{"id":9648,"date":"2020-03-13T12:46:51","date_gmt":"2020-03-13T07:16:51","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=9648"},"modified":"2020-03-13T12:46:51","modified_gmt":"2020-03-13T07:16:51","slug":"proton","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/proton\/","title":{"rendered":"Proton : Windows Post-Exploitation Framework Similar"},"content":{"rendered":"\n<p><strong>Proton Framework<\/strong> is a  Windows post-exploitation framework similar to other penetration  testing frameworks. The major difference is that it  does most of its operations using Windows Script Host, with  compatibility in the core to support a default installation of Windows  2000 with no service packs all the way through Windows 10. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-garRLTTYXo8\/Xmab0Ei0dKI\/AAAAAAAAFXI\/1xWOy3itjpwt8JwZUKATizD4pLBZeq0PACLcBGAsYHQ\/s1600\/Proton-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cd proton<br>chmod +x install.sh<br>.\/install.sh<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>UN-Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>cd proton<br>chmod +x uninstall.sh<br>.\/uninstall.sh<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/privesccheck\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"PrivescCheck : Privilege Escalation Enumeration Script for Windows (opens in a new tab)\">PrivescCheck : Privilege Escalation Enumeration Script for Windows<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Execution<\/strong><\/p>\n\n\n\n<p>To execute you should execute the following command.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>proton<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Why?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>It has a simpleand clear UX\/UI. It is easy to understand and it will be easier for you to master it.<\/li><li> There are a lot of stagers in it such as mshta, disk and wmic stagers.<\/li><li> There are a lot of implants in it such as bypassuac_compdefaults and mimikatz_dotnet implants.<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-mZvwWSEa1vM\/Xmab0PS1ThI\/AAAAAAAAFXE\/DlPUbDmFzX4YVKqDiJSEQfYI5UXcRaDfgCLcBGAsYHQ\/s1600\/Proton-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Disclaimer<\/strong><\/p>\n\n\n\n<p>Usage of the tool for attacking targets without prior mutual consent is illegal. It is the end user&#8217;s responsibility to obey all applicable local, state, federal, and international laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.<\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/entynetproject\/proton\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10. Installation cd protonchmod +x [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16165,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","fifu_image_alt":"Proton : Windows Post-Exploitation Framework Similar","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[2632,3714],"class_list":["post-9648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-proton","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proton : Windows Post-Exploitation Framework Similar<\/title>\n<meta name=\"description\" content=\"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/proton\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proton : Windows Post-Exploitation Framework Similar\" \/>\n<meta property=\"og:description\" content=\"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/proton\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-13T07:16:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Proton : Windows Post-Exploitation Framework Similar\",\"datePublished\":\"2020-03-13T07:16:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/\"},\"wordCount\":193,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\",\"keywords\":[\"Proton\",\"windows\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/proton\/\",\"name\":\"Proton : Windows Post-Exploitation Framework Similar\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\",\"datePublished\":\"2020-03-13T07:16:51+00:00\",\"description\":\"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/proton\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proton : Windows Post-Exploitation Framework Similar","description":"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/proton\/","og_locale":"en_US","og_type":"article","og_title":"Proton : Windows Post-Exploitation Framework Similar","og_description":"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework","og_url":"https:\/\/kalilinuxtutorials.com\/proton\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-03-13T07:16:51+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/proton\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/proton\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Proton : Windows Post-Exploitation Framework Similar","datePublished":"2020-03-13T07:16:51+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/proton\/"},"wordCount":193,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","keywords":["Proton","windows"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/proton\/","url":"https:\/\/kalilinuxtutorials.com\/proton\/","name":"Proton : Windows Post-Exploitation Framework Similar","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","datePublished":"2020-03-13T07:16:51+00:00","description":"Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that the Proton Framework","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/proton\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/proton\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-_vQNZ-1Oc4A\/Xmaa9GA815I\/AAAAAAAAFW8\/td5bkX20CyANQ7Gt4UJhyCxRozDsACBWQCLcBGAsYHQ\/s1600\/Porton.