Search the Community

Showing results for tags 'linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 122 results

  1. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.4 Based on: Xbuntu 18.04.5 LTS Kernel: 5.9.1 System: 64bit Release date: 23.10.2020 Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare Code name: Stable + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23 + Firefox + Signal + Tor browser update + Added new information on panic room system information [hide][Hidden Content]]
  2. Utopia Framework Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation. Why Utopia Framework Simple and clear UX/UI. Utopia Framework has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the Utopia Framework. A lot of different modules. There are a lot of different modules for SSH exploitation in Utopia Frameworks such as ssh_exec_noauth and ssh_shell_noauth. Simple SSH exploitation. Utopia Framework makes mastering Linux SSH exploitation very easily. [hide][Hidden Content]]
  3. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.2 RC3 First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools. Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include: Filtering the hunt query Pivot to PCAP Create an alert in TheHive Google search for the value Analyze the value on VirusTotal.com Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer! [hide][Hidden Content]]
  4. ☠xrahitel☠

    Cross - platform Rat (Win,Linux,MAC)

    this is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully programmed in java be a user friendly and easy to use and builds out trojans (.jar) and controls the victims running those trojans on same port at same time ,this tool is fully in java (Client & Server in java) and this tool is now registerd to be free , and on the user responsibility [Hidden Content]
  5. itsMe

