Search the Community

Showing results for tags 'linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 138 results

  1. Learn to use Linux comfortably What you'll learn Basic Linux Command Intermediate Linux Command About Flie Permissions About Disk management Networking on Linux Sofware Management System Administration Bash Shell Scripting Create A Project Requirements Nothing about Linux Computer Basic Knowledge Internet access Description Linux is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged in a Linux distribution. Installing and using Linux on your system is the easiest way to avoid viruses and malware. ... However, users can install ClamAV antivirus software in Linux to further secure their systems. The reason for this higher level of security is that since Linux is open-source software, the source code is available for review Linux plays an incredibly important part in the job of cybersecurity professional. Specialized Linux distributions such as Kali Linux are used by cybersecurity professionals to perform in-depth penetration testing and vulnerability assessments, as well as provide forensic analysis after a security breach. What will students learn in your course? Basic Linux Command Intermediate Linux Command About Flie Permissions About Disk management Networking on Linux Sofware Management System Administration Bash Shell Scripting Create A Project Are there any course requirements or prerequisites? Nothing about Linux Computer Basic Knowledge Internet access Who are your target students? Learn to use Linux comfortably Create a project with Linux operating system It's hard to say, but I have a feeling Linux isn't going anywhere, at least not in the foreseeable future: The server industry is evolving, but it's been doing so forever. ... Linux still has a relatively low market share in consumer markets, dwarfed by Windows and OS X. This will not change anytime soon. Linux professionals are well-positioned in the job market, with 44% of hiring managers saying there is high possibility for them to hire a candidate with Linux certification, and 54% expecting either certification or formal training of their system admin candidates. ... Systems Administration. The Linux job market is very hot right now, particularly for those with system administration skills. Everybody is looking for Linux talent. Recruiters are knocking down the doors of anybody with Linux experience as the demand for Linux professionals is increasing day by day. Who this course is for: Learn to use Linux comfortably Create a project with Linux operating system [Hidden Content] [hide][Hidden Content]]
  2. What you'll learn Ethical Hacking Kali Linux Information Gathering Vulnerability Analysis Web Application Analysis Exploiting Vulnerabilities DNS Analysis IDS and IPS Detection Live Host Identification Network and Port Scanners OSSINT Enum4Linux Dmitry Recon-ng Sparta Nikto Unix-privsec-check Wpscan Burp Suite Wfuzz Commix Sqlmap Metasploit nmap Requirements A basic understanding of Linux Description Learn ethical hacking through Kali Linux, one of the leading Computer Security operating systems! In this course, you will learn how to gather information, detect vulnerabilities, and exploit them using tools in Kali Linux. This course will give you all of the tools you need to be able to test your own servers and applications for vulnerabilities. Computer Security is one of the fastest-growing fields in tech, and ethical hacking is one of the best skills to learn in the field. With a new attack being completed every 39 seconds, it is essential that security experts are equipped with the most powerful tools for the job. The tools in Kali Linux are commonly used by attackers and defenders to help secure their systems. Learning these tools will allow you to secure your system before the attackers get to it! You will learn: DNS Analysis IDS and IPS Detection Live Host Identification nmap OSSINT Enum4Linux Dmitry Recon-ng Sparta Nikto Unix-privesc-check wpscan Burp Suite wfuzz commix Sqlmap Metasploit You will learn how to exploit common vulnerabilities in Linux and Windows, as well as how to find common vulnerabilities in web apps such as command injections, and SQL injections. I am currently working in the Computer Security field, which means that I am knowledgable in the most current attacks and tools used in the field. I have worked on many large projects which involve discovering vulnerabilities, so most of my work is focused on the detection and research of vulnerabilities in live, in-market applications. I will show you how to use Kali Linux to be able to detect these types of vulnerabilities in your live applications. Don't get hacked, learn Kali Linux today, and gain a set of skills that will add major value to your career! Who this course is for: Computer users who look to expand their understanding of ethical hacking and computer security [Hidden Content] [hide][Hidden Content]]