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":4005,"url":"https:\/\/kalilinuxtutorials.com\/beef-browser-exploitation-framework\/","url_meta":{"origin":9648,"position":0},"title":"Beef : The Browser Exploitation Framework Project","author":"R K","date":"February 26, 2019","format":false,"excerpt":"BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual security posture of a target environment by using client-side\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/xdbvU_U42kY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":35055,"url":"https:\/\/kalilinuxtutorials.com\/metasploit-for-penetration-testing\/","url_meta":{"origin":9648,"position":1},"title":"Metasploit for Penetration Testing and Exploitation &#8211; 2024","author":"Rajashekar Yasani","date":"August 7, 2024","format":false,"excerpt":"Metasploit is a powerful and widely used framework for penetration testing and exploitation. It provides security professionals with tools to discover vulnerabilities, exploit them, and assess the security posture of systems. This guide will walk you through the installation process, working methods, and provide examples of how to use Metasploit\u2026","rel":"","context":"In &quot;Exploitation Tools&quot;","block_context":{"text":"Exploitation Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/et\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjVIEBY0VP2I-mMJoYGy-yTIr3uGlswBY9_iwUThXPGWflNqiiAXa-bCWAmbCWWWaTtymUpoFX5A5meVmkO9HCMggiI_MqcWfLH1AIdr45IfZ1W2AKu-xu-LkDuUmT7xc4Ft0fm5fx72QjFr17Fc_ins94ajwwNw1R36Z-fpKMOhY6Im4FsedsRx9KGBLDb\/s16000\/metasploit%20for%20penetration%20testing.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":5111,"url":"https:\/\/kalilinuxtutorials.com\/flashsploit\/","url_meta":{"origin":9648,"position":2},"title":"FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks","author":"R K","date":"May 24, 2019","format":false,"excerpt":"Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible (.ino) Scripts based on User Input and then Starts a Listener in Metasploit-Framework if Required by the Script, in Summary : Automatic Script Generation with Automated msfconsole. Windows\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30608,"url":"https:\/\/kalilinuxtutorials.com\/awesome-command-and-control\/","url_meta":{"origin":9648,"position":3},"title":"Awesome Command And Control","author":"Varshini","date":"October 4, 2023","format":false,"excerpt":"A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assessments. If you'd like to\u00a0contribute\u00a0to this list, simply open a PR with your additions. Maintained by\u00a0@tcostam. If you have contributions but can't pull request, give me a shout at twitter. Table Of Contents\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhc8vcyb8ZLSimS20xiQLPU-c5s6BGpapTb2JjRZItKLqcyKzkOujWOraWQz91OYA4luq2tciF14CKi1kVByxILh-uHYEnwAPXLeJLzA20qxvdIwAKaVqTP3QWwDkOz9rRcbIYVSWh8-7nELAGXpqDgIUm77Bs7SCQl_9Lx5qD1MfpIq-p485Lecx5_aj3B\/s16000\/Untitled%20design%20%2814%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":31452,"url":"https:\/\/kalilinuxtutorials.com\/amnesiac\/","url_meta":{"origin":9648,"position":4},"title":"Amnesiac: The Power of PowerShell in Active Directory Post-Exploitation","author":"Varshini","date":"December 4, 2023","format":false,"excerpt":"Amnesiac\u00a0is a post-exploitation framework designed to assist with lateral movement within active directory environments. Amnesiac is being developed to bridge a gap on Windows OS, where post-exploitation frameworks are not readily available unless explicitly installed. In fact, it is entirely written in PowerShell, and can be loaded and executed in\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiYbvnc3P95It206rFy_OD0AMQUM-hflJIPzEvp8AX-_ugEdq4VJ48cGtk3bA89CDyzIHFdrFPyVaBUwV9eYqcee5QWkQlBdY2u5MQl2Isrf5iOLhvNhOr419EZKI0HQQRxNYpHIbVS3GP8ENXpwK58CYhqQVR-mgYncxh2Ye6VM-ulJnmrC7cyWPuaoQ\/s16000\/Amnesiac.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35886,"url":"https:\/\/kalilinuxtutorials.com\/sunder\/","url_meta":{"origin":9648,"position":5},"title":"Sunder : A Windows Rootkit Exploiting Vulnerable Drivers For Kernel-Level Attacks","author":"Varshini","date":"January 30, 2025","format":false,"excerpt":"Sunder is a Windows rootkit inspired by the Lazarus Group's FudModule rootkit, designed to exploit vulnerabilities in kernel drivers to gain unauthorized access to system resources. This rootkit serves as a framework for post-exploitation activities, leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to bypass security mechanisms and manipulate\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/Sunder-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=9648"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9648\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16165"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=9648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=9648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=9648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}