    Kali Linux 2020.3 Release

    Our Most Advanced Penetration Testing Distribution, Ever. Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating. Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) Kali Linux News Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating. A quick overview of what’s new since the last release in May 2020: New Shell – Starting the process to switch from “Bash” to “ZSH“ The release of “Win-Kex” – Get ready WSL2 Automating HiDPI support – Easy switching mode Tool Icons – Every default tool now has its own unique icon Bluetooth Arsenal – New set of tools for Kali NetHunter Nokia Support – New devices for Kali NetHunter Setup Process – No more missing network repositories and quicker installs [hide][Hidden Content]]
  6. English | 2020 | ISBN: 1484260340 | 386 Pages | True PDF, EPUB | 38 MB Learn command line tricks, programs, and hacks you can use day to day as a Linux user, programmer, and system administrator. When you interact with the digital world, you can’t go far without interacting with Linux systems. This book shows you how to leverage its power to serve your needs. Many users know “top” is installed on almost all Linux machines, but did you know with a few keystrokes you can customize it specifically for your needs? Stuck using `cd` and `ls` commands for navigating file systems? This book looks at how you can use Ranger to quickly navigate through multiple levels of folders, and quickly run bash commands without ever leaving the terminal. We also suggest programs that can be used for common tasks such as finding which programs are using the most processing, data download/upload, and file space. You’ll know how to quickly connect to remote machines and run your commonly needed jobs in a keystroke or even on auto-pilot. With Basic Linux Terminal Tips and Tricks you’ll be equipped with a wide range of tools that can be used for daily work and maintenance on all sorts of Linux systems including servers, desktops, and even embedded devices. What You Will Learn Work with common tools on your local network. Techniques for efficient use of command line. Easily manipulate text files for processing. Monitor the state of a system with a handful of popular programs. Combine programs to create useful processes. [hide][Hidden Content]]
  7. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.2 + Kernel upgrade from 5.4.0-33 to 5.4.0-42 + Full system update + Added session messenger ( One of the best secure messengers) + Added Steghide-GUI now you can hide your text messages encrypted in jpg or wav ..etc files! + Added pci=noaer to grup options for error prevention + Few icons changes + Threema web added to bookmarks ! Conky improved and refresh timer reduced ! Yandex DNS moved to lower position ! Fixed bandwidth message length issue ! Fixed onions share update issue – Replaced Kodachi browser ip lookup plugin – Replaced Riot with Element [hide][Hidden Content]]
  8. It is possible that if you want to mount your own server, whatever the type, you need some recommendations from some distributions that may be better for this purpose. Every server operating system should have a series of qualities such as easy administration, so as not to complicate life for sysadmins, as well as robustness, stability, and security. In short, a simple operating system in terms of administration and that is as reliable as possible to keep the server always operational (or as long as possible). And the truth is that, although many GNU / Linux distros could be worth it, there are some especially good ones. Here is a list of some ideal GNU / Linux distros for servers: Debian: It is one of the most wonderful, secure, robust and stable distributions that exist. In addition, there is a great community behind, you have a lot of help and tutorials if something gets complicated, a multitude of packages, etc. That is, everything that is requested for an OS for a server. Download Debían: [Hidden Content] CentOS: If you don't like DEB-based, then you have another great option which is CentOS. A derivative of RHEL maintained by the community and with equally remarkable qualities such as security, robustness, and stability. It should be noted that it has SELinux by default, instead of Debian's AppArmor, which can make its administration somewhat more complicated. Download CentOS: [Hidden Content] Ubuntu Server: Based on Debian, it shares many of its features. But this Canonical distro has been "refined" and could present some comforts. In addition, being the most used distro you will find a lot of help online in case you get lost at any time. That together