{"id":6516,"date":"2019-09-17T11:29:35","date_gmt":"2019-09-17T05:59:35","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=6516"},"modified":"2019-09-17T11:29:35","modified_gmt":"2019-09-17T05:59:35","slug":"metame-metamorphic-code-engine","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/","title":{"rendered":"Metame : Metamorphic Code Engine For Arbitrary Executables"},"content":{"rendered":"\n<p><strong>Metame <\/strong>is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation. <\/p>\n\n\n\n<p>This is used by computer viruses to avoid the pattern recognition of anti-virus software. It implementation works this way:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Open a given binary and analyze the code<\/li><li>Randomly replace instructions with equivalences in logic and size<\/li><li>Copy and patch the original binary to generate a mutated variant<\/li><\/ul>\n\n\n\n<p>It currently supports the following architectures:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>x86 32 bits<\/li><li>x86 64 bits<\/li><\/ul>\n\n\n\n<p>Also, it supports a variety of file formats, as&nbsp;<a href=\"http:\/\/radare.org\/\">radare2<\/a>&nbsp;is used for file parsing and code analysis.<\/p>\n\n\n\n<p>Example of code before and after mutation:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-fCR2GRuBaXo\/XXn6Fjx3GSI\/AAAAAAAACeY\/ilm5SbJPNLk5cgEPr6BKcKca0nRlNQWGwCLcBGAsYHQ\/s1600\/metame-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-B2K4kUqgtRM\/XXn6FjZc-bI\/AAAAAAAACeU\/_1Ip4C9Tgfw1B6qSqWkOR3AVt3cj5DnDwCLcBGAsYHQ\/s1600\/metame.png\" alt=\"\"\/><\/figure>\n\n\n\n<p style=\"text-align:center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/pingcastle-active-directory-security\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PingCastle : Get Active Directory Security At 80% In 20% Of The Time (opens in a new tab)\">PingCastle : Get Active Directory Security At 80% In 20% Of The Time<\/a><\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">pip install metame\n<\/p>\n\n\n\n<p>This should also install the requirements.<\/p>\n\n\n\n<p>You will also need&nbsp;<a href=\"http:\/\/radare.org\/\">radare2<\/a>. Refer to the official website for installation instructions.<\/p>\n\n\n\n<p><code><strong>simplejson<\/strong><\/code><strong>&nbsp;<\/strong>is also a &#8220;nice to have&#8221; for a small performance boost:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>pip install simplejson <\/strong><\/p>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><a href=\"https:\/\/github.com\/a0rtega\/metame#usage\"><\/a><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>metame -i original.exe -o mutation.exe -d <\/strong><\/p>\n\n\n\n<p>Use&nbsp;<code><strong>metame -h<\/strong><\/code>&nbsp;for help.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/a0rtega\/metame\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version of its own code under some interpretation. This is used by computer viruses to avoid the pattern recognition of anti-virus software. It implementation works this way: Open a given binary and analyze the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":15803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","fifu_image_alt":"Metame : Metamorphic Code Engine For Arbitrary Executables","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[220,2056,2057,2058],"class_list":["post-6516","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-arbitrary","tag-metame","tag-metamorphic","tag-metamorphic-code-engine"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Metame : Metamorphic Code Engine For Arbitrary Executables<\/title>\n<meta name=\"description\" content=\"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Metame : Metamorphic Code Engine For Arbitrary Executables\" \/>\n<meta property=\"og:description\" content=\"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-17T05:59:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Metame : Metamorphic Code Engine For Arbitrary Executables\",\"datePublished\":\"2019-09-17T05:59:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\"},\"wordCount\":187,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\",\"keywords\":[\"Arbitrary\",\"Metame\",\"Metamorphic\",\"Metamorphic Code Engine\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\",\"name\":\"Metame : Metamorphic Code Engine For Arbitrary Executables\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\",\"datePublished\":\"2019-09-17T05:59:35+00:00\",\"description\":\"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Metame : Metamorphic Code Engine For Arbitrary Executables","description":"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/","og_locale":"en_US","og_type":"article","og_title":"Metame : Metamorphic Code Engine For Arbitrary Executables","og_description":"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent","og_url":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-09-17T05:59:35+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Metame : Metamorphic Code Engine For Arbitrary Executables","datePublished":"2019-09-17T05:59:35+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/"},"wordCount":187,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","keywords":["Arbitrary","Metame","Metamorphic","Metamorphic Code