  3. What you'll learn you will understand the fundamentals of the Linux operating system and be able to apply that knowledge in a practical and useful manner Requirements Any Linux distribution installed on your computer ( even on a virtual machine) Description Become a real Linux user and advance your Career. Learning the Linux Command Line will take you FAR! Learn to appreciate the power of the Linux command line Understand the structure of the Linux File System. Knowledge of the Linux command line is critical for anyone who uses this open-source operating system. For many tasks, it's more efficient and flexible than a graphical environment. For administrators, it plays a vital role in configuring permissions and working with files. In this course discusses the basics of working with the Linux command line using the Bash shell, focusing on practical Linux commands with examples that help you navigate through the file and folder structure, edit text, and set permissions and also learn some of the common command-line tools, such as grep, awk, and sed, and command-line apps such as the nano and Vim text editors. The course wraps up with a look at how to install and update software with a package manager. The following topics are included. · What is the Linux command line? · Writing Linux commands at the prompt · Finding help for Linux commands · Copying, moving, and deleting files and folders · Configuring user roles and file permissions · Using pipes to connect commands · Searching and editing text · Finding system hardware and disk information · Installing and updating software Linux backup How to backup Linux using DD with hands On How to use Rsync with lot of examples. How to setup OWNCLOUD Introduction initial server setup for Centos 7 Install Linux, Apache, MySQL, PHP (LAMP) stack On CentOS 7 Install and Configure ownCloud on CentOS 7 Who this course is for: anyone who wants to get started with Linux. existing Linux users or learners who wants to be effective at using the Linux command Line. windows or mac users who wants to migrate to Linux but are afraid to make the move ! aspiring Linux system administrators [Hidden Content] [hide][Hidden Content]]
  4. Please read This project was made to demonstrate how easy ransomware are easy to make and how it work. The script works on Windows, Linux and MacOS. It is recommended to compile payload.py to EXE format to make it more portable. I do work on security awareness trainings and test the IT security and safety for other companies and you guessed it; this was made for the demo section of my presentation, NOT TO EARN MONEY OR BRICK PEOPLES COMPUTERS. This script does not get detected by any anti-virusses. Self made scripts go undetected 99% of the time. It's easy to write something nasty like ransomware, adware, malware, you name it. Again, this script was for research only. Not ment to be used in the open world. I am not responsible for any damage you may cause with this knowledge. I recommend using a VPN that allows port forwarding (For example; PIA VPN) when using this outside your network, or better, a cloud computer hosted elsewhere, like Amazon AWS. The conclusion of this project is that it is easy to brick a system and earn money doing it. This script doesn't use any exploits to achieve its goal, but can easily be coded into it as a nice feature. Features Generate a ransomware payload With or without GUI payload FUD (Fully Undetectable by Anti-Virus) Works on Windows, MacOS and Linux Super fast encryption with PyCrypto Compile to EXE, APP or Unix/Linux executable Custom icon for your EXE payload Receive keys of victims Decrypt files Demo mode (payload won't encrypt anything) Fullscreen mode (Warning takes over the screen) Custom warning message for your victim Custom image in your payload Ghost mode (Rename by adding .DEMON extention instead of encrypting the files) Multiple encryption methods Select file extentions to target Decide if payload should self-destruct (Console mode feature only) Decide wich drive to target for encryption (working directory) Verified server access through port forwarding VPN Encode payload as Morse code [hide][Hidden Content]]
