{"id":6288,"date":"2019-08-23T21:19:59","date_gmt":"2019-08-23T15:49:59","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6288"},"modified":"2019-08-23T21:19:59","modified_gmt":"2019-08-23T15:49:59","slug":"hacktronian-hacking-tool-linux-android","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","title":{"rendered":"Hacktronian : All in One Hacking Tool for Linux &#038; Android"},"content":{"rendered":"\n<p><strong>Hacktronian <\/strong>is an all in one Hacking tool for Linux &amp; Android and pentesing tools that all Hacker needs.<\/p>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Menu<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Information Gathering<\/li>\n<li>Password Attacks<\/li>\n<li>Wireless Testing<\/li>\n<li>Exploitation Tools<\/li>\n<li>Sniffing &amp; Spoofing<\/li>\n<li>Web Hacking<\/li>\n<li>Private Web Hacking<\/li>\n<li>Post Exploitation<\/li>\n<li>Install The Hacking Tool<\/li>\n<li><a href=\"https:\/\/gbhackers.com\/latest-google-dorks-list\/\">Google Dorks<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Information Gathering:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nmap<\/li>\n<li>Setoolkit<\/li>\n<li>Port Scanning<\/li>\n<li>Host To IP<\/li>\n<li>wordpress user<\/li>\n<li>CMS scanner<\/li>\n<li>XSStrike<\/li>\n<li>Dork &#8211; Google Dorks Passive Vulnerability Auditor<\/li>\n<li>Scan A server&#8217;s Users<\/li>\n<li>Crips<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Password Attacks:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cupp<\/li>\n<li>Ncrack<\/li>\n<\/ul>\n\n\n\n<p style=\"text-align: center;\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/pepper-malware-analysis-portable-executable\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable (opens in a new tab)\">PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Wireless Testing:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>reaver<\/li>\n<li>pixiewps<\/li>\n<li>Fluxion<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Exploitation Tools:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ATSCAN<\/li>\n<li>sqlmap<\/li>\n<li>Shellnoob<\/li>\n<li>commix<\/li>\n<li>FTP Auto Bypass<\/li>\n<li>jboss-autopwn<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Sniffing &amp; Spoofing:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Setoolkit<\/li>\n<li>SSLtrip<\/li>\n<li>pyPISHER<\/li>\n<li>SMTP Mailer<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Web Hacking:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Drupal Hacking<\/li>\n<li>Inurlbr<\/li>\n<li>WordPress &amp; Joomla Scanner<\/li>\n<li>Gravity Form Scanner<\/li>\n<li>File Upload Checker<\/li>\n<li>WordPress Exploit Scanner<\/li>\n<li>WordPress Plugins Scanner<\/li>\n<li>Shell and Directory Finder<\/li>\n<li>Joomla! 1.5 &#8211; 3.4.5 remote code execution<\/li>\n<li>Vbulletin 5.X remote code execution<\/li>\n<li>BruteX &#8211; Automatically brute force all services running on a target<\/li>\n<li>Arachni &#8211; Web Application Security Scanner Framework<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Private Web Hacking:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Get all websites<\/li>\n<li>Get joomla websites<\/li>\n<li>Get wordpress websites<\/li>\n<li>Control Panel Finder<\/li>\n<li>Zip Files Finder<\/li>\n<li>Upload File Finder<\/li>\n<li>Get server users<\/li>\n<li>SQli Scanner<\/li>\n<li>Ports Scan (range of ports)<\/li>\n<li>ports Scan (common ports)<\/li>\n<li>Get server Info<\/li>\n<li>Bypass Cloudflare<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Post Exploitation:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Shell Checker<\/li>\n<li>POET<\/li>\n<li>Weeman<\/li>\n<\/ul>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Installation in Linux :<\/strong><\/p>\n\n\n\n<p>This Tool Must Run As ROOT !!!<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">git clone https:\/\/github.com\/thehackingsage\/hacktronian.git <br \/>cd hacktronian<br \/>chmod +x install.sh <br \/>.