Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
A tiny framework for easily manipulate the tty and create fake binaries.
How it works?
The framework has three main functions, tas_execv, tas_forkpty, and tas_tty_loop.
tas_execv: It is a function similar to execv, but it doesn't re-execute the current binary, something very useful for...
Kali Linux – An Ethical Hacker’s Cookbook, 2nd Edition ($44.99 Value) FREE for a Limited Time
Discover end-to-end penetration testing solutions to enhance your ethical hacking skills
Many organizations have been affected by recent cyber events. At the current rate of hacking, it has become...
Termux
Termux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager.
Hidden content
Secure. Access remote servers...
TBomb v1.7b
An open-source SMS/call bomber for Linux And Termux.
Note:
The script requires working network connection to work.
No balance will be deducted for using this script to send SMS/calls.
While doing infinite bombing use 2-3 seconds delay and 10 to 20 threads for maximum...
BlackArch Linux 2020.01.01 Releases: Linux kernel 5.4.6, added more than 120 new tools
BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2428 tools. You can install tools individually or in groups...
get x410 from windows app store
then create a .bat file
start /B x410.exe /desktop
kali.exe run "if [ -z \"$(pidof xfce4-session)\" ]; then export DISPLAY=127.0.0.1:0.0; xfwm4& xfce4-session; pkill '(gpg|ssh)-agent'; fi;"
then create short cute
%windir%\system32\cmd.exe /C...
Acunetix Linux Version 190515149
Improve Your Web Application Security with the Acunetix Vulnerability Scanner
Acunetix is not just a web vulnerability scanner. It is a complete web application security testing solution that can be used both standalone and as part of complex environments. It...
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:
A new default desktop environment, Xfce
New GTK3 theme (for Gnome and Xfce)
Introduction of “Kali...
I have been using this for a while now. Great light Distro
What is Demon Linux?
Demon linux us an information security-themed distribution of Debian Linux. It has taken the place of WeakNet Linux with a whole new design, UI/UX, tool-set, and more. The project is approriately named...
Udemy Learn Kali Linux and Hack Android Mobile devices
🔸Penetration Testing
🔸Setup Your Lab
🔸Finding Your Way Around Kali
🔸Important Tools
🔸Exploitation
🔸Hacking Android devices
🔸Social Engineering
🔸Hacking using Android devices
🔸Remote attacks On Android
...
This Metasploit module exploits an issue in ptrace_link in kernel/ptrace.c before Linux kernel 5.1.17. This issue can be exploited from a Linux desktop terminal, but not over an SSH session, as it requires execution from within the context of a user with an active Polkit agent. In the Linux...
Well this USB stealer is not the same as in Windows OS, because on Linux you don't have permission to run scripts direct from USB. That's why you would need to copy script from USB to desktop for example, give permission to it and then just run the script!
Hidden content
Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. Postenum tool is intended to be executed locally on a Linux box.
Be more than a normal user. be the ROOT.
USE :
./postenum.sh [option]
./postenum.sh -s
./postenum.sh -c
Options :
-a : All
-s...
Complete Kali Linux Tutorial,Complete penetration testing training,Learn Hacking
Created by Vishal Patel
English
What Will I Learn?
Footprinting,Scanning,Enumeration,System Hacking,Trojan and Backdoors,Viruses and worms,Denial-of-service,Sniffing,Session Hijacking,Wireless...
In order to demonstrate that client side attacks and trojans are not exclusive to the Windows world, we will package a Metasploit payload in with an Ubuntu deb package to give us a shell on Linux.
We first need to download the package that we are going to infect and move it to a temporary...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.