  5. Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.3.30 Zeek is now at version 3.0.13. CyberChef is now at version 9.27.2. Elastic components are now at version 7.10.2. This is the last version that uses the Apache license. Suricata is now at version 6.0.1. Salt is now at version 3002.5. Suricata metadata parsing is now vastly improved. If you choose Suricata for metadata parsing, it will now extract files from the network and send them to Strelka. You can add additional mime types here: [Hidden Content] It is now possible to filter Suricata events from being written to the logs. This is a new Suricata 6 feature. We have included some examples here: [Hidden Content] The Kratos docker container will now perform DNS lookups locally before reaching out to the network DNS provider. Network configuration is now more compatible with manually configured OpenVPN or Wireguard VPN interfaces. so-sensor-clean will no longer spawn multiple instances. Suricata eve.json logs will now be cleaned up after 7 days. This can be changed via the pillar setting. Fixed a security issue where the backup directory had improper file permissions. The automated backup script on the manager now backs up all keys along with the salt configurations. Backup retention is now set to 7 days. Strelka logs are now being rotated properly. Elastalert can now be customized via a pillar. Introduced new script so-monitor-add that allows the user to easily add interfaces to the bond for monitoring. Setup now validates all user input fields to give up-front feedback if an entered value is invalid. There have been several changes to improve install reliability. Many install steps have had their validation processes reworked to ensure that required tasks have been completed before moving on to the next step of the install. Users are now warned if they try to set “securityonion” as their hostname. The ISO should now identify xvda and nvme devices as install targets. At the end of the first stage of the ISO setup, the ISO device should properly unmount and eject. The text selection of choosing Suricata vs Zeek for metadata is now more descriptive. The logic for properly setting the LOG_SIZE_LIMIT variable has been improved. When installing on Ubuntu, Setup will now wait for cloud init to complete before trying to start the install of packages. The firewall state runs considerably faster now. ICMP timestamps are now disabled. Copyright dates on all Security Onion specific files have been updated. so-tcpreplay (and indirectly so-test) should now work properly. The Zeek packet loss script is now more accurate. Grafana now includes an estimated EPS graph for events ingested on the manager. Updated Elastalert to release 0.2.4-alt2 based on the [Hidden Content] alt branch. Pivots from Alerts/Hunts to action links will properly URI encode values. Hunt timeline graph will properly scale the data point interval based on the search date range. Grid interface will properly show “Search” as the node type instead of “so-node”. Import node now supports airgap environments. The so-mysql container will now show “healthy” when viewing the docker ps output. The Soctopus configuration now uses private IPs instead of public IPs, allowing network communications to succeed within the grid. The Correlate action in Hunt now groups the OR filters together to ensure subsequent user-added filters are correctly ANDed to the entire OR group. Add support to so-firewall script to display existing port groups and host groups. Hive init during Setup will now properly check for a running ES instance and will retry connectivity checks to TheHive before proceeding. Changes to the .security analyzer yields more accurate query results when using Playbook. Several Hunt queries have been updated. The pfSense firewall log parser has been updated to improve compatibility. Kibana dashboard hyperlinks have been updated for faster navigation. Added a new so-rule script to make it easier to disable, enable, and modify SIDs. ISO now gives the option to just configure the network during setup. [hide][Hidden Content]]
  6. itsMe

