Search the Community

Showing results for tags 'linux'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Found 47 results

  1. Linux Kernel version 4.4 (Ubuntu 16.04) suffers from a snd_timer_user_ccallback() kernel pointer leak vulnerability. View the full article
  2. It was discovered that virtual address 0 is mappable via privileged write() to /proc/*/mem on Linux. View the full article
  3. ToRat A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. Work in Progress... Setup [Hidden Content] Repository The important parts live in Client [Hidden Content] Server [Hidden Content] TLS certificate generator [Hidden Content] Current Features the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service) anonymity of client and server end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor smaller binary anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features Persistence and privilege escalation for Linux and Mac OS Support for Android and iOS Cat with support for .docx .pptx .od* .pdf files File-less Persistence on Windows [Hidden Content] ASCII-Art Welcome Message in server shell Download: [Hidden Content]
  4. Linux suffers from out-of-bounds read and write vulnerabilities in the SNMP NAT module. View the full article
  5. @.Root

    Create RAT Kali Linux Method

    [Hidden Content]
  6. itsMe?

    Kali Linux 2019.1 Release

    Kali Linux 2019.1 – Release Notes Welcome to the first release of 2019, Kali Linux 2019.1, which is available for immediate download. This release brings our kernel up to version 4.19.13, fixes numerous bugs, and includes many updated packages. Kali Linux 2019.1 – New Features Tool Upgrades: update of Metasploit to version 5.0, updated packages for theHarvester, DBeaver,etc. ARM Updates: includes the return of Banana Pi and Banana Pro, both of which are on the 4.19 kernel; Veyron has been moved to a 4.19 kernel and the Raspberry Pi images. There are no longer separate Raspberry Pi images for users with TFT LCDs because they now include re4son’s kalipi-tft-config script on all of them, so if you want to set up a board with a TFT, run kalipi-tft-config and follow the prompts. [HIDE][Hidden Content]]
  7. Linux kvm_ioctl_create_device() installs fd before taking reference. View the full article
  8. How to Install a Complete Linux Distro on Android [Hidden Content]
  9. Installing Kali linux on Vps Server [HIDE][Hidden Content]]
  10. [HIDE][Hidden Content]]
  11. [HIDE][Hidden Content]]
  12. It has been discovered that the Linux eBPF Spectre v1 mitigation is insufficient. View the full article
  13. [HIDE][Hidden Content]]
  14. BackBox Linux: Security Assessment and Penetration Testing Distro [HIDE][Hidden Content]] BackBox is fast and easy to use penetration testing and security assessments distribution based on Ubuntu core. With its own software repositories, you’ll have access to all necessary tools (regularly updated), that you need for your pentesting and security analysis tasks, organized in three main categories: auditing, services and anonymous. Features: Lightweight Linux distribution based on Ubuntu (should work well even on the old hardware). Standard Xfce desktop environment. Launchpad repository core, constantly updated to the latest stable version of the most known and used ethical hacking tools. Includes some of the most commonly known/used hacking and security analysis tools (web application analysis, network analysis, stress tests, sniffing, vulnerability assessment, forensic analysis, exploitation tools, etc.). Built-in anonymous mode. Well organized and designed menu, intuitive, friendly and easy to use (also suitable for beginners). You can change/modify it to suit your needs, and install additional tools, thet aren’t present in the repositories. and so much more. System requirements: 32-bit or 64-bit processor 1024 MB of system memory (RAM) 10 GB of disk space for installation Graphics card capable of 800×600 resolution DVD-ROM drive or USB port (3 GB) Some of the BackBox Linux Tools Information Gathering arping arp-scan ike-scan p0f Vulnerability Assessment nikto skipfish Miscellaneous scapy Exploitation BeEF sqlmap msfconsole WPscan Privilege Excalation Xhydra John The Ripper medusa dsniff Ettercap Wireshark arp-spoof dns-spoof
  15. Linux kernel version 4.13 suffers from a compat_get_timex() kernel pointer leak vulnerability. View the full article
  16. 0x1

