Skip to main content

Various Forums

JuanDeLemos:
1. Kali Linux
http://distrowatch.com/kali  
http://www.kali.org/ 
http://forums.kali.org/
Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.

2. Tails 
http://distrowatch.com/tails 
https://tails.boum.org/ 
https://tails.boum.org/support/index.en.html
https://mailman.boum.org/listinfo/
The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.

3. Alpine Linux  
http://distrowatch.com/alpine 
http://www.alpinelinux.org/ 
http://lists.alpinelinux.org/
Alpine Linux is a community developed operating system designed for x86 routers, firewalls, VPNs, VoIP boxes and servers. It was designed with security in mind; it has proactive security features like PaX and SSP that prevent security holes in the software to be exploited. The C library used is musl and the base tools are all in BusyBox. Those are normally found in embedded systems and are smaller than the tools found in GNU/Linux systems.

4. BackBox Linux  
http://distrowatch.com/backbox
http://www.backbox.org/
http://groups.google.com/group/backbox-linux
http://forum.backbox.org/
BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.

5. ClearOS  
http://distrowatch.com/clearos 
https://clearos.com/ 
https://clearos.com/clearfoundation/social/community
ClearOS Enterprise is a server, network, and gateway platform designed for small businesses and distributed enterprise environments. ClearOS Enterprise is based upon ClearOS Core which is a rebuild of Red Hat Enterprise Linux. The distribution is flexible and includes an extensive list of features and integrated services which can be configured through a web-based interface. Some of the tools found in ClearOS Enterprise include anti-virus, anti-spam, VPN, content filtering, bandwidth manager, file services, SMTP services, print services, SSL certification, and web services. ClearOS includes a marketplace which simplifies the installation of software including 3rd party modules. The distribution is provided as a free download, inclusive of basic OS updates with free registration.

6. Wifislax  
http://distrowatch.com/wifislax 
http://www.wifislax.com/ 
http://foro.seguridadwireless.net/live-wifislax/
Wifislax is a Slackware-based live CD containing a variety of security and forensics tools. The distribution's main claim to fame is the integration of various unofficial network drivers into the Linux kernel, thus providing out-of-the-box support for a large number of wired and wireless network cards.

7. OpenBSD  
http://distrowatch.com/openbsd  
http://www.openbsd.org/
http://www.openbsd.org/mail.html 
http://www.openbsd.org/ftp.html   
http://www.openbsd.org/report.html 
The OpenBSD project produces a free, multi-platform BSD 4.4-based UNIX-like operating system. Its efforts emphasize portability, standardisation, correctness, proactive security and integrated cryptography. The project also develops the widely-used and popular OpenSSH (OpenBSD Secure Shell) software, which provides encrypted communication sessions over a computer network using the SSH protocol.

8. BlackArch Linux  
http://distrowatch.com/blackarch 
http://blackarch.org/ 
http://blackarch.org/guide.html 
http://blackarch.org/download.html 
https://github.com/BlackArch/blackarch/issues 
BlackArch Linux is an Arch Linux-based distribution designed for penetration testers and security researchers. It is supplied as a live DVD image that comes with several lightweight window managers, including Fluxbox, Openbox, Awesome and spectrwm. It ships with over a thousand specialist tools for penetration testing and forensic analysis.

9. Qubes OS  
http://distrowatch.com/qubes 
http://qubes-os.org/ 
http://groups.google.com/group/qubes-devel 
http://wiki.qubes-os.org/ 
http://qubes-os.org/Screenshots.html 
https://wiki.qubes-os.org/wiki/QubesDownloads
Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.

10. Pentoo  
http://distrowatch.com/pentoo 
http://www.pentoo.ch/ 
http://forums.pentoo.ch/ 
http://www.pentoo.ch/docs/ 
http://www.pentoo.ch/download/ 
https://code.google.com/p/pentoo/issues/list
Pentoo is a Gentoo-based Linux live CD with a selection of applications and tools designed to perform penetration testing.

11. Zentyal Server  
http://distrowatch.com/zentyal 
http://www.zentyal.org/ 
http://lists.zentyal.org/ 
http://forum.zentyal.org/ 
http://wiki.zentyal.org/ 
http://trac.zentyal.org/screenshots 
http://www.zentyal.org/downloads/ 
http://tracker.zentyal.org/ 
Zentyal Server (formerly eBox Platform) is a unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.

12. Openwall GNU/*/Linux 
http://distrowatch.com/openwall 
http://www.openwall.com 
http://www.openwall.com/lists/ 
http://www.openwall.com/Owl/INSTALL.shtml 
http://openwall.info/wiki/  
http://www.openwall.com/Owl/screenshots 
http://www.openwall.com/Owl/DOWNLOAD.shtml
Openwall GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Owl live CDs with remote SSH access are also good for recovering or installing systems (whether with Owl or not). Another secondary use is for operating systems and/or computer security courses, which benefit from the simple structure of Owl and from the inclusion of the complete build environment.