Engine"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/","url":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/","name":"Metame : Metamorphic Code Engine For Arbitrary Executables","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","datePublished":"2019-09-17T05:59:35+00:00","description":"Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/metame-metamorphic-code-engine\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-M_kAJDUbt8k\/XXn66VHIYjI\/AAAAAAAACek\/lQXlqLGMRooSJL3KTMVa8a_9Wdi9of-XACLcBGAsYHQ\/s1600\/metame%2B%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":6624,"url":"https:\/\/kalilinuxtutorials.com\/sysanalyzer-automated-malcode-analysis-system\/","url_meta":{"origin":6516,"position":0},"title":"SysAnalyzer : Automated Malcode Analysis System","author":"R K","date":"September 26, 2019","format":false,"excerpt":"SysAnalyzer is an application that was designed to give malcode analysts an automated tool to quickly collect, compare, and report on the actions a binary took while running on the system. The main components of SysAnalyzer work off of comparing snapshots of the system over a user specified time interval.\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/4twR8xtVWPk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":6553,"url":"https:\/\/kalilinuxtutorials.com\/postshell-post-exploitation-bind-backconnect-shell\/","url_meta":{"origin":6516,"position":1},"title":"PostShell &#8211; Post Exploitation Bind\/Backconnect Shell","author":"R K","date":"September 21, 2019","format":false,"excerpt":"PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system. ScreenShots Banner and interaction with shell after a connection\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32497,"url":"https:\/\/kalilinuxtutorials.com\/resources-for-mobile-application-testing\/","url_meta":{"origin":6516,"position":2},"title":"Resources For Mobile Application Testing &#8211; A Comprehensive Guide To Tools, Techniques, And Vulnerabilities","author":"Varshini","date":"April 8, 2024","format":false,"excerpt":"In the rapidly evolving world of mobile technology, ensuring the security and reliability of applications is paramount. This comprehensive guide offers an extensive collection of resources for mobile application testing, covering everything from vulnerability analysis to penetration testing techniques. Dive into a curated list of blogs, tools, labs, and courses\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh46S2XfnGIjDh_HcKkk29VHmnM-ygjBjCZPC54yNHJjzF2bjPra4bFJ8jkogW4MAQFMCbfJdENuzm77osKRNQSC3pHqn5xOPZ0RJrWiIG527v6g4MqNB_l6MuLjEsoMiKN28NQ-J574bZNHGjDO8hPy5ZZhH5o3UNWEv6bJHfUodrU42L_HsoP1-HQykyp\/s16000\/Untitled%20design%20%285%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4008,"url":"https:\/\/kalilinuxtutorials.com\/php\/","url_meta":{"origin":6516,"position":3},"title":"PHP : Security Check List  2019","author":"R K","date":"February 27, 2019","format":false,"excerpt":"PHP : Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML. The PHP development, which was first created by Rasmus Lerdorf in 1995, is now being run by the PHP community. The PHP programming language is still used by a large\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":27595,"url":"https:\/\/kalilinuxtutorials.com\/jscythe\/","url_meta":{"origin":6516,"position":4},"title":"Jscythe : Force Any Node.Js\/Electron\/V8 Based Process To Execute Arbitrary Javascript Code","author":"R K","date":"November 13, 2022","format":false,"excerpt":"Jscythe abuses the node.js inspector mechanism in order to force any node.js\/electron\/v8 based process to execute arbitrary javascript code, even if their debugging capabilities are disabled. Tested and working against Visual Studio Code, Discord, any Node.js application and more! How? Locate the target process. Send SIGUSR1 signal to the process,\u2026","rel":"","context":"In \"electron\"","block_context":{"text":"electron","link":"https:\/\/kalilinuxtutorials.com\/tag\/electron\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjxgBFudwlhN8PizIXeCFR5lH5aa_-GIwrvBeFvC9law41JUatojcFB1DFWKZPn3Tr30WaGtEoT2WBmUNJvcOOUF5g6vXTJuJc2Ib2EHpwkAHn6Btc0hgJ0Ic0h-UvMsirakqso2dmDSWifcPYO7CdeEP-2RasyRPBJtqxglNtx2sgyXgr1T7U97ltN\/s728\/jscythe.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3773,"url":"https:\/\/kalilinuxtutorials.com\/lolbas\/","url_meta":{"origin":6516,"position":5},"title":"LOLBAS &#8211; Living Off The Land Binaries And Scripts","author":"R K","date":"February 4, 2019","format":false,"excerpt":"LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy frontend here: https:\/\/lolbas-project.github.io.\u00a0 This repo serves as a place where we maintain the YML files that are used by the fancy frontend. The goal of the LOLBAS project is to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/j-r6UonEkUw\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6516","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=6516"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/6516\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/15803"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=6516"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=6516"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=6516"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}