Search the Community

Showing results for tags 'linux'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 51 results

  1. The Siemens R3964 line discipline code in drivers/tty/n_r3964.c has a few races around its ioctl handler; for example, the handler for R3964_ENABLE_SIGNALS just allocates and deletes elements in a linked list with zero locking. This code is reachable by an unprivileged user if the line discipline is enabled in the kernel config; Ubuntu 18.04, for example, ships this line discipline as a module. View the full article
  2. 1337day-Exploits

    Exploits Linux Overflow Via FUSE

    Linux suffers from a page->_refcount overflow via FUSE with ~140GiB RAM usage. View the full article
  3. This E-book is for the people who considered as an advance pentester and was wanting to do more pentesting with Kali Linux. Be aware, this book is for advance users so if you are not familiar with Kali Linux for the most part, don't read this ebook (maybe) [HIDE][Hidden Content]]
  4. Linux for Absolute Beginners! Get started with Linux, app development, server configuration, networking, and become a system administrator! Install Linux on their system Feel comfortable using the command line interface Setup an integrated development an environment Install GitHub and setup a repository Develop a web application using Meteor.js Setup a LAMP stack and deploy a web app Manage users on a Linux system Get started as a Linux system administrator! Would you like to get a job in the field of IT? Do you want to become a Linux system administrator but don’t know where to get started? In this course we will begin by covering the very basics of using the Linux operating system, and move on to the advanced system and networking skills necessary to become a Linux administrator! We will cover the following topics in this course: Linux installation Command line usage Development tools including choosing an IDE GitHub setup Complete Meteor.js web project LAMP stack setup and app deployment User management Network administration Enroll now to receive 7.5+ hours of HD video tutorials, lifetime access, and a certificate of completion! This course is fully subtitled in English. If you are not convinced, here are a few of the glowing reviews this course has received. "Course starts out with basic commands and works through more advanced commands as it progresses. The course then goes through add on software and applications following demonstrates basic usages of that application. It was easy to follow along on my personal install of Ubuntu by pausing/review the tutorial as needed. I suggest this method than just sitting and watching the course all the way through. This course is much easier than just reading books. Recommend to friends who just started out in Ubuntu." "Great explanations. Great teacher." "It's still early in the course but I've learned a lot. Great job so far." Thank you for taking the time to read this and we hope to see you in the course! Who is this course for? Students who want to get started using Linux Students interested in learning web development Student who would like to work as a Linux system administrator Introduction to Linux Ubuntu Linux Installation Linux Command Line Interface (CLI) Essentials Advanced CLI Usage Linux Development Tools Meteor.js Project Web Server Setup, Host Configuration, and App Deployment Linux User Management Linux Network Administation [Hidden Content]
  5. Linux Kernel version 4.4 (Ubuntu 16.04) suffers from a snd_timer_user_ccallback() kernel pointer leak vulnerability. View the full article
  6. It was discovered that virtual address 0 is mappable via privileged write() to /proc/*/mem on Linux. View the full article
  7. ToRat A Cross Platform Remote Administration tool written in Go using Tor as its transport mechanism currently supporting Windows, Linux, MacOS clients. Work in Progress... Setup [Hidden Content] Repository The important parts live in Client [Hidden Content] Server [Hidden Content] TLS certificate generator [Hidden Content] Current Features the ToRAT_client communicates over TCP(with TLS) proxied through Tor with the ToRat_server (hidden service) anonymity of client and server end-to-end encryption Cross Platform reverse shell (Windows, Linux, Mac OS) Windows: Multiple User Account Control Bypasses (Privilege escalation) Multiple Persistence methods (User, Admin) optional transport without Tor smaller binary anonymity of client and server embedded Tor Unique persistent ID for every client give a client an Alias all Downloads from client get saved to ./$ID/$filename Server Shell Supports multiple connections Colored Output Tab-Completion of: Commands Files/ Directories in the working directory of the server Command Info select Select client to interact with list list all connected clients alias Select client to give an alias cd change the working directory of the server exit exit the server Shell after selection of a client Tab-Completion of: Commands Files/ Directories in the working directory of the client Command Info cd change the working directory of the client ls list the content of the working directory of the client shred delete files/ directories unrecoverable screen take a Screenshot of the client cat view Textfiles from the client alias give the client a custom alias down download a file from the client up upload a file to the client escape escape a command and run it in a native shell on the client reconnect tell the client to reconnect exit background current session an return to main shell else the command will be executed in a native shell on the client Upcoming Features Persistence and privilege escalation for Linux and Mac OS Support for Android and iOS Cat with support for .docx .pptx .od* .pdf files File-less Persistence on Windows [Hidden Content] ASCII-Art Welcome Message in server shell Download: [Hidden Content]
  8. Linux suffers from out-of-bounds read and write vulnerabilities in the SNMP NAT module. View the full article
  9. @.Root

    Create RAT Kali Linux Method

    [Hidden Content]
  10. itsMe?

