoomEye or a list of IP's. Getting started Install\u00a0melting-cobaltConfigure\u00a0your tokens to begin the huntMine\u00a0Beacons to begin reducing themReview results\u00a0cat\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728","width":350,"height":200,"srcset":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 1x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 1.5x, https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjI4-Nh28PKbTHKisOfTcH2O54MFmj-HDmoFI_CXG1LWe-udv2bFrRvUCN_fS1vevEmyrmU1EF3qxM1QIlvhc8BTZkM34wyXZ3FshgMpUuu59BPgJ4b3XcMmgHM-42_qj-qBt6tnDjvttJrhPavXa0f5b3tkRBvGdvqkFDaPffoD2d6EXDuHCkcIEdN=s728 2x"},"classes":[]},{"id":17439,"url":"https:\/\/kalilinuxtutorials.com\/rew-sploit\/","url_meta":{"origin":34952,"position":3},"title":"REW-sploit : Emulate And Dissect MSF And *Other* Attacks","author":"R K","date":"August 28, 2021","format":false,"excerpt":"REW-sploit is a tool to Emulate And Dissect MSF And Other Attacks. Need help in analyzing Windows shellcode or attack coming from\u00a0Metasploit Framework\u00a0or\u00a0Cobalt Strike\u00a0(or may be also other malicious or obfuscated code)? Do you need to automate tasks with simple scripting? Do you want help to decrypt\u00a0MSF\u00a0generated traffic by extracting\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"REW-sploit : Emulate And Dissect MSF And *Other* Attacks","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-0d4UyGaekjw\/YSUK3jIvYPI\/AAAAAAAAKjQ\/AzsOOvlON7E7q4KcuaCw17Mc6xbtaTpSACLcBGAsYHQ\/s728\/REW-sploit-Logo%2B%25281%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-0d4UyGaekjw\/YSUK3jIvYPI\/AAAAAAAAKjQ\/AzsOOvlON7E7q4KcuaCw17Mc6xbtaTpSACLcBGAsYHQ\/s728\/REW-sploit-Logo%2B%25281%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-0d4UyGaekjw\/YSUK3jIvYPI\/AAAAAAAAKjQ\/AzsOOvlON7E7q4KcuaCw17Mc6xbtaTpSACLcBGAsYHQ\/s728\/REW-sploit-Logo%2B%25281%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-0d4UyGaekjw\/YSUK3jIvYPI\/AAAAAAAAKjQ\/AzsOOvlON7E7q4KcuaCw17Mc6xbtaTpSACLcBGAsYHQ\/s728\/REW-sploit-Logo%2B%25281%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":31807,"url":"https:\/\/kalilinuxtutorials.com\/graphstrike\/","url_meta":{"origin":34952,"position":4},"title":"GraphStrike &#8211; Empowering Cobalt Strike With Microsoft Graph API Integration","author":"Varshini","date":"January 24, 2024","format":false,"excerpt":"GraphStrike is a suite of tools that enables Cobalt Strike's HTTPS Beacon to use\u00a0Microsoft Graph API\u00a0for C2 communications. All Beacon traffic will be transmitted via two files created in the attacker's SharePoint site, and all communications from Beacon will route Why? Threat intelligence has been released regarding several different APTs\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjp-hqfgkBA3guDuA3wJaFK50ANB3vvyWGLiRyfBfA56PdIe9Q5Uli_zy0jt006LXqazdlkx-d3WPK5Xit8XlG9V25wjs8MVaCvvGf3BSzT1sOcGFyPHBUmQeasb5kDhAnZ28nwzmlt15GAFXDXGk1ujEtJM4AdBMn4l2B8efmkfzPnyfVAE881nsAD5pqO\/s16000\/Untitled%20design%20%289%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35881,"url":"https:\/\/kalilinuxtutorials.com\/process-inject-kit\/","url_meta":{"origin":34952,"position":5},"title":"Process Inject Kit : Elevating Penetration Testing With Advanced Injection Capabilities","author":"Varshini","date":"January 29, 2025","format":false,"excerpt":"The Process Inject Kit is a specialized toolkit designed to enhance and customize process injection techniques in Cobalt Strike, a popular penetration testing tool. Originally implemented in C, it has been ported to the C++ Beacon Object File (BOF) template, providing developers with greater flexibility and efficiency in defining and\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Process-Inject-Kit.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=34952"}],"version-history":[{"count":3,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34952\/revisions"}],"predecessor-version":[{"id":34956,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/34952\/revisions\/34956"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/34955"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=34952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=34952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=34952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}