    Introduction to Linux

    Description With so many technical terms, cultural quirks, and options to pursue, getting started with Linux can seem overwhelming. In this course, instructor Scott Simpson covers the fundamentals of what you need to know in order to make smart choices about learning Linux. Scott discusses the Linux kernel, the software that allows you to interact with a computer’s hardware. He explains desktop environments, text-based terminal interfaces, and standard tools that are used on a Linux system. Scott goes over where different types of files are stored on Linux systems. He offers tips on choosing which Linux distribution, or distro, to use and helps you plan your Linux system. Scott shows you how to direct your strategy for learning Linux, then gives some tips on how to find answers and ask for help. Released 2/9/2021 [hide][Hidden Content]]
  7. Our Most Advanced Penetration Testing Distribution, Ever. Kali Linux (Former BackTrack) – The program contains a vast array of hacker tools and utilities (password attacks, sniffing and spoofing, reverse engineering, …). Hacking foreign WiFi/WLAN (wireless attacks) and more. Kali is designed for digital forensics and penetration testing. Kali is preinstalled with numerous penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), and Aircrack-ng (a software suite for penetration-testing wireless LANs). Kali can be run from a hard disk, live DVD, or live USB. The most advanced penetrating testing distribution, ever. Kali, the most advanced and versatile penetration testing distribution ever created. Kali has grown far beyond its humble roots as a live DVD and has now become a full-fledged operating system. Note: Kali is Linux based, but suitable for all Windows versions. [hide][Hidden Content]]
  8. English | November 4, 2019 | ISBN: 1705492703 | 177 pages | Rar (PDF, AZW3) | 5.10 MB Do you want to learn about how to hack using Kali Linux within a short time span? Do you want to learn about how to perform an actual attack and become a professional hacker? This handbook will suit your needs, and you will not only learn about Hacking Tools for Computers, but you will also be accorded some guidance on how you can successfully launch your first attack using Kali Linux. By gaining some insight into Hacking Tools for Computers through this handbook, you will also realize that you have saved on time and other resources, depending on your learning needs. [Hidden Content] [hide][Hidden Content]]
  9. BlueEagle jRAT V1.5 [Windows RAT / Linux RAT / MAC RAT] [Windows RAT] [Linux RAT] [MAC RAT] Ver 1.5 Updated for hacking android , the apk Builder is standlone in zip file provided This is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully programmed in java be a user friendly and easy to use and builds out trojans (.jar) and controls the victims running those trojans on same port at same time ,this tool is fully in java (Client & Server in java) and this tool is now registerd to be free , and on the user responsibility 🏳 This is For Educational Purposes Only ! and User is responsible for his usage of this Tool For Example : Parental Control , Track what your children are doing. Business Administration , Monitor what employees are doing. School/Institutions , for students Personal Control and File Backup , Make sure no one is using your computer when you are away. Other Noble Purposes Default logins : admin , admin [hide][Hidden Content]]
  10. itsMe

    Linux for Beginners

    What you'll learn Linux Command Line Linux Bash Shell Create and manage new directories and files Getting information about hardware and software of the Linux computer Create new users and change user passwords Searching for files and folders using Find command Compressing and sorting in Linux Files and directories permissions and modification of the permissions Creating and executing executable files Networking in Linux Environment variables access and creation of the new environment variables Access of the remote Linux computer via SS Course content 12 sections • 61 lectures • 5h 41m total length Requirements Just basic Computer knowledge Desire to learn core Linux features Get familiar with Linux Shells like Bash and Sh Description This course is all about Linux and Linux Shell. Understand HOW Linux works and learn mostly used core Linux features from basic commands till creation of the Linux scripts. And all features we will use ONLY in Shell, without any GUIs. If you want to learn how to manage users, manage and search files and directories, set correct permissions, compress and uncompress archives, verify network connectivity and connect to remote servers via SSH - this course is for you. Become a master of the Linux Shells like Bash or Sh. This is practical Linux course that includes tons of practical activities. The best way to learn is learn by doing. You can have zero knowledge about Linux. All will be taught from scratch, from basic to advanced features. If you want to get deep practical knowledge of Linux this course is for you! We will start by installing Docker and creating Linux container. You are right! We will use Docker because using Docker you could create any Linux computer in a matter of seconds on any platform - MacOS, Windows or other Linux computer. In practice sections you will perform multiple practice Linux activities: Create new directories and files in the Shell using commands mkdir, touch and cat Manage users using adduser, useradd and passwd commands, login under different users Change permissions of the files and directories using chmod command Create and execute executable scripts from the Shell Compress and uncompress files and directories using gzip and tar utilities Verify network settings and connectivity with remote servers using such commands as ifconfig, nslookup, ping and traceroute Downloading files from the remote servers using curl and wget Connection to remote servers via SSH To summarise, you will learn following core blocks of the Linux systems: - Linux networking - Permissions - Scripting - Creation and deletion of the files and directories - Movement and renaming of the files and directories Who this course is for: Software developers Network engineers DevOps engineers [Hidden Content] [hide][Hidden Content]]
  11. The purpose of Linux Mint is to produce a modern, elegant and comfortable operating system which is both powerful and easy to use. Linux Mint is one of the most popular desktop Linux distributions and used by millions of people. Some of the reasons for the success of Linux Mint are: It works out of the box, with full multimedia support and is extremely easy to use. It's both free of cost and open source. It's community-driven. Users are encouraged to send feedback to the project so that their ideas can be used to improve Linux Mint. Based on Debian and Ubuntu, it provides about 30,000 packages and one of the best software managers. It's safe and reliable. Thanks to a conservative approach to software updates, a unique Update Manager and the robustness of its Linux architecture, Linux Mint requires very little maintenance (no regressions, no antivirus, no anti-spyware...etc). Linux Mint 20 Ulyana Cinnamon Edition MATE Edition Xfce Edition [hide][Hidden Content]]
  12. itsMe

