Browsing tag

Kali Linux

Kali Linux 2018.2 Ethical Hacking Distro Is Here: Download ISO And Torrent Files

Earlier this year in February, Offensive Security pushed the first release snapshot of Kali Linux for the year 2018. The Kali developers have already shifted their release model to rolling but they keep releasing these snapshots from time to time to provide a fresh ISOs to new users. Following that tradition, Kali Linux 2018.2 has […]

Kali Linux from Microsoft Store and use on Windows 10

Thanks to Microsoft who a few months ago vowed to bring open source software to its store, now you can download Kali Linux and install it on Windows 10 Kali Linux is a Debian-derived Linux distribution developed for penetration testing and digital forensics. The platform includes hundreds of penetration testing tools making it one of […]

Download Kali Linux from Microsoft Store and use on Windows 10

You can now download Kali Linux and install it on Windows 10, thanks to Microsoft who a few months ago vowed to bring open source software to its store. Kali Linux is a popular Debian-derived Linux distribution developed for penetration testing and digital forensics. The platform is home to hundreds of penetration testing tools making it one of the best and […]

Kali Linux Now Finally Comes to Windows 10

Kali Linux, the hacker-friendly distro, is now available for Windows 10 on the Microsoft store. This is in fact news for many who have had set notions about Microsoft and its ways. Brian Fagioli writes for BetaNews– “It still seems unreal, but yes, you can install Linux distributions from the Microsoft Store on Windows 10. […]

Kali Linux For Windows 10 Arrives In Microsoft Store

Installing and running Linux on Windows 10, also called Linux Subsystem on Windows (WSL), is old news. You can already install distros like Ubuntu, SUSE Enterprise Linux, and openSUSE from Windows Store. While we continue to wait for Fedora to arrive on Microsoft Store as promised, another favorite distro–Kali Linux–has already made itself available. This news […]

Kali Linux 2018.1 Released For Ethical Hackers — Download ISO And Torrent Files Here

In 2016, Offensive Security–the developer of Kali Linux ethical hacking distro–decided to switch to a rolling release model. However, from time to time, they keep releasing the Kali snapshots with all the latest patches, fixes, and updates. Following the same tradition, the developers have pushed the first snapshot for 2018. Aptly named Kali Linux 2018.1, […]

PiDense – Monitor Illegal Wireless Network Activities (Fake Access Points)

Monitor illegal wireless network activities. Similar SSID broadcasts Same SSID broadcasts Calculates unencrypted wireless networks density Watches SSID broadcasts at the blacklist. Capabilities (Now) Calculates Unencrypted wireless network density Finds same ssid, different encryption Working Principle for PiDense Collects all the packets from Wireless Networks. Analyzes all the beacon packets. If PiDens detects more than defined threshold of […]

SocialFish – Ultimate phishing tool with Ngrok integrated

Ultimate phishing tool with Ngrok integrated. PREREQUISITES Python 2.7 Wget from Python PHP TESTED ONKali Linux – ROLLING EDITION CLONE git clone https://github.com/UndeadSec/SocialFish.git RUNNING cd SocialFish sudo pip install -r requirements.txt python SocialFish.py AVAILABLE PAGES+ Facebook: Traditional Facebook login page. Advanced login with Facebook. + Google: Traditional Google login page. Advanced login with Facebook. + […]

Installing Kali Linux on Raspberry Pi3

Installing Kali Linux 2.0 on a Raspberry Pi 3 is a straight forward task.  If you have installed Kali on a Pi 1 or 2 the steps are the same. Things Needed: Raspberry Pi 3 Power Supply HDMI cable 8-32 GB SD-Card Keyboard and mouse for controls Step-by-Step How To Install Kali Linux 2.0 to […]

Denial of Service DDoS Attack Using Kali Linux

What is Distributed Denial of Service Attack(DDoS)? A distributed denial-of-service (DDoS) attack is an attempt to make a system or network resource unavailable to its intended users. Although the means and motives vary it generally consists of efforts to temporarily or indefinitely interrupt a host connected to the Internet. This article reads on how to […]

Qubes OS – A Security-Oriented Operating System

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and iOS. Qubes is free and open-source software (FOSS). This means that everyone is free to use, copy, and change the […]

Kali Linux 2017.3 Brings New Hacking Tools — Download ISO And Torrent Files Here

Kali Linux, the leading ethical hacking operating system, is distributed and developed by Offensive Security. In 2016, the developers decided to make a switch to the rolling release model to make sure that Kali Linux is updated at regular intervals. Combining all the latest updates, patches, fixes, and improvements released in past few months, latest […]

Enigma – Multiplatform Payload Dropper

Enigma is a Multiplatform payload dropper. Run git clone https://github.com/UndeadSec/Enigma.git cd Enigma python enigma.py or python3 enigma3.py Prerequisites python 2.7 for enigma.py python 3.x for enigma.py metasploit Tested on Kali Linux – ROLLING EDITION Download Enigma Download WordPress Themes Premium WordPress Themes Download Download WordPress Themes Download Premium WordPress Themes Free online free course download huawei […]

TROMMEL – Sift Through Directories of Files to Identify Indicators That May Contain Vulnerabilities

TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to: Secure Shell (SSH) key files Secure Socket Layer (SSL) key files Internet Protocol (IP) addresses Uniform Resource Locator (URL) email addresses shell scripts web server binaries configuration files database files specific binaries files (i.e. Dropbear, […]

How To Create Backdoor In Kali Linux

What is backdoor? A backdoor is a method, often secret, to bypass normal authentication or encryption in an integrated computer system, product, or device (for example, a home router) or its implementation, e.g. as part of a cryptographic system, an algorithm, a chipset or a “computer homunculus” (such as Intel’s AMT technology). Backdoors are often […]

How To Do Man in the Middle Attack in Kali Linux

Currently, in this tutorial, we are going to perform the man in the middle attack using Kali Linux. Man in the middle attack in Kali Linux The man in the middle attack in Kali Linux (often abbreviated MITM, MitM, MIM, MIM, MITMA) in cryptography and computer security is a form of active eavesdropping in which […]

Kali Linux Commands Cheat Sheet A To Z

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A apropos : Search Help manual pages (man -k) apt-get : Search for and install software packages (Debian/Ubuntu) aptitude : Search for and install software packages (Debian/Ubuntu) aspell : Spell Checker awk : Find and Replace […]

Vanquish – Kali Linux based Enumeration Orchestrator

Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell. Vanquish Features So what is so special […]

Tinfoleak – Twitter OSINT Tool

Tinfoleak is a simple Python script that allow to obtain detailed information about a Twitter user activity Detailed information about any Twitter user: basic information about a Twitter user (name, picture, location, followers, etc.) devices and operating systems used by the Twitter user applications and social networks used by the Twitter user place and geolocation […]