{"id":9903,"date":"2020-03-23T14:56:13","date_gmt":"2020-03-23T09:26:13","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=9903"},"modified":"2020-03-23T14:56:13","modified_gmt":"2020-03-23T09:26:13","slug":"xshock","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/xshock\/","title":{"rendered":"XSHOCK : Tool To Exploits ShellShock"},"content":{"rendered":"\n<p><strong>XSHOCK<\/strong> Shellshock Exploit. All founded directories will be saved in <strong>vulnurl.txt<\/strong> file. The results of the executed commands are saved in <strong>response.txt<\/strong>.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong> Features<\/strong><\/p>\n\n\n\n<p>This tool <strong>include:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CGI VULNERABILITY<\/li><li>DIRECTORY SCAN<\/li><li>RUN COMMAND WITH FOUNDED CGI<\/li><li>SHOW VULNERABLE URLS<\/li><li>UPDATE PROXY<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>git clone https:\/\/github.com\/capture0x\/xShock\/<br>cd xShock<br>pip3 install -r requirements.txt<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read  &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/token-reverser\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Token Reverser : Word List Generator To Crack Security Tokens (opens in a new tab)\">Token Reverser : Word List Generator To Crack Security Tokens<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>python3 main.py<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>CGI VULNERABILITY<\/strong><\/p>\n\n\n\n<p>Checks cgi-bin directory on the target site<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>e.g:<strong>http:\/\/targetsite.com <\/strong><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XSHOCK#directory-scan\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>DIRECTORY SCAN<\/strong><\/p>\n\n\n\n<p>This works with wordlists. Scans url on the target site. Important \nnotice: Please enter full path of wordlist after the url.(Not file. It \nshould be directory)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>e.g: <a rel=\"noreferrer noopener\" aria-label=\"http:\/\/ targetsite.com\/cgi-bin\/selectedworlist (opens in a new tab)\" href=\"http:\/\/targetsite.com\/cgi-bin\/selectedworlist\" target=\"_blank\">http:\/\/ targetsite.com\/cgi-bin\/<strong>selectedworlist<\/strong><\/a><\/li><li>e.g: <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/targetsite.com\/cgi-bin\/usr\/share\/wordlists\/dirb\" target=\"_blank\">http:\/\/targetsite.com\/cgi-bin \/usr\/share\/wordlists\/dirb<\/a>  &#8211;&gt; This is directory of wordlist. Not file! <\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XSHOCK#run-command-with-founded-cgi\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>RUN COMMAND WITH FOUNDED CGI<\/strong><\/p>\n\n\n\n<p>By entering the url in the vuln.txt file, you can try running commands in the found urls.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>http:\/\/targetsite.com\/cgi-bin\/status<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XSHOCK#show-vulnerable-urls\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>SHOW VULNERABLE URLS<\/strong><\/p>\n\n\n\n<p>Shows founded urls in vuln.txt file.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/capture0x\/XSHOCK#update-proxy\"><\/a><\/h3>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>UPDATE PROXY<\/strong><\/p>\n\n\n\n<p>You can update proxies from web manually.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>How to use?<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"youtube-embed\" data-video_id=\"VXP6ZYyBPS4\"><iframe loading=\"lazy\" title=\"xShock ShellShock (CVE-2014-6271) Exploit\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/VXP6ZYyBPS4?feature=oembed&#038;enablejsapi=1&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Screenshots<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-hqeRII0FEMQ\/XncJbM_fe2I\/AAAAAAAAFl4\/Y-YF3iR4LPQzNHkTlST4l-fubZaRjXIrACLcBGAsYHQ\/s1600\/Screenshots-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-CqNamZaD0Y4\/XncJbEiZpUI\/AAAAAAAAFl0\/B7cyJb0tYFog3I3LLEfobWd5Bp9E4F3JQCLcBGAsYHQ\/s1600\/Screenshots-2.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-RA9f-U_hxho\/XncJbJLS5sI\/AAAAAAAAFlw\/C6B7rUD7U_M-b7bWJTZC2vaq1RRQ9ZoMgCLcBGAsYHQ\/s1600\/Screenshots-3.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-7DmdTbabn0k\/XncJb0QeTUI\/AAAAAAAAFl8\/R4eMOnqugxMTbITaU9_Kb6Qee1QE3IQKwCLcBGAsYHQ\/s1600\/Screenshots-4.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-QUK-wJQE9Jc\/XncJcT-awJI\/AAAAAAAAFmA\/h3_EiZ5a1g0obKpOtJ5FYmoalY4mQ5agwCLcBGAsYHQ\/s1600\/Screenshots-5.png\" alt=\"\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-MTQ3VdTIbMo\/XncJcfLq4fI\/AAAAAAAAFmE\/EO385bv4kxYFF8-RF2JHbHk9yzyE9gEBQCLcBGAsYHQ\/s1600\/Screenshots-6.png\" alt=\"\"\/><\/figure>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/capture0x\/XSHOCK\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt. Features This tool include: CGI VULNERABILITY DIRECTORY SCAN RUN COMMAND WITH FOUNDED CGI SHOW VULNERABLE URLS UPDATE PROXY Installation git clone https:\/\/github.com\/capture0x\/xShock\/cd xShockpip3 install -r requirements.txt Also Read &#8211; Token Reverser : Word [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16188,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","fifu_image_alt":"XSHOCK : Tool To Exploits ShellShock","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[3083,3833],"class_list":["post-9903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-shellshock","tag-xshock"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial<\/title>\n<meta name=\"description\" content=\"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/xshock\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial\" \/>\n<meta property=\"og:description\" content=\"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/xshock\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-23T09:26:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"XSHOCK : Tool To Exploits