    Skywave Linux

    Skywave Linux 3.1.1 Released Skywave Linux is an operating system using bleeding-edge technology to robustly access broadcast, utility, military, and amateur radio signals from almost anywhere in the world, including countries with restrictive internet environments. Skywave Linux connects to a large and growing network of state-of-the art software defined radio (SDR) servers, making it possible to experience high performance SDR operation without your own large antennas or on-site radio hardware. All you need to do is boot the system on a computer with internet connectivity. Skywave Linux can also operate numerous types of SDR hardware, plugged in or on the local network. Downloading, installing and configuring SDR software can be difficult for many computer users; Skywave Linux eliminates the hassle by including several applications installed, configured, and ready to run. Video: SDR software is configured for popular devices, such as the RTL-SDR dongles, Softrocks, Hermes, and other radios. Skywave Linux is a 64 bit system built over Ubuntu Linux, and may be installed on a bootable USB stick, SD card, DVD, or hard drive. Features WebSDR, OpenWebRX radio servers accessible via internet browser. HPSDR servers accessible via QtRadio HPSDR hardware also via cudaSDR RTL-SDR plug-and-play functionality via CubicSDR, Gqrx, and QtRadio RTL-SDR ADS-B tracking and mapping via Dump1090 RTL-SDR RDS decoding via Gqrx and Redsea SDRPlay, Airspy radio hardware is supported. LADSPA audio plugins for EQ/Compression/Limiting WSJT -X / WSPR-X weak signal digimode software Weather Satellite Decoding via WXtoImg Satellite tracking with Gpredict Trunked Radio System Reception with SDRTrunk Radio firmware & data management with CHIRP Kodi Media Center for conventional internet streaming Skywave Linux Web Site : [hide][Hidden Content]] Download : [hide][Hidden Content]]
  17. dEEpEst

    livecd BlackArch Linux

    About BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2093 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. For more information, see the installation instructions. Also, news is published on our blog. Please note that BlackArch is a relatively new project. To report bugs and request new tools, please visit the issue tracker on Github. The BlackArch Live ISO contains multiple window managers. Below you will find screenshots of a few of them. Tools The list Information Every package of the BlackArch Linux repository is listed in the following table. If you don't find your needed tool in this list simply open an issue or better do a pull request for the tool you want to be in our repository. We are fast at packaging and releasing tools. Tool count: 2093 BlackArch Linux Complete Tools List Tools:[Hidden Content] Guide: [Hidden Content] Download: [Hidden Content]
  18. M3tr4l14

    Kali linux netbook

    Buenos días compañer@s, saben si correría bien el SO kali linux en una netbook ace aspire one 1.60 1g ram? Por aprender con meterpreter Metasploit, y de no ser posible, se podria usar metasploit en Lubuntu o otra distro en linux? Gracias
  19. Linux kernel version 4.4 rtnetlink stack memory disclosure exploit. View the full article
  20. Linux userfaultfd bypasses tmpfs file permissions. View the full article
  21. Linux Kernel version 4.8 on Ubuntu 16.04 suffers from an sctp kernel pointer leak vulnerability. View the full article
  22. This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation to root (CVE-2018-18955). The target system must have unprivileged user namespaces enabled and the newuidmap and newgidmap helpers installed (from uidmap package). This Metasploit module has been tested successfully on: Fedora Workstation 28 kernel 4.16.3-301.fc28.x86_64; Kubuntu 18.04 LTS kernel 4.15.0-20-generic (x86_64); Linux Mint 19 kernel 4.15.0-20-generic (x86_64); Ubuntu Linux 18.04.1 LTS kernel 4.15.0-20-generic (x86_64). View the full article
  23. 1337day-Exploits

    Exploits Linux Broken UID/GID Mapping

    Linux has a broken uid/gid mapping for nester user namespaces with greater than 5 ranges. View the full article
  24. Linux has an issue where mremap() performs a TLB flush too late with concurrent ftruncate(). View the full article
  25. Linux suffers from an issue with systemd where chown_one() can dereference symlinks. View the full article