{"id":37055,"date":"2025-03-13T06:06:15","date_gmt":"2025-03-13T06:06:15","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=37055"},"modified":"2025-03-13T06:06:16","modified_gmt":"2025-03-13T06:06:16","slug":"rec2","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/rec2\/","title":{"rendered":"REC2 : Rusty External Command And Control Tool"},"content":{"rendered":"\n<p><a href=\"https:\/\/kalilinuxtutorials.com\/tag\/azurec2relay\/\" target=\"_blank\" rel=\"noreferrer noopener\">REC2<\/a>, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. <\/p>\n\n\n\n<p>Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms. <\/p>\n\n\n\n<p>This tool leverages external APIs like VirusTotal and Mastodon to transmit encrypted communications, ensuring stealth and anonymity during operations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Key Features<\/strong><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Cross-Platform Support<\/strong>: REC2 supports Windows, Linux, and macOS systems, making it highly versatile.<\/li>\n\n\n\n<li><strong>Encrypted Communication<\/strong>: It uses AES encryption for secure data exchange between the server and implants.<\/li>\n\n\n\n<li><strong>External API Integration<\/strong>: By utilizing APIs like VirusTotal or Mastodon as intermediaries, <a href=\"https:\/\/github.com\/g0h4n\/REC2\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">REC2 <\/a>minimizes traceability, adding a layer of anonymization.<\/li>\n\n\n\n<li><strong>Stealth Operations<\/strong>: Implants monitor pending jobs, decrypt tasks, execute them on the target system, and securely transmit results back via external APIs.<\/li>\n\n\n\n<li><strong>Modular Design<\/strong>: The tool can be compiled using Makefile or Dockerfile for various environments.<\/li>\n<\/ol>\n\n\n\n<p>To use REC2 effectively:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Modify implant configuration files (<code>main.rs<\/code>) with appropriate API tokens and URLs from VirusTotal or Mastodon.<\/li>\n\n\n\n<li>Compile implants using commands such as <code>make virustotal_windows<\/code> or <code>make mastodon_linux<\/code>.<\/li>\n\n\n\n<li>Build the server binary with <code>make c2server_release<\/code> and execute commands to manage implants remotely.<\/li>\n<\/ul>\n\n\n\n<p>For example:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">bash<code>.\/server_release VirusTotal --url &lt;URL> --token &lt;TOKEN> --key &lt;AES_KEY><\/code><\/pre>\n\n\n\n<p>This command initiates communication with implants via VirusTotal.<\/p>\n\n\n\n<p>REC2 offers flexible compilation methods:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Using Makefile<\/strong>: Supports various architectures (e.g., x64, ARM) across Windows, Linux, and macOS.<\/li>\n\n\n\n<li><strong>Using Dockerfile<\/strong>: Ensures all dependencies are met for seamless builds within containerized environments.<\/li>\n<\/ul>\n\n\n\n<p>REC2 continues to evolve with planned features like asynchronous job status checks, enhanced session management commands, and potential integration with additional social networks like SoundCloud.<\/p>\n\n\n\n<p>REC2 is strictly for educational purposes. Unauthorized use of this tool is illegal. Users are responsible for complying with all applicable laws.<\/p>\n\n\n\n<p>For more information and access to the repository, visit GitHub under the username D1rkMtr.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms. This tool leverages external APIs like VirusTotal and Mastodon to transmit encrypted communications, ensuring stealth [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":37058,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[20,25,5840],"tags":[737,6321,6052,6325,7238],"class_list":["post-37055","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-hacking-tools","category-penetration-testing-tools","tag-cybersecurity","tag-informationsecurity","tag-kalilinux","tag-kalilinuxtools","tag-rec2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>REC2 : Rusty External Command And Control Tool<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/rec2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REC2 : Rusty External Command And Control Tool\" \/>\n<meta property=\"og:description\" content=\"REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms. This tool leverages external APIs like VirusTotal and Mastodon to transmit encrypted communications, ensuring stealth [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/rec2\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-13T06:06:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-13T06:06:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Varshini\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Varshini\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/\"},\"author\":{\"name\":\"Varshini\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\"},\"headline\":\"REC2 : Rusty External Command And Control Tool\",\"datePublished\":\"2025-03-13T06:06:15+00:00\",\"dateModified\":\"2025-03-13T06:06:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/\"},\"wordCount\":293,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp\",\"keywords\":[\"cybersecurity\",\"informationsecurity\",\"kalilinux\",\"kalilinuxtools\",\"REC2\"],\"articleSection\":[\"Cyber security\",\"Hacking Tools\",\"Pentesting Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/rec2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/rec2\/\",\"name\":\"REC2 : Rusty External Command And Control Tool\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp\",\"datePublished\":\"2025-03-13T06:06:15+00:00\",\"dateModified\":\"2025-03-13T06:06:16+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/rec2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp\",\"width\":1600,\"height\":900},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa\",\"name\":\"Varshini\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g\",\"caption\":\"Varshini\"},\"description\":\"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.