    Kali Linux 2019.1 Release

    Kali Linux 2019.1 – Release Notes Welcome to the first release of 2019, Kali Linux 2019.1, which is available for immediate download. This release brings our kernel up to version 4.19.13, fixes numerous bugs, and includes many updated packages. Kali Linux 2019.1 – New Features Tool Upgrades: update of Metasploit to version 5.0, updated packages for theHarvester, DBeaver,etc. ARM Updates: includes the return of Banana Pi and Banana Pro, both of which are on the 4.19 kernel; Veyron has been moved to a 4.19 kernel and the Raspberry Pi images. There are no longer separate Raspberry Pi images for users with TFT LCDs because they now include re4son’s kalipi-tft-config script on all of them, so if you want to set up a board with a TFT, run kalipi-tft-config and follow the prompts. [HIDE][Hidden Content]]
  11. Linux kvm_ioctl_create_device() installs fd before taking reference. View the full article
  12. How to Install a Complete Linux Distro on Android [Hidden Content]
  13. Installing Kali linux on Vps Server [HIDE][Hidden Content]]
  14. [HIDE][Hidden Content]]
  15. [HIDE][Hidden Content]]
  16. It has been discovered that the Linux eBPF Spectre v1 mitigation is insufficient. View the full article
  17. [HIDE][Hidden Content]]
  18. BackBox Linux: Security Assessment and Penetration Testing Distro [HIDE][Hidden Content]] BackBox is fast and easy to use penetration testing and security assessments distribution based on Ubuntu core. With its own software repositories, you’ll have access to all necessary tools (regularly updated), that you need for your pentesting and security analysis tasks, organized in three main categories: auditing, services and anonymous. Features: Lightweight Linux distribution based on Ubuntu (should work well even on the old hardware). Standard Xfce desktop environment. Launchpad repository core, constantly updated to the latest stable version of the most known and used ethical hacking tools. Includes some of the most commonly known/used hacking and security analysis tools (web application analysis, network analysis, stress tests, sniffing, vulnerability assessment, forensic analysis, exploitation tools, etc.). Built-in anonymous mode. Well organized and designed menu, intuitive, friendly and easy to use (also suitable for beginners). You can change/modify it to suit your needs, and install additional tools, thet aren’t present in the repositories. and so much more. System requirements: 32-bit or 64-bit processor 1024 MB of system memory (RAM) 10 GB of disk space for installation Graphics card capable of 800×600 resolution DVD-ROM drive or USB port (3 GB) Some of the BackBox Linux Tools Information Gathering arping arp-scan ike-scan p0f Vulnerability Assessment nikto skipfish Miscellaneous scapy Exploitation BeEF sqlmap msfconsole WPscan Privilege Excalation Xhydra John The Ripper medusa dsniff Ettercap Wireshark arp-spoof dns-spoof
  19. Linux kernel version 4.13 suffers from a compat_get_timex() kernel pointer leak vulnerability. View the full article
  20. 0x1

    Skywave Linux

    Skywave Linux 3.1.1 Released Skywave Linux is an operating system using bleeding-edge technology to robustly access broadcast, utility, military, and amateur radio signals from almost anywhere in the world, including countries with restrictive internet environments. Skywave Linux connects to a large and growing network of state-of-the art software defined radio (SDR) servers, making it possible to experience high performance SDR operation without your own large antennas or on-site radio hardware. All you need to do is boot the system on a computer with internet connectivity. Skywave Linux can also operate numerous types of SDR hardware, plugged in or on the local network. Downloading, installing and configuring SDR software can be difficult for many computer users; Skywave Linux eliminates the hassle by including several applications installed, configured, and ready to run. Video: SDR software is configured for popular devices, such as the RTL-SDR dongles, Softrocks, Hermes, and other radios. Skywave Linux is a 64 bit system built over Ubuntu Linux, and may be installed on a bootable USB stick, SD card, DVD, or hard drive. Features WebSDR, OpenWebRX radio servers accessible via internet browser. HPSDR servers accessible via QtRadio HPSDR hardware also via cudaSDR RTL-SDR plug-and-play functionality via CubicSDR, Gqrx, and QtRadio RTL-SDR ADS-B tracking and mapping via Dump1090 RTL-SDR RDS decoding via Gqrx and Redsea SDRPlay, Airspy radio hardware is supported. LADSPA audio plugins for EQ/Compression/Limiting WSJT -X / WSPR-X weak signal digimode software Weather Satellite Decoding via WXtoImg Satellite tracking with Gpredict Trunked Radio System Reception with SDRTrunk Radio firmware & data management with CHIRP Kodi Media Center for conventional internet streaming Skywave Linux Web Site : [hide][Hidden Content]] Download : [hide][Hidden Content]]
  21. dEEpEst

    livecd BlackArch Linux

    About BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2093 tools. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. For more information, see the installation instructions. Also, news is published on our blog. Please note that BlackArch is a relatively new project. To report bugs and request new tools, please visit the issue tracker on Github. The BlackArch Live ISO contains multiple window managers. Below you will find screenshots of a few of them. Tools The list Information Every package of the BlackArch Linux repository is listed in the following table. If you don't find your needed tool in this list simply open an issue or better do a pull request for the tool you want to be in our repository. We are fast at packaging and releasing tools. Tool count: 2093 BlackArch Linux Complete Tools List Tools:[Hidden Content] Guide: [Hidden Content] Download: [Hidden Content]
  22. M3tr4l14

    Kali linux netbook

    Buenos días compañer@s, saben si correría bien el SO kali linux en una netbook ace aspire one 1.60 1g ram? Por aprender con meterpreter Metasploit, y de no ser posible, se podria usar metasploit en Lubuntu o otra distro en linux? Gracias
  23. Linux kernel version 4.4 rtnetlink stack memory disclosure exploit. View the full article
  24. Linux userfaultfd bypasses tmpfs file permissions. View the full article
  25. Linux Kernel version 4.8 on Ubuntu 16.04 suffers from an sctp kernel pointer leak vulnerability. View the full article