Hacking is not a hobby but a way of life ♥
Anarchy is an install script for Arch Linux. We going to set up VirtualBox and install Anarchy, then install the BlackArch repository so we can install all the BlackArch tools we like.
The BlackArch repository contains 2572 Ethical Hacking and penetration tools. More as on Kali Linux and Parrot Security together.
BlackArch is constantly being updated and offers the latest packages available on GitHub.
The Anarchy Installer provides quick access to multiple desktop environments and custom configurations.
How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a cool retro terminal.
I recommend watching the video so you can see the install the various options, how you can adjust this script to your own needs, and some other cool things.
Old Fashioned Linux Somehow the man pages always remind me a bit of the past, to old school.
I will show you the most valuable packages for me. And I show you how to install Atom
Atom is the IDE developed by GitHub and it is completely hackable which means you can customize it as you want. I use Atom for programming for more than two years.
A “hackable text editor for the 21st century”
Since I have just installed my default laptop again with Parrot Security OS, one of the first things I always do is install an IDE (Integrated Development Environment) or text editor.
Lately, I’ve been getting so many questions about how to install Kali Linux, so many questions about errors they encountered during or after installing. Hence this short article and video.
Now I’m really going to refer you to the article from the previous installation, but I made a new video. Nothing has changed with the installation. You can see this very well in the video.
Here is the article you can follow: https://hackingpassion.
RED HAWK is A all in one tool for Information Gathering, Vulnerability Scanning, and Crawling. A must-have tool for all penetration testers. A Step-by-Step walkthrough.
Scans That You Can Perform Using RED HAWK Basic Scan Site Title NEW IP Address Web Server Detection IMPROVED CMS Detection Cloudflare Detection robots.txt Scanner Whois Lookup IMPROVED Geo-IP Lookup Grab Banners IMPROVED DNS Lookup Subnet Calculator Nmap Port Scan Sub-Domain Scanner IMPROVED Sub Domain IP Address Reverse IP Lookup & CMS Detection IMPROVED Hostname IP Address CMS Error Based SQLi Scanner Bloggers View NEW HTTP Response Code Site Title Alexa Ranking Domain Authority Page Authority Social Links Extractor Link Grabber WordPress Scan NEW Sensitive Files Crawling Version Detection Version Vulnerability Scanner Crawler MX Lookup NEW Scan For Everything - The Old Lame Scanner Installation: 1 git clone https://github.
Are you as secure as you think? Is your printer secure? When was the last time you changed your computer or the device passwords? Do you have a different password for each? And what about your printer?
It may be hard to believe but less than 2% of printers in use today are intrusion-proof. Most people do not change the default password at installation and giving hackers with this easy access to embedded system data, network information.
HFish Honeypot In this article and video, I show you how to set up the HFish Honeypot in a few different ways and show you what you can do with it. HFish It is a cross-platform honeypot platform developed based on Golang, which has been meticulously built for enterprise security.
What I show in this article and video For this article, I set up an own VPS server. How you can easily set up an Ubuntu Server (VirtualBox) and put up the Honeypot How to use “Play with Docker” to test the honeypot for several hours How to attack your own honeypot, using an anonymous tool.
“Advice from a Hacker” How do you determine whether your computer or server has been hacked. If you suspected this, this article certainly applies to you. But I also discuss several great commands that every Linux user or “Hacker” should know. And I show you various options. Some of these commands will also work for a Mac and Windows, so it’s a good idea to take a look if only for the tips you might want to use.
BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains 2521 tools. In this article, I’m going to show you how to install BlackArch. A Step-by-Step walkthrough..!
To be honest, I am completely surprised by what I see now, great progress from BlackArch. How fast it is. Last year was the last time I had BlackArch on a computer. Now tested for a few days, for this article and video.
Inhale is a malware analysis and classification tool that is capable of automating and scaling many static analysis operations.
This is the beta release version, for testing purposes, feedback, and community development. Thanks to netspooky The developer of this amazing tool.
Inhale started as a series of small scripts that I used when collecting and analyzing a large amount of malware from diverse sources. There are plenty of frameworks and tools for doing similar work, but none of them really matched my workflow of quickly finding, classifying, and storing information about a large number of files.