    Simple Combo Editor For Linux

    Features Delete Passwords (For Maillists/Leads) Delete Emails (For Wordlists/Passlists) Remove Duplicates (Sort & Removes Duplicates) Generate Keywords (Generate English Usual Keywords) Combine Combos (Combine Splitted Combos) Split Combos (If You Have A Big Combo You Can Split It) Extract USER:PASS (For Username & Password Logins, Such As Instagram) USER:PASS to PASS:USER (For Whatever Reason, To Make Extract HQ Wordlists) Soft & Hard Randomize Combos (Shuffling Combos - Means It Randomize The Lines) Sort Domains (Domains Sorter - I Added Over 1mio.) Extract Creditcard Data (For Carding Purpose) [hide][Hidden Content]]
  13. Security Onion 2.3.21 - Linux distro for intrusion detection, enterprise security monitoring, and log management Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.3.21 soup has been refactored. You will need to run it a few times to get all the changes properly. We are working on making this even easier for future releases. soup now has awareness of Elastic Features and now downloads the appropriate Docker containers. The Sensors interface has been renamed to Grid. This interface now includes all Security Onion nodes. Grid interface now includes the status of the node. The status currently shows either Online (blue) or Offline (orange). If a node does not check-in on time then it will be marked as Offline. Grid interface now includes the IP and Role of each node in the grid. Grid interface includes a new Filter search input to filter the visible list of grid nodes to a desired subset. As an example, typing in “sensor” will hide all nodes except those that behave as a sensor. The Grid description field can now be customized via the local minion pillar file for each node. SOC will now draw attention to an unhealthy situation within the grid or with the connection between the user’s browser and the manager node. For example, when the Grid has at least one Offline node the SOC interface will show an exclamation mark in front of the browser tab’s title and an exclamation mark next to the Grid menu option in SOC. Additionally, the favicon will show an orange marker in the top-right corner (dynamic favicons not supported in Safari). Additionally, if the user’s web browser is unable to communicate with the manager the unhealth indicators appear along with a message at the top of SOC that states there is a connection problem. Docker has been upgraded to the latest version. Docker should be more reliable now as Salt is now managing daemon.json. You can now install Elastic in a traditional cluster. When setting up the manager select Advanced and follow the prompts. Replicas are controlled in global.sls. You can now use Hot and Warm routing with Elastic in a traditional cluster. You can change the box.type in the minion’s sls file. You will need to create a curator job to re-tag the indexes based on your criteria. Telegraf has been updated to version 1.16.3. Grafana has been updated to 7.3.4 to resolve some XSS vulnerabilities. Grafana graphs have been changed to graphs vs guages so alerting can be set up. Grafana is now completely pillarized, allowing users to customize alerts and making it customizable for email, Slack, etc. See the docs here: [Hidden Content] Yara rules now should properly install on non-airgap installs. Previously, users had to wait for an automated job to place them in the correct location. Strelka backend will not stop itself any more. Previously, its behavior was to shut itself down after fifteen minutes and wait for Salt to restart it to look for work before shutting down again. Strelka daily rule updates are now logged to /nsm/strelka/log/yara-update.log Several changes to the setup script to improve install reliability. Airgap now supports the import node type. Custom Zeek file extraction values in the pillar now work properly. TheHive has been updated to support Elastic 7. Cortex image now includes whois package to correct an issue with the CERTatPassiveDNS analyzer. Hunt and Alert quick action menu has been refactored into submenus. New clipboard quick actions now allow for copying fields or entire events to the clipboard. PCAP Add Job form now retains previous job details for quickly adding additional jobs. A new Clear button now exists at the bottom of this form to clear out these fields and forget the previous job details. PCAP Add Job form now allows users to perform arbitrary PCAP lookups of imported PCAP data (data imported via the so-import-pcap script). Downloads page now allows direct download of Wazuh agents for Linux, Mac, and Windows from the manager, and shows the version of Wazuh and Elastic installed with Security Onion. PCAP job interface now shows additional job filter criteria when expanding the job filter details. Upgraded authentication backend to Kratos 0.5.5. SOC tables with the “Rows per Page” dropdown no longer show truncated page counts. Several Hunt errors are now more descriptive, particularly those around malformed queries. SOC Error banner has been improved to avoid showing raw HTML syntax, making connection and server-side errors more readable. Hunt and Alerts interfaces will now allow pivoting to PCAP from a group of results if the grouped results contain a network.community_id field. New “Correlate” quick action will pivot to a new Hunt search for all events that can be correlated by at least one of various event IDs. Fixed bug that caused some Hunt queries to not group correctly without a .keyword suffix. This has been corrected so that the .keyword suffix is no longer necessary on those groupby terms. Fixed issue where PCAP interface loses formatting and color coding when opening multiple PCAP tabs. Alerts interface now has a Refresh button that allows users to refresh the current alerts view without refreshing the entire SOC application. Hunt and Alerts interfaces now have an auto-refresh dropdown that will automatically refresh the current view at the selected frequency. The so-elastalert-test script has been refactored to work with Security Onion 2.3. The included Logstash image now includes Kafka plugins. Wazuh agent registration process has been improved to support slower hardware and networks. An Elasticsearch ingest pipeline has been added for suricata.ftp_data. Elasticsearch’s indices.query.bool.max_clause_count value has been increased to accommodate a slightly larger number of fields (1024 -> 1500) when querying using a wildcard. On nodes being added to an existing grid, setup will compare the version currently being installed to the manager (>=2.3.20), pull the correct Security Onion version from the manager if there is a mismatch, and run that version. Setup will gather any errors found during a failed install into /root/errors.log for easy copy/paste and debugging. Selecting Suricata as the metadata engine no longer results in the install failing. so-rule-update now accepts arguments to idstools. For example, so-rule-update -f will force idstools to pull rules, ignoring the default 15-minute pull limit. [hide][Hidden Content]]
  14. itsMe