with performance, scalability, stability and security, make it another one of the best options. Download Ubuntu: [Hidden Content] RHEL: Red Hat's is another of the great distros specially designed for business environments. It is no coincidence that many large data centers use it. As with many distros, it works not only on x86, but also on ARM and even on IBM z machines. Download RHEL (Red Hat Enterprise Linux): [Hidden Content] SUSE Linux Enterprise: it is the alternative to the previous one and very similar in many things. In the case of the German SUSE, it is also specially designed for business environments. It is also based on RPM packages like RHEL, but it can have some advantages in terms of ease of administration, especially with YaST2. Also, use AppArmor instead of SELinux like RHEL, which can make things easier in terms of security management. Of course, like RHEL, it is perfect for containers and the cloud. It will also work on x86, ARM and IBM z, among others. Includes integrated services like SAP HANA. Download SLES (SUSE Linux Enterprise Server): [Hidden Content] Oracle Linux: another alternative, in this case from Oracle. It is specially designed for data centers and has great security. Download Oracle Linux: [Hidden Content] ClearOS: RHEL / CentOS derived system built by ClearFoundation for the ClearCenter market. A fairly good commercial distro for small and medium-sized businesses, flexible and with a web-based interface for easy administration. Download ClearOS: [Hidden Content] Arch Linux: if you like strong emotions, you will have simplicity (not simplicity), flexibility and unmatched power at your fingertips customizing your ideal system with the Arch project. That is not the most suitable for beginners ... The good thing is who has a wiki that is beyond wonderful for help. Download Arch Linux: [Hidden Content] CoreOS: It is a project that we have talked about in LxA on several occasions. It is especially interesting if you are interested in working with containers, since it has a whole base designed so that you have everything at your fingertips. Although he has now joined the Red Hat "family". Download CoreOS: [Hidden Content] Bonus (Slackware and Gentoo): two other powerful distros, with great flexibility, stable, safe, robust, and with all that you are looking for in an operating system that you want to be like a rock and that needs less maintenance than a plastic pot ... Those are Gentoo and Slackware. Although, like Arch, it is not suitable for beginners, as they can be complex to manage. They are more intended for "old dogs". Download Slackware or Gentoo: [Hidden Content]
  9. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.0 RC1 Re-branded 2.0 to give it a fresh look All documentation has moved to our docs site soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date. so-import-pcap is back! See the so-import-pcap docs here. Fixed issue with so-features-enable Users can now pivot to PCAP from Suricata alerts ISO install now prompts users to create an admin/sudo user instead of using a default account name The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet Fixed issue with disk cleanup Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files Locked down access to certain SSL keys Suricata logs now compress after they roll over Users can now easily customize shard counts per index Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS) Elastic nodes are now “hot” by default, making it easier to add a warm node later so-allow now runs at the end of an install so users can enable access right away Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity: 1-Low / 2-Medium / 3-High / 4-Critical Initial implementation of alerting queues: Low & Medium alerts are accessible through Kibana & Hunt High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis ATT&CK Navigator is now a statically-hosted site in the nginx container Playbook All Sigma rules in the community repo (500+) are now imported and kept up to date Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing) Updated UI Theme Once authenticated through SOC, users can now access Playbook with analyst permissions without login Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS Fixed issue with Wazuh authd registration service port not being correctly exposed Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot) Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from [Hidden Content] Added the ability to use custom Zeek scripts Renamed “master server” to “manager node” Improved unification of Zeek and Strelka file data [hide][Hidden Content]]
  10. qi wang