13. Lightweight Portable Security  
http://distrowatch.com/lps 
http://www.spi.dod.mil/lipose.htm 
http://www.spi.dod.mil/docs/lpsmanual.pdf  
http://www.spi.dod.mil/lipose.htm 
Lightweight Portable Security (LPS) is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.

14. Network Security Toolkit  
http://distrowatch.com/nst 
http://www.networksecuritytoolkit.org/ 
http://sourceforge.net/forum/forum.php?forum_id=361524 
http://wiki.networksecuritytoolkit.org/ 
http://nst.sourceforge.net/nst/screenshots/index.html 
http://sourceforge.net/projects/nst/files/ 
http://sourceforge.net/apps/trac/nst/report 
Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools. What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.

Comments

Popular posts from this blog

Russian Central Bank planning their own #cryptocurrency 😱😱😱

Russian Central Bank planning their own #cryptocurrency 😱😱😱 Speaking at the 2017 St. Petersburg International Economic Forum today, deputy chairwoman of Russia’s central bank Olga Skorobogatova has, in a significant revelation, stated that the regulator is working on a national digital currency. According to a report by TASS, Russia’s largest news agency, Skorobogatova sees national cryptocurrencies as the future and claimed that it’s merely a matter of time before countries around the world adopt national digital currencies. She stated: " Regulators of all countries agree that it’s time to develop national cryptocurrencies, this is the future. Every country will decide on specific time frames. After our pilot projects, we will understand what system we could sue in our case for our national currency. "

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS

50 HIGH PR FORUMS AND BOOKMARKING SITES FOR BACKLINKS http://answers.microsoft.com/en-us http://archiveoflinks.com / http://community.sitepoint.com / http://de.lirio.us / http://del.icio.us / http://dondir.com / http://filesharingtalk.com / http://forum.deviantart.com / http://forum.joomla.org / http://forums.cnet.com / http://forums.hostgator.com / http://forums.mysql.com / http://forums.searchenginewatch.com / http://simplemachines.org/community/index.php http://www.247webdirectory.com / http://www.2daydir.com / http://www.9dir.com/Submit http://www.9sites.net / http://www.9w1.net / http://www.a1webdirectory.org / http://www.abacusseo.com / http://www.abc-directory.com / http://www.abigdir.com / http://www.acewebdirectory.com / http://www.add2us.com / http://www.addbusiness.net / http://www.addlink.us / http://www.addlinkzfree.com / http://www.addsite.info / http://www.afreeurl.info / http://www.agrieducation.org / http://www.alistdirectory.com / http

Blogs on Computer Security:

Blogs on Computer Security: https://antelox.blogspot.com / http://www.dumpanalysis.org/blog / http://www.abuse.ch / http://zairon.wordpress.com / http://androguard.blogspot.com / http://blog.w4kfu.com / http://akhenath0n.blogspot.com / http://diarrlf.wordpress.com / http://deobfuscated.blogspot.com / http://www.h-i-r.net / http://mysterie.fr/blog / http://www.skullsecurity.org/blog / http://www.wrgross.com/blogs/security / http://net-effects.blogspot.com / http://eiploader.wordpress.com / http://cyb3rsleuth.blogspot.com / http://0entropy.blogspot.com / http://siri-urz.blogspot.com / http://newsoft-tech.blogspot.com / http://www.ragestorm.net/blogs / http://codeexploration.blogspot.com / http://esploit.blogspot.com / http://thexploit.com / http://mysterie.fr/blog / http://bailey.st/blog / http://touchmymalware.blogspot.ru / http://blog.delroth.net / http://novahackers.blogspot.com / http://greatis.com/blog / http://mcdermottcybersecurity.com / http://grand
200++ high pr eductinon&goverment site backline As We know how important backlinks are for rankings in Google for a blog/site and page rank which definitely is the trusted way to show how well your blog is which most advertiser look for.I have come up with top .gov & .edu website by registering where you can get backlinks easily.Sograb these backlinsk and see the magic how  your website ranks on Google with these high PR boosting .gov and .edu backlinks.A high quality backlinks worth thousands low quality backlinks, especially the one coming fromedu and .gov sites. Google loves backlinks from.edu & .gov sites and thus give your site good ranking in SERPs. An edu & .’gov backlinks is associated with an educational institute & government organization therefore considered asmost authentic and valued backlink in term of SEO because they are from non-profit source givequality information, not a spam one and since exists for long time in the field, have high PageRank t

