• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

linux

  1. dEEpEst

    Android Kali Linux NetHunter for Nexus and OnePlus

    Kali Linux NetHunter Kali Linux NetHunter for Nexus and OnePlus...
  2. 0x1

    TAS

    A tiny framework for easily manipulate the tty and create fake binaries. How it works? The framework has three main functions, tas_execv, tas_forkpty, and tas_tty_loop. tas_execv: It is a function similar to execv, but it doesn't re-execute the current binary, something very useful for...
  3. dEEpEst

    Cracking ZIP/RAR Password With John The Ripper | Kali Linux

    Hidden content
  4. M

    C/C++ Two videos on the bash programming language for automating linux systems

  5. itsMe

    Kali Linux – An Ethical Hacker’s Cookbook, 2nd Edition

    Kali Linux – An Ethical Hacker’s Cookbook, 2nd Edition ($44.99 Value) FREE for a Limited Time Discover end-to-end penetration testing solutions to enhance your ethical hacking skills Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become...
  6. dEEpEst

    Android Termux [Android terminal emulator and Linux environment app]

    Termux Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager. Hidden content Secure. Access remote servers...
  7. dEEpEst

    TBomb v1.7b [SMS/call bomber for Linux And Termux(Android)]

    TBomb v1.7b An open-source SMS/call bomber for Linux And Termux. Note: The script requires working network connection to work. No balance will be deducted for using this script to send SMS/calls. While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum...
  8. itsMe

    BlackArch Linux 2020.01.01

    BlackArch Linux 2020.01.01 Releases: Linux kernel 5.4.6, added more than 120 new tools BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups...
  9. dEEpEst

    Windows Run Linux inside Windows

    Hidden content
  10. M

    Windows Subsystem for Linux x-server

    get x410 from windows app store then create a .bat file start /B x410.exe /desktop kali.exe run "if [ -z \"$(pidof xfce4-session)\" ]; then export DISPLAY=127.0.0.1:0.0; xfwm4& xfce4-session; pkill '(gpg|ssh)-agent'; fi;"   then create short cute  %windir%\system32\cmd.exe /C...
  11. 0x1

    Tools Acunetix Linux V.1905

    Acunetix Linux Version 190515149 Improve Your Web Application Security with the Acunetix Vulnerability Scanner Acunetix is not just a web vulnerability scanner. It is a complete web application security testing solution that can be used both standalone and as part of complex environments. It...
  12. dEEpEst

    Kali Linux 2019.4 Release

    We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download. 2019.4 includes some exciting new updates: A new default desktop environment, Xfce New GTK3 theme (for Gnome and Xfce) Introduction of “Kali...
  13. X

    Demon Linux

    I have been using this for a while now. Great light Distro What is Demon Linux? Demon linux us an information security-themed distribution of Debian Linux. It has taken the place of WeakNet Linux with a whole new design, UI/UX, tool-set, and more. The project is approriately named...
  14. dEEpEst

    Udemy Learn Kali Linux and Hack Android Mobile devices

    Udemy Learn Kali Linux and Hack Android Mobile devices 🔸Penetration Testing 🔸Setup Your Lab 🔸Finding Your Way Around Kali 🔸Important Tools 🔸Exploitation 🔸Hacking Android devices 🔸Social Engineering 🔸Hacking using Android devices 🔸Remote attacks On Android                              ...
  15. 1

    Exploits Linux Polkit pkexec Helper PTRACE_TRACEME Local Root

    This Metasploit module exploits an issue in ptrace_link in kernel/ptrace.c before Linux kernel 5.1.17. This issue can be exploited from a Linux desktop terminal, but not over an SSH session, as it requires execution from within the context of a user with an active Polkit agent. In the Linux...
  16. dEEpEst

    Stealer USB Stealer Linux OS

    Well this USB stealer is not the same as in Windows OS, because on Linux you don't have permission to run scripts direct from USB. That's why you would need to copy script from USB to desktop for example, give permission to it and then just run the script! Hidden content
  17. 0x1

    Postenum

    Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. Postenum tool is intended to be executed locally on a Linux box. Be more than a normal user. be the ROOT. USE : ./postenum.sh [option] ./postenum.sh -s ./postenum.sh -c Options : -a : All -s...
  18. dEEpEst

    Kali Linux Basic Installation & Basic Tutorials For You

    Hidden content
  19. itsMe

    Learn Ethical Hacking Advance Level Using Kali Linux

    Complete Kali Linux Tutorial,Complete penetration testing training,Learn Hacking Created by Vishal Patel English What Will I Learn? Footprinting,Scanning,Enumeration,System Hacking,Trojan and Backdoors,Viruses and worms,Denial-of-service,Sniffing,Session Hijacking,Wireless...
  20. dEEpEst

    Binary Linux Trojan

    In order to demonstrate that client side attacks and trojans are not exclusive to the Windows world, we will package a Metasploit payload in with an Ubuntu deb package to give us a shell on Linux.  We first need to download the package that we are going to infect and move it to a temporary...
Back
Top