    Demon Linux v2.11.23

    Demon Linux is a penetration testing custom Debian distribution packaged as an ISO file. This ISO file is intended to be used in VMWare and can be used LIVE with RAM/Squash FS, or you can run the installer and install it to a virtual disk. [hide][Hidden Content]]
  15. Linux evil toolkit is a framework that aims to centralize, standardize, and simplify the use of various security tools for pentest professionals. LETK has few simple commands, one of which is the INIT that allows you to define a target, and thus use all the tools without typing anything else. Is LETK better than setoolkit? Yes and no, there are two that serve the same thing and in a different way, the LETK and an automated attack information automation script. § 1 About use This script was made to automate the steps of gathering information about web targets, the misuse, and the responsibility of the user, to report bugs or make suggestions open a report on github. § 2 About simple_scan Automap was replaced by simple_scan, it is lighter and faster, in addition to being less detectable, now it has different modes of execution that make it possible from a quick and simple execution to more complex modes. § 3 About Console The output of the script can be extremely long, so see if your console, (gnome-terminal, cmd, konsole) is configured to display 1000 lines (I particularly recommend 10,000 lines), for professional purposes it allows the documentation, it records the commands, exits, and formats the text. Changelog v4.7.9 code review code style review update fakedump update Readme fixing many small bugs fixing dependencies update install-module. but not work [hide][Hidden Content]]
  16. itsMe

