{"id":9547,"date":"2020-03-05T16:02:49","date_gmt":"2020-03-05T10:32:49","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=9547"},"modified":"2020-03-05T16:02:49","modified_gmt":"2020-03-05T10:32:49","slug":"xctr-hacking","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","title":{"rendered":"XCTR Hacking Tools 2020"},"content":{"rendered":"\n<p><strong>XCTR Hacking Tool<\/strong>s initially, <strong>you need to create a project<\/strong> where you will save everything.  All of the collected information is saved as <strong>&#8220;project-name&#8221;<\/strong> in results directory. <\/p>\n\n\n\n<p> You can update user agent and proxy information in the settings section  and also update url, proxy, project name, wordlist, thread numbers. <\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<p>This tool <strong>include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Dork Finder<\/li><li>Admin Panel Finder<\/li><li>Cms Finder<\/li><li>Ip History<\/li><li>Reverse Ip<\/li><li>Page Viewer<\/li><li>Proxy Finder<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Installation with requirements.txt<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools\/ <br>cd xctr-hacking-tools <br>pip3 install -r requirements.txt<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/xencrypt\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Xencrypt : A PowerShell Script Anti-Virus Evasion Tool (opens in a new tab)\">Xencrypt : A PowerShell Script Anti-Virus Evasion Tool<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#usage\"><\/a><\/h2>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python3 xctr.py<\/strong><\/p>\n\n\n\n<p><strong>All results save in results\/project-name.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#dork-finder\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Dork Finder<\/strong><\/li><\/ul>\n\n\n\n<p>The dork finder have 2 section. Bing and yandex.<\/p>\n\n\n\n<p>e.g:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>*.php?id= <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#admin-panel-finder\"><\/a><\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Admin Panel Finder<\/strong><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li>In this section, firstly need choose a wordlist for scanning.<\/li><li>Press 2 to change wordlist and login.<\/li><li>Url should be <strong><a href=\"https:\/\/targetsite.com\/\">https:\/\/targetsite.com\/<\/a><\/strong> (http or s and \/ symbol at the end of the url.)<\/li><li>If scanning is slow you will update the proxies.(Press 3 to update)<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#cms-finder\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>CMS Finder<\/strong><\/p>\n\n\n\n<p>You&#8217;ll find cms version from meta name.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#ip-history\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>IP History<\/strong><\/p>\n\n\n\n<p>This tool displays and save the ip history of the domain.<\/p>\n\n\n\n<p>e.g usage:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>targetsite.com <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#reverse-ip\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Reverse IP<\/strong><\/p>\n\n\n\n<p>With this tool, you can find domains on server.<\/p>\n\n\n\n<p>e.g usage:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>212.57.147.54 <\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#page-viewer\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Page Viewer<\/strong><\/p>\n\n\n\n<p>You can increase the number of page views of the target site.<\/p>\n\n\n\n<p>e.g usage:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\">https:\/\/targetsite.com\n<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools#proxy-finder\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Proxy Finder<\/strong><\/p>\n\n\n\n<p>This tool, find proxies on free-proxy-list.net and updates proxy.txt on main directory.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Screenshot<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-FBa3xi2vxNM\/Xl9Ca4sYEDI\/AAAAAAAAFSY\/i0idlHCazNoc23GTcfg9Ogs0S5qzPvljQCLcBGAsYHQ\/s1600\/Screenshots-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-IQCp6gOtqVs\/Xl9CaxXI1YI\/AAAAAAAAFSU\/lFIZfLV6NzYHrZtSxSdB8kR7RV9cyhNzwCLcBGAsYHQ\/s1600\/Screenshots-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-iaUnUzcWcnk\/Xl9CanWHVGI\/AAAAAAAAFSc\/CB63XQswHsI9Tk--2mHi4G8aIupJ9P-ZgCLcBGAsYHQ\/s1600\/Screenshots-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-RaWfHuXIST0\/Xl9CbSYwxkI\/AAAAAAAAFSg\/hrYqhfd3yogUTdH1g5Xyip00A2Bld1_NQCLcBGAsYHQ\/s1600\/Screenshots-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-K0vvSQgXjow\/Xl9CbyO4MiI\/AAAAAAAAFSk\/LIWjxVimh3UAUtd6cT0_O1MnhrECrRvjQCLcBGAsYHQ\/s1600\/Screenshots-5.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-IDjqBvUooAk\/Xl9CcInBetI\/AAAAAAAAFSo\/UKxpx4vejUYXRala4yQSf_0lk2-9lGEvACLcBGAsYHQ\/s1600\/Screenshots-6.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-wII3nXC6EPg\/Xl9CcWkz2HI\/AAAAAAAAFSs\/j7d1pmk4CLIZUBO2yYkB9BYGNSqMTGf-gCLcBGAsYHQ\/s1600\/Screenshots-7.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong>Credit:<\/strong> Hulya Karabag<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/capture0x\/XCTR-Hacking-Tools\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as &#8220;project-name&#8221; in results directory. You can update user agent and proxy information in the settings section and also update url, proxy, project name, wordlist, thread numbers. Features This tool include: Dork Finder [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16153,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","fifu_image_alt":"XCTR Hacking Tools 2020","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1443,3807,3808,3809],"class_list":["post-9547","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hacking","tag-xctr","tag-xctr-hacking","tag-xctr-hacking-tools"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XCTR Hacking Tools 2020 - Kalilinuxtutorials<\/title>\n<meta name=\"description\" content=\"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as &quot;project-name&quot;\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XCTR Hacking Tools 2020 - Kalilinuxtutorials\" \/>\n<meta property=\"og:description\" content=\"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as &quot;project-name&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-05T10:32:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"XCTR