Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Kali Linux 2020.4 Release

      Recommended Posts


      Hidden Content

        Give reaction to this post to see the hidden content.

      We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the release of Kali Linux 2020.4, which is ready for immediate download or updating.

      What’s different with this release since 2020.3 in August 2020 is:

          ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default.
          Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH.
          Partnership with tools authors – We are teaming up with byt3bl33d3r.
          Message at login – Proactively pointing users to resources.
          AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL.
          Packaging Guides – Want to start getting your tool inside of Kali? This should help.
          New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default.
          NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk.
          Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices
          Vagrant & VMware – We now support VMware users who use Vagrant.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post

      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Linux Kodachi operating system is based on Debian 9.5 Xbuntu 18.04 LTS, that it will provide you with a secure, anti-forensic, an anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure.
          Kodachi is very easy to use all you have to do is boot it up on your PC via USB drive then you should have a fully running operating system with an established VPN connection + Tor Connection established + DNScrypt service running. No setup or Linux knowledge is required from your side we do it all for you. The entire OS is functional from your temporary memory RAM so once you shut it down no trace is left behind all your activities are wiped out.
          Kodachi is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity and helps you to:
              Use the Internet anonymously.     All connections to the Internet are forced to go through the VPN then Tor network with DNS encryption.     Leave no trace on the computer you are using unless you ask it explicitly.     Use state-of-the-art cryptographic and privacy tools to encrypt your files, emails and instant messaging. Kodachi is based on the solid Linux Debian with customized XFCE this makes Kodachi stable, secure, and unique.
          Changelog v7.4
              Based on: Xbuntu 18.04.5 LTS
              Kernel: 5.9.1
              System: 64bit
              Release date: 23.10.2020
              Tag: Security is the chief enemy of mortals.! | Tag line by William Shakespeare
              Code name: Stable
              + Kernel upgrade from 5.8.0-23 to 5.9.1 some hardware were not compatible with 5.8.0-23
              + Firefox + Signal + Tor browser update
              + Added new information on panic room system information

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Utopia Framework
          Utopia Framework is a Linux post-exploitation framework that exploits Linux SSH vulnerability to provide a shell-like connection. Utopia Framework can be used to easily master Linux SSH exploitation.
          Why Utopia Framework
              Simple and clear UX/UI.
          Utopia Framework has a simple and clear UX/UI. It is easy to understand and it will be easier for you to master the Utopia Framework.
              A lot of different modules.
          There are a lot of different modules for SSH exploitation in Utopia Frameworks such as ssh_exec_noauth and ssh_shell_noauth.
              Simple SSH exploitation.
          Utopia Framework makes mastering Linux SSH exploitation very easily.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Security Onion
          Security Onion is a free and open source Linux distribution for intrusion detection, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Bro, OSSEC, Sguil, Squert, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!
          Below are several diagrams to represent the current architecture and deployment scenarios for Security Onion on the Elastic Stack.
          Core Components
          Logstash – Parse and format logs.
          Elasticsearch – Ingest and index logs.
          Kibana – Visualize ingested log data.

          Auxiliary Components
          Curator – Manage indices through scheduled maintenance.
          ElastAlert – Query Elasticsearch and alert on user-defined anomalous behavior or other interesting bits of information.
          FreqServer -Detect DGAs and find random file names, script names, process names, service names, workstation names, TLS certificate subjects and issuer subjects, etc.
          DomainStats – Get additional info about a domain by providing additional context, such as creation time, age, reputation, etc.
          Changelog v2.2 RC3
              First, we have a new so-analyst script that will optionally install a GNOME desktop environment, Chromium web browser, NetworkMiner, Wireshark, and many other analyst tools.
              Next, we’ve collapsed Hunt filter icons and action links into a new quick action bar that will appear when you click a field value. Actions include:
                  Filtering the hunt query
                  Pivot to PCAP
                  Create an alert in TheHive
                  Google search for the value
                  Analyze the value on VirusTotal.com
              Finally, we’ve greatly improved support for airgap deployments. There is more work to be done in the next release, but we’re getting closer!

          Hidden Content
          Give reaction to this post to see the hidden content.