Search the Community

Showing results for tags 'linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 42 results

  1. sQuoII

    Kali Linux 2019.1 Release

    Kali Linux 2019.1 – Release Notes Welcome to the first release of 2019, Kali Linux 2019.1, which is available for immediate download. This release brings our kernel up to version 4.19.13, fixes numerous bugs, and includes many updated packages. Kali Linux 2019.1 – New Features Tool Upgrades: update of Metasploit to version 5.0, updated packages for theHarvester, DBeaver,etc. ARM Updates: includes the return of Banana Pi and Banana Pro, both of which are on the 4.19 kernel; Veyron has been moved to a 4.19 kernel and the Raspberry Pi images. There are no longer separate Raspberry Pi images for users with TFT LCDs because they now include re4son’s kalipi-tft-config script on all of them, so if you want to set up a board with a TFT, run kalipi-tft-config and follow the prompts. [HIDE][Hidden Content]]
  2. Linux kvm_ioctl_create_device() installs fd before taking reference. View the full article
  3. How to Install a Complete Linux Distro on Android [Hidden Content]
  4. Installing Kali linux on Vps Server [HIDE][Hidden Content]]
  5. [HIDE][Hidden Content]]
  6. [HIDE][Hidden Content]]
  7. It has been discovered that the Linux eBPF Spectre v1 mitigation is insufficient. View the full article
  8. [HIDE][Hidden Content]]
  9. BackBox Linux: Security Assessment and Penetration Testing Distro [HIDE][Hidden Content]] BackBox is fast and easy to use penetration testing and security assessments distribution based on Ubuntu core. With its own software repositories, you’ll have access to all necessary tools (regularly updated), that you need for your pentesting and security analysis tasks, organized in three main categories: auditing, services and anonymous. Features: Lightweight Linux distribution based on Ubuntu (should work well even on the old hardware). Standard Xfce desktop environment. Launchpad repository core, constantly updated to the latest stable version of the most known and used ethical hacking tools. Includes some of the most commonly known/used hacking and security analysis tools (web application analysis, network analysis, stress tests, sniffing, vulnerability assessment, forensic analysis, exploitation tools, etc.). Built-in anonymous mode. Well organized and designed menu, intuitive, friendly and easy to use (also suitable for beginners). You can change/modify it to suit your needs, and install additional tools, thet aren’t present in the repositories. and so much more. System requirements: 32-bit or 64-bit processor 1024 MB of system memory (RAM) 10 GB of disk space for installation Graphics card capable of 800×600 resolution DVD-ROM drive or USB port (3 GB) Some of the BackBox Linux Tools Information Gathering arping arp-scan ike-scan p0f Vulnerability Assessment nikto skipfish Miscellaneous scapy Exploitation BeEF sqlmap msfconsole WPscan Privilege Excalation Xhydra John The Ripper medusa dsniff Ettercap Wireshark arp-spoof dns-spoof
  10. Linux kernel version 4.13 suffers from a compat_get_timex() kernel pointer leak vulnerability. View the full article
  11. 0x1

    Skywave Linux

    Skywave Linux 3.1.1 Released Skywave Linux is an operating system using bleeding-edge technology to robustly access broadcast, utility, military, and amateur radio signals from almost anywhere in the world, including countries with restrictive internet environments. Skywave Linux connects to a large and growing network of state-of-the art software defined radio (SDR) servers, making it possible to experience high performance SDR operation without your own large antennas or on-site radio hardware. All you need to do is boot the system on a computer with internet connectivity. Skywave Linux can also operate numerous types of SDR hardware, plugged in or on the local network. Downloading, installing and configuring SDR software can be difficult for many computer users; Skywave Linux eliminates the hassle by including several applications installed, configured, and ready to run. Video: SDR software is configured for popular devices, such as the RTL-SDR dongles, Softrocks, Hermes, and other radios. Skywave Linux is a 64 bit system built over Ubuntu Linux, and may be installed on a bootable USB stick, SD card, DVD, or hard drive. Features WebSDR, OpenWebRX radio servers accessible via internet browser. HPSDR servers accessible via QtRadio HPSDR hardware also via cudaSDR RTL-SDR plug-and-play functionality via CubicSDR, Gqrx, and QtRadio RTL-SDR ADS-B tracking and mapping via Dump1090 RTL-SDR RDS decoding via Gqrx and Redsea SDRPlay, Airspy radio hardware is supported. LADSPA audio plugins for EQ/Compression/Limiting WSJT -X / WSPR-X weak signal digimode software Weather Satellite Decoding via WXtoImg Satellite tracking with Gpredict Trunked Radio System Reception with SDRTrunk Radio firmware & data management with CHIRP Kodi Media Center for conventional internet streaming Skywave Linux Web Site : [hide][Hidden Content]] Download : [hide][Hidden Content]]
  12. dEEpEst