    Purchase Windows Linux Rat program

    I need to purchase the latest version of the remote management RAT program, The program can run on WINDOWS system, And support the startup of WINDOWS and LINUX systems. Contact ICQ: @YouZone Telegram: @YouZon_e Mail: [email protected]
  11. 8 downloads

    Lali Linux Wireless Pentesting and Security Download Free for Users PRIV8

    $100.00 PRIV8

  12. View File Lali Linux Wireless Pentesting and Security Lali Linux Wireless Pentesting and Security Download Free for Users PRIV8 Submitter dEEpEst Submitted 15/07/20 Category Libro Online Password ********  
  13. Introduction Tool-X is a Kali Linux hacking tools installer for Termux and linux system. Tool-X was developed for Termux and linux based systems. Using Tool-X, you can install almost 370+ hacking tools in Termux (android) and other Linux based distributions. Now Tool-X is available for Ubuntu, Debian etc. Tool-X v2.1 added new tools and lost of new updates. Alpine linux support. [HIDE][Hidden Content]]
  14. Onex “onex a hacking tools library.” Onex is a Kali Linux hacking tools installer for termux and other Linux distribution. It’s package manager for hackers. onex manages large numbers of hacking tools that can be installed on a single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ Kali Linux hacking tools. use onex install [tool_name] command to install any hacking tool. onex works on any of the following operating systems: Android (Using the Termux App) Linux (Linux Based Systems) How to use onex ? CLI Mode : onex -h or onex help for help. Options : onex install [tool_name] install any tool. onex -i [tool_name] install any tool. onex search [tool_name] search any tool. onex -s [tool_name] search any tool. onex list list all tools. onex list -a list all tools. onex -l list all tools. onex -l -a list all tools. onex help get help. onex -h get help. Menu Mode : onex start to start onex menu mode. Enter a Number for a specific output: (1) : To show all available tools and type the number of a tool which you want to install. (2) : To show tools category. (3) : If you want to update onex. (4) : If you want to know About Us. (5) : To exit the tool. [HIDE][Hidden Content]]
  15. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.1 + Kernel upgrade from 5.0.0-27 to 5.4.0-26 + Added FDN DNS + Added Next DNS + Added Cloudflare Family malware and adult content filtering + Added Neustar Family malware and adult content filtering + Added exfat file system support + Added Enigmail plugin for Thunderbird + Added Tilix + Added USBGuard + Added USBKill + Added proxychains + Concky improved new display items like Torrify ip/country and font size + Added MPV player + Added new options to Ip source control and sys logs scripts – Jaxx wallet remove – Exoduse wallet removed – Xelcore wallet removed – Bisq exchange removed – Tox chat removed – Ring chat removed – VLC removed – Full system update – Removed Tenta and Fourth estate DNS / slow and dead – Kodachi browser changes – DuckDuckGo plugin removed – Disable JavaScript removed – BP Privacy Block All Font and Glyph Detection replaced WITH trace – Canvas Defender replaced WITH trace – Canvas Blocker replaced WITH trace – AudioContext Fingerprint Defender replaced WITH trace – Adnauseam added – uBlock Origin replaced WITH Nano Adblocker – CSS Exfil Protection Added – HTTPZ Added – Privacy Badger and Privacy Possum removed – Added Buster – Discord link added – MYKI plugin added – anonymousspeech link added to mails – ctemplar.com link added to mails – restoreprivacy link added to privacy bucket – Added get.webgl.org to Security check to test WebGl – Added WebGL Fingerprint Defender plugin – Public IP Display replaced with My Public IP plugin – Kodachi settings json added to browser ! Fixed VPN <-> Torrify to VPN -> Torrify on screen score status ! Fixed i2p now is working ! Proton VPN moved to location 5 of VPN lists ! Fixed light browser spelling mistake ! Fixed Bisq wrong place on XFCE menu ! Fixed onion sites not working with Kodachi browser ! All scripts have been changed and improved to work with json ! All settings were moved to a single file json ! Casper,dkms and geoip were updated from latest Ubuntu release with kernal [HIDE][Hidden Content]]
  16. BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. BlackArch Linux is an open-source distribution of Linux derived from the lightweight and powerful Arch Linux operating system and designed from the ground up to be used by security professionals for penetration testing tasks. ChangeLog 2020.06.01: added more than 150 new tools disabled iptables/ip6tables service remove unneeded virtualbox services (drag’n’drop, vmsvga-x11) replace wicd with wifi-radar (gui) and wifi-menu (curses -> netctl) updated blackarch-installer to v1.1.45 included linux kernel 5.6.14 QA’ed and fixed a lot of packages (runtime exec, missing dependencies) updated all vim plugins and improved vim config options updated all blackarch tools and packages including config files updated all system packages updated all window manager menus (awesome, fluxbox, openbox) [HIDE][Hidden Content]]
  17. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privac y and anonymity and helps you to: Changelog v7.0 + Kernel upgrade from 5.0.0-27 to 5.4.0-26 + Added FDN DNS + Added Next DNS + Added Cloudflare Family malware and adult content filtering + Added Neustar Family malware and adult content filtering + Added exfat file system support + Added Enigmail plugin for Thunderbird + Added Tilix + Added USBGuard + Added USBKill + Added proxychains + Concky improved new display items like Torrify ip/country and font size + Added MPV player + Added new options to Ip source control and sys logs scripts – Jaxx wallet remove – Exoduse wallet removed – Xelcore wallet removed – Bisq exchange removed – Tox chat removed – Ring chat removed – VLC removed – Full system update – Removed Tenta and Fourth estate DNS / slow and dead – Kodachi browser changes – DuckDuckGo plugin removed – Disable JavaScript removed – BP Privacy Block All Font and Glyph Detection replaced WITH trace – Canvas Defender replaced WITH trace – Canvas Blocker replaced WITH trace – AudioContext Fingerprint Defender replaced WITH trace – Adnauseam added – uBlock Origin replaced WITH Nano Adblocker – CSS Exfil Protection Added – HTTPZ Added – Privacy Badger and Privacy Possum removed – Added Buster – Discord link added – MYKI plugin added – anonymousspeech link added to mails – ctemplar.com link added to mails – restoreprivacy link added to privacy bucket – Added get.webgl.org to Security check to test WebGl – Added WebGL Fingerprint Defender plugin – Public IP Display replaced with My Public IP plugin – Kodachi settings json added to browser ! Fixed VPN <-> Torrify to VPN -> Torrify on screen score status ! Fixed i2p now is working ! Proton VPN moved to location 5 of VPN lists ! Fixed light browser spelling mistake ! Fixed Bisq wrong place on XFCE menu ! Fixed onion sites not working with Kodachi browser ! All scripts have been changed and improved to work with json ! All settings were moved to a single file json ! Casper,dkms and geoip were updated from latest Ubuntu release with kernal [HIDE][Hidden Content]]
  18. itsMe