    Kali Linux 2020.4 Release

    We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the release of Kali Linux 2020.4, which is ready for immediate download or updating. What’s different with this release since 2020.3 in August 2020 is: ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default. Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH. Partnership with tools authors – We are teaming up with byt3bl33d3r. Message at login – Proactively pointing users to resources. AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL. Packaging Guides – Want to start getting your tool inside of Kali? This should help. New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default. NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk. Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices Vagrant & VMware – We now support VMware users who use Vagrant. [hide][Hidden Content]]
  17. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.4 Based on: Xbuntu 18.04.5 LTS Kernel: 5.9.1 System: 64bit Release date: 23.10.2020 Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare Code name: Stable + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23 + Firefox + Signal + Tor browser update + Added new information on panic room system information [hide][Hidden Content]]
  18. Utopia Framework Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation. Why Utopia Framework Simple and clear UX/UI. Utopia Framework has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the Utopia Framework. A lot of different modules. There are a lot of different modules for SSH exploitation in Utopia Frameworks such as ssh_exec_noauth and ssh_shell_noauth. Simple SSH exploitation. Utopia Framework makes mastering Linux SSH exploitation very easily. [hide][Hidden Content]]
  19. Security Onion Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes! Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack. Core Components Logstash – Parse and format logs. Elasticsearch – Ingest and index logs. Kibana – Visualize ingested log data. Auxiliary Components Curator – Manage indices through scheduled maintenance. ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information. FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc. DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc. Changelog v2.2 RC3 First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools. Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include: Filtering the hunt query Pivot to PCAP Create an alert in TheHive Google search for the value Analyze the value on VirusTotal.com Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer! [hide][Hidden Content]]
  20. ☠xrahitel☠

    Cross - platform Rat (Win,Linux,MAC)

    this is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT] [Linux RAT] [MAC RAT] } which is fully programmed in java be a user friendly and easy to use and builds out trojans (.jar) and controls the victims running those trojans on same port at same time ,this tool is fully in java (Client & Server in java) and this tool is now registerd to be free , and on the user responsibility [Hidden Content]
  21. itsMe