    livecd BlackArch Linux

    About BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2093 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. For more information, see the installation instructions. Also, news is published on our blog. Please note that BlackArch is a relatively new project. To report bugs and request new tools, please visit the issue tracker on Github. The BlackArch Live ISO contains multiple window managers. Below you will find screenshots of a few of them. Tools The list Information Every package of the BlackArch Linux repository is listed in the following table. If you don't find your needed tool in this list simply open an issue or better do a pull request for the tool you want to be in our repository. We are fast at packaging and releasing tools. Tool count: 2093 BlackArch Linux Complete Tools List Tools:[Hidden Content] Guide: [Hidden Content] Download: [Hidden Content]
  13. M3tr4l14

    Kali linux netbook

    Buenos días compañer@s, saben si correría bien el SO kali linux en una netbook ace aspire one 1.60 1g ram? Por aprender con meterpreter Metasploit, y de no ser posible, se podria usar metasploit en Lubuntu o otra distro en linux? Gracias
  14. Linux kernel version 4.4 rtnetlink stack memory disclosure exploit. View the full article
  15. Linux userfaultfd bypasses tmpfs file permissions. View the full article
  16. Linux Kernel version 4.8 on Ubuntu 16.04 suffers from an sctp kernel pointer leak vulnerability. View the full article
  17. This Metasploit module exploits a vulnerability in Linux kernels 4.15.0 to 4.18.18, and 4.19.0 to 4.19.1, where broken uid/gid mappings between nested user namespaces and kernel uid/gid mappings allow elevation to root (CVE-2018-18955). The target system must have unprivileged user namespaces enabled and the newuidmap and newgidmap helpers installed (from uidmap package). This Metasploit module has been tested successfully on: Fedora Workstation 28 kernel 4.16.3-301.fc28.x86_64; Kubuntu 18.04 LTS kernel 4.15.0-20-generic (x86_64); Linux Mint 19 kernel 4.15.0-20-generic (x86_64); Ubuntu Linux 18.04.1 LTS kernel 4.15.0-20-generic (x86_64). View the full article
  18. 1337day-Exploits

    Exploits Linux Broken UID/GID Mapping

    Linux has a broken uid/gid mapping for nester user namespaces with greater than 5 ranges. View the full article
  19. Linux has an issue where mremap() performs a TLB flush too late with concurrent ftruncate(). View the full article
  20. Linux suffers from an issue with systemd where chown_one() can dereference symlinks. View the full article
  21. 1337day-Exploits

    Exploits Linux systemd Line Splitting

    Linux has an issue with systemd where overlong input to fgets() during reexec state injection can lead to line splitting. View the full article
  22. Linux kernel versions prior to 4.11.8 suffer from an mq_notify: double sock_put() local privilege escalation vulnerability. View the full article
  23. 1337day-Exploits

    Exploits Linux Kernel PTR Leak Via BPF

    The Linux kernel suffers from a ptr leak via BPF due to a broken subtraction check. View the full article
  24. Linux suffers from an integer overflow vulnerability in create_elf_tables(). Multiple exploits provided. View the full article
  25. 1337day-Exploits

    Exploits Linux VMA Use-After-Free

    Linux suffers from a VMA use-after-free vulnerability via a buggy vmacache_flush_all() fastpath. View the full article