Hacking Tools 2020\",\"datePublished\":\"2020-03-05T10:32:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\"},\"wordCount\":256,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\",\"keywords\":[\"Hacking\",\"XCTR\",\"XCTR Hacking\",\"XCTR Hacking Tools\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\",\"name\":\"XCTR Hacking Tools 2020 - Kalilinuxtutorials\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\",\"datePublished\":\"2020-03-05T10:32:49+00:00\",\"description\":\"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as \\\"project-name\\\"\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XCTR Hacking Tools 2020 - Kalilinuxtutorials","description":"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as \"project-name\"","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","og_locale":"en_US","og_type":"article","og_title":"XCTR Hacking Tools 2020 - Kalilinuxtutorials","og_description":"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as \"project-name\"","og_url":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-03-05T10:32:49+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"XCTR Hacking Tools 2020","datePublished":"2020-03-05T10:32:49+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/"},"wordCount":256,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","keywords":["Hacking","XCTR","XCTR Hacking","XCTR Hacking Tools"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","url":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/","name":"XCTR Hacking Tools 2020 - Kalilinuxtutorials","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","datePublished":"2020-03-05T10:32:49+00:00","description":"XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is saved as \"project-name\"","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/xctr-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/xctr-hacking\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-MJ8L7K9MO5M\/Xl9CcwEdjJI\/AAAAAAAAFSw\/zI0F4kaQ06ULtLhgNyVJnkEdiJ6sdxlAwCLcBGAsYHQ\/s1600\/XCTR%2BHacking%2BTools%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":32994,"url":"https:\/\/kalilinuxtutorials.com\/gohtools\/","url_meta":{"origin":9547,"position":0},"title":"GoHTools &#8211; Your Go-to Golang Hacking Suite","author":"Varshini","date":"May 9, 2024","format":false,"excerpt":"Dive into the world of cybersecurity with GoHTools, a comprehensive collection of hacking utilities crafted in Golang. From DNS manipulation to HTTP reconnaissance, GoHTools equips hackers with a versatile set of tools for penetration testing and vulnerability assessment. Learn how this powerful suite harnesses the flexibility and efficiency of Golang\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjfWYpOHgudzgQxR1Ck65jwdf94EGHCFQ1aCNfoBIbNNjwQ-xjJeykVPkPPpRrnzliUXQIZ4dBaU1GOrJiTloaO1wuUZzAkyE9rhKOqr3v89nGO5tA493IMRSJjy-ZlMuvF8XjDtmIV138bta4inpl3IiPdgrRfIBSAb1hmpoZJKcug6iG7L5W8ALBWRWC8\/s16000\/GoHTools.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":1465,"url":"https:\/\/kalilinuxtutorials.com\/best-hacking-books-tools-resources-2018\/","url_meta":{"origin":9547,"position":1},"title":"Best Hacking Books, Tools &#038; Resources 2018","author":"R K","date":"June 6, 2018","format":false,"excerpt":"The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as read the best hacking books that related subjects, for example, Networking, programming, abuse improvement, web applications, arrange security checking and other IT subjects. A curated rundown\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":33001,"url":"https:\/\/kalilinuxtutorials.com\/mobilehackersweapons\/","url_meta":{"origin":9547,"position":2},"title":"MobileHackersWeapons &#8211; The Arsenal Of Mobile Hackers","author":"Varshini","date":"May 10, 2024","format":false,"excerpt":"A collection of cool tools used by Mobile hackers. Happy hacking , Happy bug-hunting. The clandestine tools and techniques of mobile hackers are laid bare. In this curated collection, delve into the arsenal utilized by modern-day hackers in their quest for digital exploration and exploitation. From runtime manipulation to code\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiwETablU6ECYgIyOYIIm9GeWB26Vozl97Xra3a0VxOEmm4tLBFoFNEbaPlnmqhod6lzSoayuq2ePlHbgapyTVAPBOoDaYACLKry4A5_Pb3e7w10Eko6d9ptnemu-2s7JIT44MfmSL3VbnQ1qGvR3Qkok4_4tgGsx3BRYfW6NhCNWsOgKaTgiUiKJbmQcg3\/s16000\/MobileHackersWeapons.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":3968,"url":"https:\/\/kalilinuxtutorials.com\/top-10-best-web-hacking-tools\/","url_meta":{"origin":9547,"position":3},"title":"Top 10 Best Web Hacking Tools","author":"Pricilla","date":"February 20, 2019","format":false,"excerpt":"Here is the best web hacking tools that helps you in pen-testing and protecting the websites. Burp Suite: Burp Suite is a graphical tool used for testing Web application security. It helps you identify vulnerabilities and verify attack vectors that are affecting web applications. While browsing the target application, a\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11087,"url":"https:\/\/kalilinuxtutorials.com\/onex\/","url_meta":{"origin":9547,"position":4},"title":"Onex : A Library Of Hacking Tools For Termux And Other Linux Distributions","author":"R K","date":"July 30, 2020","format":false,"excerpt":"Onex is a kali linux hacking tools installer for termux and other linux distribution. It's package manager for hacker's. It can manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11048,"url":"https:\/\/kalilinuxtutorials.com\/lazymux\/","url_meta":{"origin":9547,"position":5},"title":"Lazymux : A Huge List Of Many Hacking &#038; PEN-TESTING Tools","author":"R K","date":"July 27, 2020","format":false,"excerpt":"Lazymux tools installer is very easy to use, only provided for lazy termux users; it's huge list of Many Hacking tools and PEN TESTING! NOTE: Am not Responsible of bad use of this project. Requirements \u2022 Linux environment\u2022 Python 2.x\u2022 git Installation & Using Lazymux git clone https:\/\/github.com\/Gameye98\/Lazymuxcd Lazymux python2\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=9547"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9547\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16153"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=9547"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=9547"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=9547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}