Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      Kali Linux 2020.3 Release

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      Our Most Advanced Penetration Testing Distribution, Ever.

      Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating.

      Kali Linux 2020.3 Release (ZSH, Win-Kex, HiDPI & Bluetooth Arsenal)

      Kali Linux News

      Its that time of year again, time for another Kali Linux release! Quarter #3 – Kali Linux 20202.3. This release has various impressive updates, all of which are ready for immediate download or updating.

      A quick overview of what’s new since the last release in May 2020:

          New Shell – Starting the process to switch from “Bash” to “ZSH“
          The release of “Win-Kex” – Get ready WSL2
          Automating HiDPI support – Easy switching mode
          Tool Icons – Every default tool now has its own unique icon
          Bluetooth Arsenal – New set of tools for Kali NetHunter
          Nokia Support – New devices for Kali NetHunter
          Setup Process – No more missing network repositories and quicker installs


      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Utopia Framework
          Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation.
          Why Utopia Framework
              Simple and clear UX/UI.
          Utopia Framework has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the Utopia Framework.
              A lot of different modules.
          There are a lot of different modules for SSH exploitation in Utopia Frameworks such as ssh_exec_noauth and ssh_shell_noauth.
              Simple SSH exploitation.
          Utopia Framework makes mastering Linux SSH exploitation very easily.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.

          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.2 RC3
              First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools.
              Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include:
               
                  Filtering the hunt query
                  Pivot to PCAP
                  Create an alert in TheHive
                  Google search for the value
                  Analyze the value on VirusTotal.com
              Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer!

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.
          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.0 RC1
              Re-branded 2.0 to give it a fresh look
              All documentation has moved to our docs site
              soup is alive! Note: This tool only updates Security Onion components. Please use the built-in OS update process to keep the OS and other components up to date.
              so-import-pcap is back! See the so-import-pcap docs here.
              Fixed issue with so-features-enable
              Users can now pivot to PCAP from Suricata alerts
              ISO install now prompts users to create an admin/sudo user instead of using a default account name
              The web email & password set during setup is now used to create the initial accounts for TheHive, Cortex, and Fleet
              Fixed issue with disk cleanup
              Changed the default permissions for /opt/so to keep non-priviledged users from accessing salt and related files
              Locked down access to certain SSL keys
              Suricata logs now compress after they roll over
              Users can now easily customize shard counts per index
              Improved Elastic ingest parsers including Windows event logs and Sysmon logs shipped with WinLogbeat and Osquery (ECS)
              Elastic nodes are now “hot” by default, making it easier to add a warm node later
              so-allow now runs at the end of an install so users can enable access right away
              Alert severities across Wazuh, Suricata and Playbook (Sigma) have been standardized and copied to event.severity:
              1-Low / 2-Medium / 3-High / 4-Critical
              Initial implementation of alerting queues:
                  Low & Medium alerts are accessible through Kibana & Hunt
                  High & Critical alerts are accessible through Kibana, Hunt and sent to TheHive for immediate analysis
              ATT&CK Navigator is now a statically-hosted site in the nginx container
              Playbook
                  All Sigma rules in the community repo (500+) are now imported and kept up to date
                  Initial implementation of automated testing when a Play’s detection logic has been edited (i.e., Unit Testing)
                  Updated UI Theme
                  Once authenticated through SOC, users can now access Playbook with analyst permissions without login
              Kolide Launcher has been updated to include the ability to pass arbitrary flags – new functionality sponsored by SOS
              Fixed issue with Wazuh authd registration service port not being correctly exposed
              Added option for exposure of Elasticsearch REST API (port 9200) to so-allow for easier external querying/integration with other tools
              Added option to so-allow for external Strelka file uploads (e.g., via strelka-fileshot)
              Added default YARA rules for Strelka – default rules are maintained by Florian Roth and pulled from https://github.com/Neo23x0/signature-base
              Added the ability to use custom Zeek scripts
              Renamed “master server” to “manager node”
              Improved unification of Zeek and Strelka file data


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By qi wang
          I need to purchase the latest version of the remote management RAT program,
          The program can run on WINDOWS system,
          And support the startup of WINDOWS and LINUX systems.
          Contact ICQ: @YouZone
          Telegram: @YouZon_e
          Mail: [email protected]
        • By dEEpEst
          Lali Linux Wireless Pentesting and Security
          Download Free for Users PRIV8