ShellShock\",\"datePublished\":\"2020-03-23T09:26:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/\"},\"wordCount\":207,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\",\"keywords\":[\"ShellShock\",\"XSHOCK\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/xshock\/\",\"name\":\"XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\",\"datePublished\":\"2020-03-23T09:26:13+00:00\",\"description\":\"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/xshock\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial","description":"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/xshock\/","og_locale":"en_US","og_type":"article","og_title":"XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial","og_description":"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.","og_url":"https:\/\/kalilinuxtutorials.com\/xshock\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-03-23T09:26:13+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/xshock\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/xshock\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"XSHOCK : Tool To Exploits ShellShock","datePublished":"2020-03-23T09:26:13+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xshock\/"},"wordCount":207,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","keywords":["ShellShock","XSHOCK"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/xshock\/","url":"https:\/\/kalilinuxtutorials.com\/xshock\/","name":"XSHOCK : Tool To Exploits ShellShock 2020!Kalilinuxtutorial","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","datePublished":"2020-03-23T09:26:13+00:00","description":"XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/xshock\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/xshock\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-iRmi0ZaNCIE\/XncKIPa9r-I\/AAAAAAAAFmc\/kVARRS7Yae4qipHSbf3k9KoseCxxbwXWgCLcBGAsYHQ\/s1600\/xShock-2%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3468,"url":"https:\/\/kalilinuxtutorials.com\/crs-owasp-modsecurity\/","url_meta":{"origin":9903,"position":0},"title":"CRS &#8211; OWASP ModSecurity Core Rule Set","author":"R K","date":"December 16, 2018","format":false,"excerpt":"The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application firewalls. It aims to protect web applications from a wide range of attacks, including the OWASP Top Ten, with a minimum of false alerts. Also ReadXSS\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10001,"url":"https:\/\/kalilinuxtutorials.com\/xss-loader-xss-payload-generator-scanner-dork-finder\/","url_meta":{"origin":9903,"position":1},"title":"XSS-LOADER : Xss Payload Generator, Scanner &#038; Dork Finder","author":"R K","date":"March 29, 2020","format":false,"excerpt":"XSS-LOADER is a all in one tools for XSS PAYLOAD GENERATOR -XSS SCANNER-XSS DORK FINDER and this is written by Hulya Karabag. This tool creates payload for use in xss injectionSelect default payload tags from parameter or write your payloadIt makes xss inj. with Xss Scanner parameterIt finds vulnerable sites\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ys_a5yx1hmY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3689,"url":"https:\/\/kalilinuxtutorials.com\/sitadel-security-scanner\/","url_meta":{"origin":9903,"position":2},"title":"Sitadel &#8211; Web Application Security Scanner","author":"R K","date":"January 25, 2019","format":false,"excerpt":"Sitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new modules and implement new features : Frontend framework detectionContent Delivery Network detectionDefine Risk Level to allow for scansPlugin systemDocker image available to build and run Also Read\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":32308,"url":"https:\/\/kalilinuxtutorials.com\/awesome-hacking\/","url_meta":{"origin":9903,"position":3},"title":"Awesome Hacking &#8211; An Amazing Project : The Ultimate Resource Guide For Cybersecurity Exploration","author":"Varshini","date":"March 13, 2024","format":false,"excerpt":"A curated list of awesome Hacking. Inspired by\u00a0awesome-machine-learning If you want to contribute to this list (please do), send me a pull request! For a list of free hacking books available for download, go\u00a0here Table Of Contents System Tutorials Tools Docker General Reverse Engineering Tutorials Tools General Web Tools General\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgavcLNXzp9UC50S5QxiCL6REBEcZxY98rY13kQI7ogzVbJFY7J_uvhit2oYWyOtIgBs6pCJUp5f_rWlunSQZd_rA2wO8Oop1Shjtj6yj3dUEI2o42GkbA6fk_lFHw1lsZBkowTxv0p-QPmK4cCTEPUJAZLXAJYP8hupyvpfSzvCtd0lbF1E3S8TnrwMiwI\/s16000\/Awesome%20Hacking.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":2535,"url":"https:\/\/kalilinuxtutorials.com\/htrace-sh-simple-shell-script\/","url_meta":{"origin":9903,"position":4},"title":"htrace.sh &#8211; Simple Shell Script To Debugging Http\/Https Traffic Tracing","author":"R K","date":"September 10, 2018","format":false,"excerpt":"htrace.sh simple shell script to debugging http\/https traffic tracing, response headers and mixed-content. Scanning domain using Nmap NSE Library. Support external security tools: Mozilla Observatory and SSL Labs API. htrace.sh is a shell script that allows you to validate your domain configuration and catch any errors (e.g. redirect loops). It\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/htrace.sh1_.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/htrace.sh1_.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/htrace.sh1_.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/09\/htrace.sh1_.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":1465,"url":"https:\/\/kalilinuxtutorials.com\/best-hacking-books-tools-resources-2018\/","url_meta":{"origin":9903,"position":5},"title":"Best Hacking Books, Tools &#038; Resources 2018","author":"R K","date":"June 6, 2018","format":false,"excerpt":"The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as read the best hacking books that related subjects, for example, Networking, programming, abuse improvement, web applications, arrange security checking and other IT subjects. A curated rundown\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=9903"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/9903\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16188"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=9903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=9903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=9903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}