    Kali Linux 2020.2 Releases

    Kali Linux is a Debian-based distribution for digital forensics and penetration testing, developed and maintained by Offensive Security. Mati Aharoni and Devon Kearns rewrote BackTrack. Kali Linux is the most versatile and advanced penetration testing tool release operating system. Kali tools are often updated and can be used on other platforms, such as VMware and ARM. Changelog KDE Plasma Makeover & Login PowerShell by Default. Kind of. Kali on ARM Improvements Lessons From The Installer Changes New Key Packages & Icons Behind the Scenes, Infrastructure Improvements [HIDE][Hidden Content]]
  19. [+] Disclaimer : NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30 Websites.There are 5 Port Forwarding Options including Localhost !! If you copy then give me the Credits ! [!] I am not Responsible for any Misuse of this tool . Use at your Own Risk [!] [+] Features : [+] Latest Login Pages ! [+] New Instagram Auto Follower Page ! [+] New Port Forwarding Options ! [+] Perfect for All Devices ! [HIDE][Hidden Content]]
  20. Hey guys, long time. Was an official here a while back but life got plans and i ended up getting occupied with it. so was asking a question, is there anyone who can offer links to helpful sites or even a project source for this question? I need to write a loader that loads a linux exe and executes it.It should use a hexdump software as well as mmap for allocating memory. Any help will be greately appreciated. Thanks. Big hello to Top10, Jok3rjok3r and caballo/d33p3st from the times back
  21. Security Onion 16.04.6.5 - Linux distro for intrusion detection, enterprise security monitoring, and log management Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v16.04.6.5 Zeek 3.0.3 Suricata 4.1.7 Elastic 6.8.7 CyberChef 9.18.2 [Hidden Content]
  22. Descripción Descripción del producto Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning About This Book Learn the fundamentals behind commonly used scanning techniques Deploy powerful scanning tools that are integrated into the Kali Linux testing platform A step-by-step guide, full of recipes that will help you use integrated scanning tools in Kali Linux, and develop custom scripts for making new and unique tools of your own Who This Book Is For "Kali Linux Network Scanning Cookbook" is intended for information security professionals and casual security enthusiasts alike. It will provide the foundational principles for the novice reader but will also introduce scripting techniques and in-depth analysis for the more advanced audience. Whether you are brand new to Kali Linux or a seasoned veteran, this book will aid in both understanding and ultimately mastering many of the most powerful and useful scanning techniques in the industry. It is assumed that the reader has some basic security testing experience. What You Will Learn Develop a network-testing environment that can be used to test scanning tools and techniques Understand the underlying principles of network scanning technologies by building custom scripts and tools Perform comprehensive scans to identify listening on TCP and UDP sockets Examine remote services to identify type of service, vendor, and version Evaluate denial of service threats and develop an understanding of how common denial of service attacks are performed Identify distinct vulnerabilities in both web applications and remote services and understand the techniques that are used to exploit them In Detail Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. This immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them. Biografía del autor Justin Hutchens currently works as a security consultant and regularly performs penetration tests and security assessments for a wide range of clients. He previously served in the United States Air Force, where he worked as an intrusion detection specialist, network vulnerability analyst, and malware forensic investigator for a large enterprise network with over 55,000 networked systems. He holds a Bachelor's degree in Information Technology and multiple professional information security certifications, to include Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), eLearnSecurity Web Application Penetration Tester (eWPT), GIAC Certified Incident Handler (GCIH), Certified Network Defense Architect (CNDA), Certified Ethical Hacker (CEH), EC-Council Certified Security Analyst (ECSA), and Computer Hacking Forensic Investigator (CHFI). He is also the writer and producer of Packt Publishing's e-learning video course, Kali Linux - Backtrack Evolved: Assuring Security by Penetration Testing. [Hidden Content]
  23. dEEpEst

    Kali Linux NetHunter

    Kali Linux NetHunter Kali Linux NetHunter is the first open source penetration testing platform for Android-powered Nexus devices and OnePlus One. It supports Wireless 802.11 frame injection, HID keyboard, 1-click MANA Evil Access Point setups, BadUSB MITM attacks. etc. Download: