linux

  1. Hacker

    How to tame a rootkit. Preventing malicious modules from loading on Linux.

    What are Linux rootkits? Rootkits help an attacker secure access to a compromised system, with an emphasis on maximizing the invisibility of the malware. To do this, they hide network connections, processes, folders, files, fake their contents. Usually, a rootkit carries hacker utilities for...
  2. Mutt

    How To Delete Files In Linux 100%

    Every day we are deleting files for different reasons, so we are moving them to trash, but it's only away from our folder, not from our computer/laptop. So what we can do in Linux to remove it permanently? Maybe you heard about "Zero Filling", it's a method to overwrite something with zeros. It...
  3. Teacher

    The Linux File System

    A typical Unix system consists of thousands of files. During the development of Unix certain rules have emerged in which directories which files are normally stored. These rules were adapted to the particularities of Linux and summarized in a separate document: the Filesystem hierarchy standard...
  4. Lord777

    Linux Encryption: Using GnuPG

    On Linux, the universal encryption tool is Werner Koch's Gnu Privacy Guard (GnuPG) package. Its main application command (gpg) brings back the memory of Pretty Good Privacy (PGP), an encryption tool released in 1991 by Phil Zimmermann. You can learn more about GPG in the article "GPG...
  5. Jollier

    2021 Intro to Linux & Comptia Linux+ Exam Prep

    ############################## # Day 1: Linux Fundamentals # ############################## ##################################################### # 2021 Intro to Linux & Comptia Linux+ Exam Prep # # By Joe McCray #...
  6. Jollier

    ➕ HOW TO USE STACER TO CLEAN UP YOUR LINUX ➕

    If you use Linux you might miss ccleaner and it's utilities to clean windows. Well we have different tools on Linux which are free to use. 1️⃣ Install Stacer For Debian and ubuntu users you can install stacer by command-line interface: sudo apt install software-properties-common sudo...
  7. Jollier

    ➕ HOW TO USE BLEACHBIT TO CLEAN UP YOUR LINUX ➕

    Today I want to show you how to clean Linux with bleachbit. ✍️ Note : For bleachbit you can choose between bleachbit and bleachbit root. 1️⃣ Install Bleachbit sudo apt install bleachbit 2️⃣ Start Bleachtbit To start bleachbit, you can either choose the terminal or search start method...
  8. Carding

    Traffic encryption in Linux

    There are many ways to bypass blocking sites and ensure online privacy. Terms like TOR, VPN, and proxy are well-known. You don't need any special knowledge to connect and configure them, but there are also more elegant solutions. Today I will talk about the method of bypassing locks in Linux...
  9. Carder

    Combat Linux. Overview of the most powerful distributions for pentests and OSINT.

    Building your own collection of hacker tools is great, but now it's customary to use one of the specialized distributions as a basis. This is usually Kali, but we will look at not only it, but also other distras for pentest, sometimes no less effective, and in some areas even more useful. There...
  10. Carder

    AWS Penetration Testing 2020-12-28

    December 4, 2020 Detailed description of the book https://www.amazon.com/AWS-Penetration-Testing-strategies-Metasploit/dp/1839216921 Reading software: ⬆️ Librera Reader is a highly customizable and feature-rich book reading app for Android devices, which supports many formats: PDF, EPUB, MOBI...
  11. Carder

    Hands-On Penetration Testing with Kali NetHunter 2020-12-28

    February 28, 2019 ? Detailed description of the book https://www.amazon.com/Hands-Penetration-Testing-Kali-NetHunter/dp/1788995171 ? VT https://www.virustotal.com/gui/file/087aa6aa0baeb9eb06a70cff4f3ac28eb1ea85257ed56a249d1a708b06590c96/detection
  12. Carder

    Тестирование на проникновение с помощью Kali Linux 2.0 2020-12-28

    Количество страниц: 348 Язык: Русский Формат: PDF Автор: Милосердов А. Kali Linux является передовым Linux дистрибутивом для проведения тестирования на проникновение и аудита безопасности. Информация в данной книге предназначена для ознакомления или тестирования на проникновение собственных...
  13. Carding

    Безопасная работа под Linux

    Всё что описано ниже - это мой личный опыт использования линуха в рабочих целях. Уверен, что мой подход к безопасности неоптимален. Но большинство пренебрегает и такими мерами. Если эта статья поспособствует росту моего контакт-листа в джаббе и сократит контакт в асе - значит я писал не зря...
  14. DED.IM

    DED.IM VPS - Powerful Windows / Linux servers for safe work! - Мощные Windows / Linux сервера для безопасной работы!

    https://ded.im Order: https://ded.im/cart.php?gid=5 Contact: https://t.me/DEDim_Support УСЛОВИЯ ИСПОЛЬЗОВАНИЯ СЕРВИСА DED.IM И ДОПОЛНИТЕЛЬНАЯ ИНФОРМАЦИЯ 1. Категорически запрещено грубое общение / оскорбления в адрес службы поддержки. 2. Манибэка/рефанда нет ни при каких условиях, но в...
  15. Forum Library

    Kali Linux. Тестирование на проникновение и безопасность

    Скачать книгу: https://mega.nz/#!fgE3yAQa!XeRzrM_GKmcIfzGGA8fup9g1UrGVq3xZLYrMs0JimBI
  16. Forum Library

    10 лучших Linux дистрибутивов по безопасности для защиты приватности и конфиденциальности в 2020 году

    В наше время Linux дистрибутивы по безопасности становятся более полезными и нужными, чем это было прежде, т.к. защита конфиденциальности онлайн на данный момент является одной из важнейших проблем, с которыми сегодня столкнулось наше поколение. Проблема конфиденциальности сейчас является...
  17. Forum Library

    Пошаговое руководство взлома фитнес-браслета Xiaomi MiBand 2 в Linux

    В этой статье будет приведено пошаговое руководство взлома фитнес-трекера с поддержкой Bluetooth и низким энергопотреблением средствами ОС Linux. Эта история началась с моего поста в Facebook, посвященного проблеме отсутствия API для фитнес-трекеров, и почему сей факт мешает исследователям...
  18. aladin1

    [Sale] Root's

    Linux servers with root access (ssh) - 20$ and more, only UK in stock now cost will change after New Year! For payment I accept: LR or "Perfect money" For communication: first contact - PM
  19. Lucy

    A must read for your security

    1. ENCRYPT A. Your computer, in case it is seized. Use Truecrypt with hidden OS, so you can give up a password if you live in a place where not cooperating is a serious crime (aka: a police state). B. Your communications, in case the vendor you work with has his E-mail being watched, which...
Top