\/install.sh<\/p>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Installation in Android :<\/strong><\/p>\n\n\n\n<p>Open\u00a0<a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.termux\">Termux<\/a><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">pkg install git <br \/>pkg install python <br \/>git clone https:\/\/github.com\/thehackingsage\/hacktronian.git <br \/>cd hacktronian <br \/>chmod +x hacktronian.py <br \/>python2 hacktronian.py<\/p>\n\n\n\n<p class=\"has-background has-light-green-cyan-background-color\" style=\"text-align: center;\"><strong>Video Tutorial :<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\">\n<div class=\"wp-block-embed__wrapper\">https:\/\/www.youtube.com\/watch?v=1LJlyQAQby4<\/div>\n<\/figure>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/thehackingsage\/hacktronian\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Hacktronian is an all in one Hacking tool for Linux &amp; Android and pentesing tools that all Hacker needs. Menu Information Gathering Password Attacks Wireless Testing Exploitation Tools Sniffing &amp; Spoofing Web Hacking Private Web Hacking Post Exploitation Install The Hacking Tool Google Dorks Information Gathering: Nmap Setoolkit Port Scanning Host To IP wordpress user [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15762,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","fifu_image_alt":"Hacktronian : All in One Hacking Tool for Linux & Android","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[156,1446,1450,1896],"class_list":["post-6288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-android","tag-hacking-tool","tag-hacktronian","tag-linux"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hacktronian : All in One Hacking Tool for Linux &amp; Android<\/title>\n<meta name=\"description\" content=\"Hacktronian is an all in one Hacking tool for Linux &amp; Android and pentesing tools that all Hacker needs. It will automatically brute force all services\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacktronian : All in One Hacking Tool for Linux &amp; Android\" \/>\n<meta property=\"og:description\" content=\"Hacktronian is an all in one Hacking tool for Linux &amp; Android and pentesing tools that all Hacker needs. It will automatically brute force all services\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-23T15:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Hacktronian : All in One Hacking Tool for Linux &#038; Android\",\"datePublished\":\"2019-08-23T15:49:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\"},\"wordCount\":284,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\",\"keywords\":[\"android\",\"Hacking Tool\",\"Hacktronian\",\"linux\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\",\"name\":\"Hacktronian : All in One Hacking Tool for Linux & Android\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\",\"datePublished\":\"2019-08-23T15:49:59+00:00\",\"description\":\"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. It will automatically brute force all services\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacktronian : All in One Hacking Tool for Linux & Android","description":"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. It will automatically brute force all services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","og_locale":"en_US","og_type":"article","og_title":"Hacktronian : All in One Hacking Tool for Linux & Android","og_description":"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. It will automatically brute force all services","og_url":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-08-23T15:49:59+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Hacktronian : All in One Hacking Tool for Linux &#038; Android","datePublished":"2019-08-23T15:49:59+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/"},"wordCount":284,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","keywords":["android","Hacking Tool","Hacktronian","linux"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","url":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/","name":"Hacktronian : All in One Hacking Tool for Linux & Android","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","datePublished":"2019-08-23T15:49:59+00:00","description":"Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs. It will automatically brute force all services","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/hacktronian-hacking-tool-linux-android\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-5J-Hv_0atDo\/XV7CTmVd1AI\/AAAAAAAACHY\/Qa_niJ7ydvc8WPY8oqx92v-IHRXzj56NQCLcBGAs\/s1600\/hacktronian%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":27837,"url":"https:\/\/kalilinuxtutorials.com\/hacktronian-tool\/","url_meta":{"origin":6288,"position":0},"title":"The Hackingsage\/Hacktronian &#8211; A Pentesting Tool for Linux and Android","author":"Febi","date":"December 27, 2022","format":false,"excerpt":"Hacktronian is a free and open-source tool used for information gathering. It is used for performing numerous data hacking and penetration testing on websites and web applications. Hacktronian has different modules such as information gathering, and password attacks. Hacktronian is a complete package of different hacking tools\/modules such as\u00a0 Setoolkit,\u00a0Nmap,\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjYtEhishg9w3judjIm_sj2XyzehPJgDsGBnkIYcCdsFzBJQNE55iYzXI-wB-7W329miTG-IPJiq_2vkjE68zTiVhuz8bsTIzafZxTm_9M0xw0lpXdBxqwE7jhjJ4NBL56ZEMa50CLucYF_3HBEkQbzn-Gk-QGCKDHrAh_BR4jjiNo1sxFMkXuW7zu0\/s16000\/hacktorian.