Month: July 2017


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…


Cisco Netflow Generation Appliance 1.0(2) Cross Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco NetFlow Generation Appliance could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. More Information: CSCvb15229. Known Affected Releases: 1.0(2).

cross site request forgeryCSRFEXPLOIT-COLLECTORExploits/Vulnerabilities

All You Need To Know About Cross-Site Request Forgery (CSRF)

Cross-Site Request Forgery is a term you’ve properly heard in the context of web security or web hacking, but do you really know what it means? The OWASP definition is as follows: Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no way to see the response to the forged request. Read the rest…


How to install Kerberos!

Download  Roza writer to create your usb :   for windows   Linux 64   Linux 32 Open Roza Writer press the button with the folder, locate your Kerberos iso  select your drive and hit write! Errors and Fixes No grub after installation or grub fail to install durring the installation If for some reason the installer failed to install grub , don't panic!! You can fix this with  any linux distribution you have or just download a  ubuntu xenial iso and go on live mode and…

Custom DistributionsDownloadsNew Releases

Kerberos Gnu Debian Linux

Teaser Boot Animation Kerberos Gnu Debian Linux Kerberos is a penetration testing distribution focusing on automation and anonymity providing a auto exploid futures with msf functions , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Kerberos distribution is based on debian testing ,it has the capability to use 3 repositories to install packages…


The Top 5 Pen Testing Tools You Will Ever Need

There is little doubt right now that the menace panorama is altering every day. It looks like that hardly one menace is found that many unknown ones are nonetheless lurking. One of the perfect methods for companies and companies to defend themselves is thru Penetration (Pen) Testing. This article will present an outline of what Pen Testing is, its advantages, and probably the most generally used instruments used right now. Generally talking, a Penetration Test (also referred to as a “Pen Test”) is a…


Adobe Acrobat Dc 15.006.30244 Execute Code Overflow Vulnerability

Adobe Acrobat Dc is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.


Google Android 6.0.1 context Execute Code Overflow Memory corruption Vulnerability

Google Android is prone to a local code-execution vulnerability.This allows a local attacker to exploit this issue to execute arbitrary code in the context of the user running the affected application. Failed exploit attempts may result in a denial-of-service condition.


Compiling Linux Kernel (on Ubuntu)

This information might not precisely be related to this weblog, however as an train in getting accustomed to Linux, I am going to submit it anyhow. Here are just a few disclaimers- Don’t observe this information for compiling linux kernel, there are significantly better guides on the market for that goal (that is the one I adopted). The information exists that will help you be taught some new stuff which you did not know earlier than, and to enhance your understanding of Linux a…


Install Kali Linux On Raspberry Pi 3 : Creation of a Hacking Machine

In this tutorial, we are going to inform you the best way to set up kali Linux on raspberry pi 3. Raspberry pi is a single board small pc which is transportable as properly. Raspberry pi 3 is the third technology Raspberry Pi. It will value you round $35-$40 (completely value it). It will include helpful specs. INSTALLATION REQUIREMENTS : Raspberry Pi :Raspberry Pi Model B RASP-PI-3 MotherboardSD CARD : Samsung Evo 16GB Class 10 micro SDHC Card (MB-MP16D/IN)Ethernet Cable : Patch Cord 1.5…