Tor Darkweb Link

Tor link max telegram big acker: https://cardedlxzxsphu5y.onion/ SHOP FOR BUYING CARDED PRODUCTS https://2or24opd2hkebadv.onion/index.php  TORBAY FORUM chickencaptain: http://kpynyvym6xqi7wz2.onion/ parazite files and links max telegram big acker: https://kr5hou2zh4qtebqk.onion.cab/ezines/ ARCHIEVE OF SOME VINTAGE AS WELL AS NEW STUFFS https://superkuhbitj6tul.onion/library/ LIBRARY OF BOOKS ON VARIOUS TOPICS https://yuxv6qujajqvmypv.onion/ GUIDE ON USING AN SECURE OPERATING SYSTEM https://bpo4ybbs2apk4sk4.onion/en A COLLECTION OF TOOLS RELATED TO SECURITY P4RN3R: https://ondemand5xot4hdw.onion/  Tor On Demand max telegram big acker: https://f3mnl42ax3qtu3a7.onion/ GOVT LEAKS https://kzspryu63qbjfncp.onion/  DIGITAL PAWN SHOP https://yniir5c6cmuwslfl.onion/ STRANGE WEBSITE, CANT DESCRIBE https://vrimutd6so6a565x.onion.cab/index.php/Board ANONYMOUS POSTING https://h2am5w5ufhvdifrs.onion/ CRYPTOME ARCHIVE OF GOV CONSPIRACY FILES https://torc5bhzq6xorhb4.onion/ TURKISH

How to Hack Website

inurl:/editor/editor/filemanager Just open uploadtest.html Or test.html Then select PHP server Upload file Copy uploaded file url Paste it after the link Www.xyz.com //.... Enjoy Regards :- HACKER 22385

open a new bitcoin account and made double money

open a new bitcoin account and made double money MenuAbout UsContact Us Privacy Policy Disclaimer Sitemap  Main MenuBlogging tipsBlog designing  Blog traffic How TosMake Money Online  How to open a bitcoin account, earn, double your earnings and withdraw your money to physical cash. Bloggers Prof 11:12:00 AM  4 I recently discovered that people are now interested in bitcoin because of its high rate of popularity now in telegram, but nevertheless, I would be talking today on  how to get money into your bitcoin wallet  and how to go about your funds, weather you would withdraw it or you sell it to someone, I talked about everything you need to know about bitcoin and how to create your wallet, create your wallet let's move to today's deal. There are many ways to get  money into your wallet,   you can buy and you can also earn it , I want to show you list of sites you can earn bits from fast, After so many online research on how to get free bitcoins, I came across many we

List of IP range for RDP cracking

MR_Liosion: Range IP AMAZON 8.18.144.0 - 8.18.144.255 8.18.145.0 - 8.18.145.255 79.125.0.0 - 79.125.63.255 216.137.32.0 - 216.137.63.255 207.171.160.0 - 207.171.191.255 23.20.0.0 - 23.23.255.255 107.20.0.0 - 107.23.255.255 184.72.0.0 - 184.73.255.255 72.21.192.0 - 72.21.223.255 50.16.0.0 - 50.19.255.255 199.255.192.0 - 199.255.195.255 67.202.0.0 - 67.202.63.255 204.236.128.0 - 204.236.255.255 75.101.128.0 - 75.101.255.255 174.129.0.0 - 174.129.255.255 79.125.64.0 - 79.125.127.255 204.246.160.0 - 204.246.191.255 184.169.128.0 - 184.169.255.255 50.112.0.0 - 50.112.255.255 54.240.0.0 - 54.255.255.255 72.44.32.0 - 72.44.63.255 176.32.64.0 - 176.32.71.255 87.238.84.0 - 87.238.85.255 205.251.192.0 - 205.251.255.255 178.236.0.0 - 178.236.7.255 87.238.86.0 - 87.238.87.255 87.238.80.0 - 87.238.81.255 103.4.12.0 - 103.4.15.255 103.4.8.0 - 103.4.11.255 87.238.82.0 - 87.238.83.255 176.32.80.0 - 176.32.87.255 27.0.0.0 - 27.0.3.255 17

hacking tools and lab

Resources (Free) Virtual Networks (VPNs) • ChaosVPN: http://wiki.hamburg.ccc.de/ChaosVPN • Gh0st Networks: http://www.gh0st.net / • Hacking Lab: https://www.hacking-lab.com / • p0wnlabs: http://p0wnlabs.com / • pwn0: https://pwn0.com / • PentestIT: https://lab.pentestit.ru / Custom Personal Targets • Hack A Server: https://hackaserver.com / • Hack Me: http://hack.me / • Hack This: https://www.hackthis.co.uk / • Smash The Stack: http://smashthestack.org / • Hack The Box: https://www.hackthebox.gr / • SecAdvise: https://labs.secadvise.com / • DarkHive: http://darkhive.net / • Avatao: https://avatao.com / • Root-Me: https://www.root-me.org / Archive/Repository • Security Conference Library: http://archive.liquidmatrix.org / • Shell-Storm.org Repository: http://repo.shell-storm.org/CTF / Misc • Bug crowd: http://bugcrowd.com / • CTF Time: http://ctftime.org / • CTF365: http://ctf365.com / • Hacker Cons: http://hackercons.org / • Hat Force: https://www.hatforce.c