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1518,"url":"https:\/\/kalilinuxtutorials.com\/fsociety-hacking-tools-pack\/","url_meta":{"origin":6288,"position":1},"title":"fsociety Hacking Tools Pack \u2013 A Penetration Testing Framework","author":"R K","date":"June 9, 2018","format":false,"excerpt":"fsociety is a penetration testing system comprises of all penetration testing devices that a programmer needs. It incorporates every one of the devices that associated with the Mr. Robot Series. The tool comprises an immense devices list beginning structure Information social event to Post Exploitation. Also Read\u00a0Autovpn \u2013 Connect to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/68747470733a2f2f61736369696e656d612e6f72672f612f55526a326e7670625970654a794a6534334b6c41535a37667a2e706e67.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/68747470733a2f2f61736369696e656d612e6f72672f612f55526a326e7670625970654a794a6534334b6c41535a37667a2e706e67.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/68747470733a2f2f61736369696e656d612e6f72672f612f55526a326e7670625970654a794a6534334b6c41535a37667a2e706e67.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/68747470733a2f2f61736369696e656d612e6f72672f612f55526a326e7670625970654a794a6534334b6c41535a37667a2e706e67.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/06\/68747470733a2f2f61736369696e656d612e6f72672f612f55526a326e7670625970654a794a6534334b6c41535a37667a2e706e67.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":2503,"url":"https:\/\/kalilinuxtutorials.com\/tool-x-kali-linux-hacking-tool\/","url_meta":{"origin":6288,"position":2},"title":"Tool-X : Kali Linux Hacking Tool Installer","author":"R K","date":"September 5, 2018","format":false,"excerpt":"Tool-X is a Kali linux hacking Tool installer, with the help of it you can install best hacking tools in Rooted or Non Rooted Android devices. It is Specially made for Termux and GNURoot Debian Terminal. It is available for both Android and Ubuntu. You can install any tools by\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":4356,"url":"https:\/\/kalilinuxtutorials.com\/top-5-sql-injection-tools-for-pentest-hacking\/","url_meta":{"origin":6288,"position":3},"title":"Top 5 SQL Injection Tools for PenTest &amp; Hacking","author":"Pricilla","date":"April 5, 2019","format":false,"excerpt":"SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are inserted into SQL statements via web page input. SQL injection is one of the most common web hacking techniques. Let's see the top 5 SQL injection tool to detect\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11087,"url":"https:\/\/kalilinuxtutorials.com\/onex\/","url_meta":{"origin":6288,"position":4},"title":"Onex : A Library Of Hacking Tools For Termux And Other Linux Distributions","author":"R K","date":"July 30, 2020","format":false,"excerpt":"Onex is a kali linux hacking tools installer for termux and other linux distribution. It's package manager for hacker's. It can manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32818,"url":"https:\/\/kalilinuxtutorials.com\/mnsalltools\/","url_meta":{"origin":6288,"position":5},"title":"MNSAllTools &#8211; The Ultimate Collection Of 350+ Hacking Resources For Cybersecurity Professionals","author":"Varshini","date":"April 24, 2024","format":false,"excerpt":"A collection of 350+ hacking tools you can install into termux for hacking, Pentesting, Mapping and more. In this tool you will get a total of 350+ hacking tools for you to install into termux\/kali\/windows\/ubuntu, Suitable for pentesters, bug hunting, exploitation, mapping, etc. You can install these tools by just\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9NWPuuSeRKCRtPCJRdvX_b9WOrNA1bq0Lg2I_9hbk9CW7tsv0jOqQL-Y86qZcIqaZhCrYgaxlOPpp8Chr9L9XPm_nzEZS__snPaQbsYA4mPmJfPOYZy7SH0x-hpqJU5-161NJYthS8K805_MCVdEPZb7G-9x_2nAZ3Rdan9XXtM5Arlu_iQQVyikGGXLd\/s16000\/Soumnibot%20Android%20Banker%20Techniques%20%285%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6288"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15762"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}