    Kali Linux 2020.3 Release

    Our Most Advanced Penetration Testing Distribution, Ever. Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating. Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal) Kali Linux News Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating. A quick overview of what’s new since the last release in May 2020: New Shell – Starting the process to switch from “Bash” to “ZSH“ The release of “Win-Kex” – Get ready WSL2 Automating HiDPI support – Easy switching mode Tool Icons – Every default tool now has its own unique icon Bluetooth Arsenal – New set of tools for Kali NetHunter Nokia Support – New devices for Kali NetHunter Setup Process – No more missing network repositories and quicker installs [hide][Hidden Content]]
  22. English | 2020 | ISBN: 1484260340 | 386 Pages | True PDF, EPUB | 38 MB Learn command line tricks, programs, and hacks you can use day to day as a Linux user, programmer, and system administrator. When you interact with the digital world, you can’t go far without interacting with Linux systems. This book shows you how to leverage its power to serve your needs. Many users know “top” is installed on almost all Linux machines, but did you know with a few keystrokes you can customize it specifically for your needs? Stuck using `cd` and `ls` commands for navigating file systems? This book looks at how you can use Ranger to quickly navigate through multiple levels of folders, and quickly run bash commands without ever leaving the terminal. We also suggest programs that can be used for common tasks such as finding which programs are using the most processing, data download/upload, and file space. You’ll know how to quickly connect to remote machines and run your commonly needed jobs in a keystroke or even on auto-pilot. With Basic Linux Terminal Tips and Tricks you’ll be equipped with a wide range of tools that can be used for daily work and maintenance on all sorts of Linux systems including servers, desktops, and even embedded devices. What You Will Learn Work with common tools on your local network. Techniques for efficient use of command line. Easily manipulate text files for processing. Monitor the state of a system with a handful of popular programs. Combine programs to create useful processes. [hide][Hidden Content]]
  23. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure. Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out. Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to: Use the Internet anonymously. All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption. Leave no trace on the computer you are using unless you ask it explicitly. Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique. Changelog v7.2 + Kernel upgrade from 5.4.0-33 to 5.4.0-42 + Full system update + Added session messenger ( One of the best secure messengers) + Added Steghide-GUI now you can hide your text messages encrypted in jpg or wav ..etc files! + Added pci=noaer to grup options for error prevention + Few icons changes + Threema web added to bookmarks ! Conky improved and refresh timer reduced ! Yandex DNS moved to lower position ! Fixed bandwidth message length issue ! Fixed onions share update issue – Replaced Kodachi browser ip lookup plugin – Replaced Riot with Element [hide][Hidden Content]]
  24. It is possible that if you want to mount your own server, whatever the type, you need some recommendations from some distributions that may be better for this purpose. Every server operating system should have a series of qualities such as easy administration, so as not to complicate life for sysadmins, as well as robustness, stability, and security. In short, a simple operating system in terms of administration and that is as reliable as possible to keep the server always operational (or as long as possible). And the truth is that, although many GNU / Linux distros could be worth it, there are some especially good ones. Here is a list of some ideal GNU / Linux distros for servers: Debian: It is one of the most wonderful, secure, robust and stable distributions that exist. In addition, there is a great community behind, you have a lot of help and tutorials if something gets complicated, a multitude of packages, etc. That is, everything that is requested for an OS for a server. Download Debían: [Hidden Content] CentOS: If you don't like DEB-based, then you have another great option which is CentOS. A derivative of RHEL maintained by the community and with equally remarkable qualities such as security, robustness, and stability. It should be noted that it has SELinux by default, instead of Debian's AppArmor, which can make its administration somewhat more complicated. Download CentOS: [Hidden Content] Ubuntu Server: Based on Debian, it shares many of its features. But this Canonical distro has been "refined" and could present some comforts. In addition, being the most used distro you will find a lot of help online in case you get lost at any time. That together with performance, scalability, stability and security, make it another one of the best options. Download Ubuntu: [Hidden Content] RHEL: Red Hat's is another of the great distros specially designed for business environments. It is no coincidence that many large data centers use it. As with many distros, it works not only on x86, but also on ARM and even on IBM z machines. Download RHEL (Red Hat Enterprise Linux): [Hidden Content] SUSE Linux Enterprise: it is the alternative to the previous one and very similar in many things. In the case of the German SUSE, it is also specially designed for business environments. It is also based on RPM packages like RHEL, but it can have some advantages in terms of ease of administration, especially with YaST2. Also, use AppArmor instead of SELinux like RHEL, which can make things easier in terms of security management. Of course, like RHEL, it is perfect for containers and the cloud. It will also work on x86, ARM and IBM z, among others. Includes integrated services like SAP HANA. Download SLES (SUSE Linux Enterprise Server): [Hidden Content] Oracle Linux: another alternative, in this case from Oracle. It is specially designed for data centers and has great security. Download Oracle Linux: [Hidden Content] ClearOS: RHEL / CentOS derived system built by ClearFoundation for the ClearCenter market. A fairly good commercial distro for small and medium-sized businesses, flexible and with a web-based interface for easy administration. Download ClearOS: [Hidden Content] Arch Linux: if you like strong emotions, you will have simplicity (not simplicity), flexibility and unmatched power at your fingertips customizing your ideal system with the Arch project. That is not the most suitable for beginners ... The good thing is who has a wiki that is beyond wonderful for help. Download Arch Linux: [Hidden Content] CoreOS: It is a project that we have talked about in LxA on several occasions. It is especially interesting if you are interested in working with containers, since it has a whole base designed so that you have everything at your fingertips. Although he has now joined the Red Hat "family". Download CoreOS: [Hidden Content] Bonus (Slackware and Gentoo): two other powerful distros, with great flexibility, stable, safe, robust, and with all that you are looking for in an operating system that you want to be like a rock and that needs less maintenance than a plastic pot ... Those are Gentoo and Slackware. Although, like Arch, it is not suitable for beginners, as they can be complex to manage. They are more intended for "old dogs". Download Slackware or Gentoo: [Hidden Content]