\",\"sameAs\":[\"http:\/\/kalilinuxtutorials.com\",\"https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/\"],\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"REC2 : Rusty External Command And Control Tool","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/rec2\/","og_locale":"en_US","og_type":"article","og_title":"REC2 : Rusty External Command And Control Tool","og_description":"REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2) framework developed in the Rust programming language. Designed for advanced operational use, REC2 enables remote management of implants (clients) across macOS, Linux, and Windows platforms. This tool leverages external APIs like VirusTotal and Mastodon to transmit encrypted communications, ensuring stealth [&hellip;]","og_url":"https:\/\/kalilinuxtutorials.com\/rec2\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2025-03-13T06:06:15+00:00","article_modified_time":"2025-03-13T06:06:16+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","type":"image\/webp"}],"author":"Varshini","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"Varshini","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/rec2\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/rec2\/"},"author":{"name":"Varshini","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa"},"headline":"REC2 : Rusty External Command And Control Tool","datePublished":"2025-03-13T06:06:15+00:00","dateModified":"2025-03-13T06:06:16+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rec2\/"},"wordCount":293,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","keywords":["cybersecurity","informationsecurity","kalilinux","kalilinuxtools","REC2"],"articleSection":["Cyber security","Hacking Tools","Pentesting Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/rec2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/rec2\/","url":"https:\/\/kalilinuxtutorials.com\/rec2\/","name":"REC2 : Rusty External Command And Control Tool","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","datePublished":"2025-03-13T06:06:15+00:00","dateModified":"2025-03-13T06:06:16+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/rec2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/rec2\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","width":1600,"height":900},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/3c3b3f82a74146532c4def299fe069fa","name":"Varshini","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f19f43637c0f83fb3dcfb498f306b2a9ac0025ce85840ab52ee8c01f5361f269?s=96&d=mm&r=g","caption":"Varshini"},"description":"Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.","sameAs":["http:\/\/kalilinuxtutorials.com","https:\/\/www.linkedin.com\/in\/senthamil-selvan-14043a285\/"],"url":"https:\/\/kalilinuxtutorials.com\/author\/vinayakagrawal\/"}]}},"jetpack_featured_media_url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/REC2-.webp","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":37055,"position":0},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":13627,"url":"https:\/\/kalilinuxtutorials.com\/link\/","url_meta":{"origin":37055,"position":1},"title":"Link : A Command And Control Framework Written In Rust","author":"R K","date":"June 19, 2021","format":false,"excerpt":"Link provides MacOS, Linux and Windows implants which may lack the necessary evasive tradecraft provided by other more mature command and control frameworks. Tested on Linux only. Features Hopefully this list expands for humans to actually want to use this: HTTPS communicationProcess injectionIn-memory .NET assembly executionSharpCollection toolssRDI implementation for shellcode\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4512,"url":"https:\/\/kalilinuxtutorials.com\/chaos-poc\/","url_meta":{"origin":37055,"position":2},"title":"CHAOS : PoC that Allow Generate Payloads &#038; Control Remote OS","author":"R K","date":"April 8, 2019","format":false,"excerpt":"CHAOS is a PoC that allow generate payloads and control remote operating systems. Features FeatureWindowsMacLinuxReverse ShellXXXDownload FileXXXUpload FileXXXScreenshotXXXKeyloggerXPersistenceXOpen URLXXXGet OS InfoXXXFork BombXXXRun HiddenX Also Read - Osmedeus : Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability Scanning How to Install Install dependencies$ sudo apt install golang git -yGet this\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/Fq_0yDPFjYE\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":31444,"url":"https:\/\/kalilinuxtutorials.com\/llamafile\/","url_meta":{"origin":37055,"position":3},"title":"llamafile: Streamlining Access to Large Language Models with Single-File Executables for Local Deployment","author":"Varshini","date":"December 4, 2023","format":false,"excerpt":"llamafile lets you distribute and run LLMs with a single file. (announcement blog post) Our goal is to make open source large language models much more accessible to both developers and end users. We're doing that by combining\u00a0llama.cpp\u00a0with\u00a0Cosmopolitan Libc\u00a0into one framework that collapses all the complexity of LLMs down to\u2026","rel":"","context":"In &quot;software&quot;","block_context":{"text":"software","link":"https:\/\/kalilinuxtutorials.com\/category\/software\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgsk2C1l736qToMEGQP2Z9pVSLubqGbdPFyNiH6ZOGIItwKrnUBF9_86gDJC0XTCfLqokV7qEsYZ4lYCSoxp41kmjThY4JG-NTOTNPaxTSf_QJHGVF0SZgyPeO4MyUfbRTMbHtKi96nS7FuoYBxODEj-2rv6i5_n9kp259x2qx-n7FO1FjD_AOqFzMVKw\/s16000\/llamafile.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36620,"url":"https:\/\/kalilinuxtutorials.com\/imhex\/","url_meta":{"origin":37055,"position":4},"title":"Massive UX Improvements, Custom Disassemblers, And MSVC Support In ImHex v1.37.0","author":"Varshini","date":"February 21, 2025","format":false,"excerpt":"The latest release of ImHex v1.37.0 introduces a host of exciting features and improvements, enhancing its usability and functionality for reverse engineers and programmers. Massive UX Improvements ImHex v1.37.0 brings significant user experience upgrades: HiDPI Scaling: Full HiDPI scaling is now supported across Windows, macOS, and Linux, ensuring crisp visuals\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/ImHex-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37240,"url":"https:\/\/kalilinuxtutorials.com\/ipatool\/","url_meta":{"origin":37055,"position":5},"title":"IPATool : A Comprehensive Guide To Managing iOS Apps","author":"Varshini","date":"March 24, 2025","format":false,"excerpt":"IPATool is a versatile command-line utility designed to facilitate the search, download, and management of iOS app packages (ipa files) from the App Store. It supports various operating systems, including Windows, Linux, and macOS, making it accessible to a wide range of users. This article will delve into the functionality\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/IPATool-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37055","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=37055"}],"version-history":[{"count":1,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37055\/revisions"}],"predecessor-version":[{"id":37056,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/37055\/revisions\/37056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/37058"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=37055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=37055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=37055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}