Categories: Kali Linux

Thoron : A Linux Post-Exploitation Framework That Exploits Linux TCP Vulnerability

Thoron Framework is a Linux post-exploitation framework that exploits Linux tcp vulnerability to get shell-like connection. Thoron Framework has the ability to generate simple payloads to provide Linux tcp attack.

Getting Started

  • Installation

cd thoron
chmod +x install.sh
./install.sh

  • UN-Installation

cd thoron
chmod +x uninstall.sh
./uninstall.sh

  • Framework execution

To execute Thoron Framework you should execute the following command.

thoron

Also Read – Print-My-Shell : Process Of Generating Various Reverse Shells

Why Thoron Framework

  • Simple and clear UX/UI.

Thoron Framework has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the Thoron Framework.

  • A lot of different payloads.

There are a lot of different payloads in Thoron Framework such as Shell, Python and C payloads.

  • Powerful ThorCat listener.

There is a powerful ThorCat listener in Thoron Framework that supports secure SSL connection and other useful functions.

Disclaimer

Usage of the Thoron Framework for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state, federal, and international laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

R K

Recent Posts

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

12 hours ago

MODeflattener – Miasm’s OLLVM Deflattener

MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…

12 hours ago

My Awesome List : Tools And Their Functions

"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…

12 hours ago

Chrome Browser Exploitation, Part 3 : Analyzing And Exploiting CVE-2018-17463

CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…

12 hours ago

Chrome Browser Exploitation, Part 1 : Introduction To V8 And JavaScript Internals

The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…

12 hours ago

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

15 hours ago