Home Linux Kali Linux

Kali Linux

Kali Linux Tutorials & Guides, Kali Linux Downloads, Kali Linux Tools Guide, Kali linux Troubleshooting

Kali Linux 2018.1 Release

Kali Linux The Pentesting Distro and Hackers and Pentesters Favourite Linux Operating System has been Rolling Release for quite some time now but few days back Offensive Security (...

Run Kali Linux on Windows 10 – Download From Windows Store

Kali Linux - the most used penetration Linux Distro is now available on Windows 10 to run Natively, download via Windows store. Great news for hackers, the most used Penetration...

Kali Linux 2017.2 Release

We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. Image...

Debinject – Inject malicious code into *.debs

Inject malicious code into *.debs CLONE git clone https://github.com/UndeadSec/Debinject.git RUNNING cd Debinject python debinject.py If you have another version of Python: python2.7 debinject.py RUN ON TARGET SIDE chmod 755 default.deb dpkg -i backdoored.deb PREREQUISITES dpkg ...

Truehunter – Tool to detect TrueCrypt Containers

The goal of Truehunter is to detect TrueCrypt containers using a fast and memory efficient approach. It was designed as a PoC some time ago as I couldn't find...

Cobalt Strike : Penetration Testing on Intranet

Cobalt Strike : Introduction Cobalt Strike is software for Adversary Simulations and Red Team Operations. Adversary Simulations and Red Team Operations are security assessments that replicate the tactics and techniques of...

Kali Linux 2017.1 Download Now

Kali Linux 2017.1 Released , Download Now. Offensive Security has updated the Kali Linux images with new features and changes. Kali Linux 2017.1, this release comes with support for wireless...

Systemd Cheat Sheet : Linux

Systemd is becoming the default on most distros Systemd is becoming the default in many distros, RHEL, CentOS, Ubuntu  and it offers a single command to manage your system, instead...
Kali Logo

Kali Linux Commands List : Hackers Cheat Sheet

Kali Linux Hacking Commands List : Hackers Cheat Sheet Hacking or Penetration testing is the practice of testing a computer system, network or Web application to find vulnerabilities that an...

Linux Terminal in Rainbow Effect : Lolcat

Linux Terminal in Rainbow Effect , Yes lets make Linux beautiful. If you are among those who think Linux is boring, let me tell you it's not. The lolcat program...

Stay connected

26,955FansLike
137FollowersFollow
507FollowersFollow
1,791FollowersFollow
314SubscribersSubscribe

Latest article

AES-Killer – Burp Plugin To Decrypt AES Encrypted Traffic Of Mobile Apps

Burpsuite Plugin to decrypt AES Encrypted mobile app traffic. Download AES-Killer Requirements Burpsuite Java Tested on Burpsuite 1.7.36 ...

DarkSpiritz – Penetration Testing Framework For UNIX Systems

What is DarkSpiritz? Created by the SecTel Team it was a project of one of the owners to update and clean-up an older pentesting framework he had...

CEH v10 : Certified Ethical Hacker v10 PDFs, Tools, LAB Manual Download – UNLOCKED

CEH v10 - Certified Ethical Hacker v10 full PDF is Available for Download now. The worlds most advanced ethical hacking course with 20 of the...

Popular Posts