PRINT
PRINT
SEND MAIL
SEND MAIL

Month: July 2017

TUTORIALS

Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…

TUTORIALS

Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Debian

Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…

EXPLOIT-COLLECTOR

Cisco Netflow Generation Appliance 1.0(2) Cross Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco NetFlow Generation Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb15229. Known Affected Releases: 1.0(2).

cross site request forgeryCSRFEXPLOIT-COLLECTORExploits/Vulnerabilities

All You Need To Know About Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery is a term you’ve properly heard in the context of web security or web hacking, but do you really know what it means? The OWASP definition is as follows: Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. Read the rest…

TUTORIALS

How to install Kerberos!

Download  Roza writer to create your usb :   for windows   Linux 64   Linux 32 Open Roza Writer press the button with the folder, locate your Kerberos iso  select your drive and hit write! Errors and Fixes No grub after installation or grub fail to install durring the installation If for some reason the installer failed to install grub , don't panic!! You can fix this with  any linux distribution you have or just download a  ubuntu xenial iso and go on live mode and…

Custom DistributionsDownloadsNew Releases

Kerberos Gnu Debian Linux

Teaser Boot Animation Kerberos Gnu Debian Linux Kerberos is a penetration testing distribution focusing on automation and anonymity providing a auto exploid futures with msf functions , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Kerberos distribution is based on debian testing ,it has the capability to use 3 repositories to install packages…

TUTORIALS

The Top 5 Pen Testing Tools You Will Ever Need

There is little doubt right now that the menace panorama is altering every day. It looks like that hardly one menace is found that many unknown ones are nonetheless lurking. One of the perfect methods for companies and companies to defend themselves is thru Penetration (Pen) Testing. This article will present an outline of what Pen Testing is, its advantages, and probably the most generally used instruments used right now. Generally talking, a Penetration Test (also referred to as a “Pen Test”) is a…

EXPLOIT-COLLECTOR

Adobe Acrobat Dc 15.006.30244 Execute Code Overflow Vulnerability

Adobe Acrobat Dc is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

EXPLOIT-COLLECTOR

Google Android 6.0.1 context Execute Code Overflow Memory corruption Vulnerability

Google Android is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.

TUTORIALS

Compiling Linux Kernel (on Ubuntu)

This information might not precisely be related to this weblog, however as an train in getting accustomed to Linux, I am going to submit it anyhow. Here are just a few disclaimers- Don’t observe this information for compiling linux kernel, there are significantly better guides on the market for that goal (that is the one I adopted). The information exists that will help you be taught some new stuff which you did not know earlier than, and to enhance your understanding of Linux a…

TUTORIALS

Install Kali Linux On Raspberry Pi 3 : Creation of a Hacking Machine

In this tutorial, we are going to inform you the best way to set up kali Linux on raspberry pi 3. Raspberry pi is a single board small pc which is transportable as properly. Raspberry pi 3 is the third technology Raspberry Pi. It will value you round $35-$40 (completely value it). It will include helpful specs. INSTALLATION REQUIREMENTS : Raspberry Pi :Raspberry Pi Model B RASP-PI-3 MotherboardSD CARD : Samsung Evo 16GB Class 10 micro SDHC Card (MB-MP16D/IN)Ethernet Cable : Patch Cord 1.5…