Monday, April 21, 2014


It’s been a while since the last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, and Kali AMAZON AMI and Google Compute image generation scripts, not to mention numerous tool additions and updates – this release is really heavily laden with goodness. For more information about what’s new in this release, check the Kali changelog.

Kali ARM Build Scripts Now Available

This new release brings with it the introduction of the Offensive Security Trusted ARM image scripts – a set of slowly growing scripts that are able to build Kali Linux images for various ARM devices. These scripts will replace the growing number of actual ARM image releases we have in order to reduce the exponentially growing amount of traffic we serve on each release. We will release a short blog post about how to use these scripts in the next few days.

LUKS Nuke Patch Added to cryptsetup

A couple of days ago, we demonstrated a cool patch for cryptsetup, which introduces a self destruction feature. The response to this post was overwhelmingly positive, as many people voted to see this feature included in Kali Linux. Therefore, we included this patch into our cryptsetup package yesterday, making the luksAddNuke options available to all Kali users by default. The patch is non-invasive and will not change anything for anyone that does not want to make use of it. No action is necessary if you currently use LUKS and don’t want to utilize the key nuke feature. The updated cryptsetup package is present in Kali 1.0.6 by default. We’d like to take a moment to thank everyone who participated in the poll for voicing their opinion. This kind of feedback is very useful for us, giving us a better feel for the type of features to add in the future. In an upcoming blog post, we will take the opportunity to better explain this new feature and show you how to test it out.

Updated Instructions for Building VMware Tools with Kernel 3.12

VMware Tools always lags behind new kernels, which always causes us headaches and this time is no exception. At the time of this release, VMware Tools does not cleanly compile against kernel 3.12 and requires a set of patches. We have posted these Kali Linux VMware Tools patches on GitHub along with instructions on how to use them. We suspect that these build issues will go away in future releases of VMware Tools.

Kali Linux Amazon AMI/Google Compute Build Scripts Now Available

Yay! This was on our todo list for quite awhile and we’re happy to bring this feature out at last. A set of scripts that enables you to build your own custom Amazon AMI and Google Compute cloud images. If you intend to use the images for any real work, you should first consult with the terms of service of the cloud provider.

Separation of Kali Official Images and Offensive Security Contributed Images

Due to the ever growing number of ARM images Offensive Security is contributing as well as the high demand of more flavours of VMware images, we’ve separated the Official Kali images from Offensive Security contributed images. This allows us to generate more VMware image flavours (amd64, i486, i686-pae), as well as increased flexibility in future releases. To find updated VMware and custom ARM images, visit the Offensive Security Custom Image Download Page. Please bear with us as we update images on this server in the next few days.

Re-Downloading Required

Lastly, if you already have a Kali Linux installation up and running, you don’t need to download a new ISO. You can easily upgrade your installation to the latest and greatest Kali Linux has to offer as follows:
root@kali:~# apt-get update
root@kali:~# apt-get dist-upgrade

 Please like subscribe and followKali 1.0.6 Released  distro

Wednesday, April 9, 2014

How To Active GodMode In Win7

GodMode is a folder that allow you to change all your settings from one place. Sounds Good? huh? It's very easy to enable and damn useful
Step 1: create a new folder on your desktop or anywhere you'd like.
Step 2: Rename it to:
Step 3: Open the folder and enjoy

Please like subscribe and follow

Wednesday, April 2, 2014

miniduke malware spreads via fake Ukraine related documents

A year back, Security Researchers from the Antivirus firm Kaspersky found a sophisticated piece of malware which they dubbed as ‘MiniDuke’, designed specifically to collect and steal strategic insights and highly protected political information, which is a subject to states’ security.

How to burn videos from your laptop that will play in you dvd player

So I know that you can watch videos on your TV by connecting your HDMI cable from your TV to your laptop. but it doesn't allow you to make multiple copies of the video you want to watch. Also this is a windows based tutorial.

Step 1. What you're going to need: DVDR disks and a laptop to burn them whith including the files to burn on the disks.

Step 2. Go to the start menu and search for Windows DVD maker, once that pops up click on it to run it.

Step 3. select the files by clicking on the add files button and then select the files and then click the burn button and now you have to wait a while because it has to encode the files to the disc.

Hope this was helpful please like subscribe and follow I would appreciate it.


zANTI is a comprehensive network diagnostics toolkit that enables complex audits and penetration tests at the push of a button. It provides cloud-based reporting that walks you through simple guidelines to ensure network safety


icon-wifi-zantizANTI offers a host of penetration-testing features, including everything from Man-In-The-Middle and password complexity audits to port monitoring and a sophisticated packetsniffer. zANTI offers a comprehensive range of fully customizable scans to reveal everything from authentication, backdoor and brute-force attempts to database, DNS and protocol-specific attacks – including rogue access points.

zANTI employs advanced cloud-based reporting that makes it easy to demonstrate flaws and rationalize budgeting for necessary network upgrades.

icon-page-zantizANTI offers a user-friendly web-based interface that turns complex audits into a walk in the park; to quote Forbes, it’s “as polished as a video game”. zANTI produces an Automated Network Map that shows any vulnerabilities of a given target. cloud-based reporting system tracks all scans and attacks performed against the given target and stores them for future reference. These reports automatically classify data by OS types, ports, and services on the target. Additionally, you can set time-specific access and reports through our time-based report sharing system.

zAnti still comes with a token type credit system that allows you to access the more advanced features, but you can still see the power of zAnti with the free version.
When you login into zANTI, it maps your entire network and in a few simple clicks ANTI covers the most advanced attack vectors in order to check for vulnerabilities on your network

Hadoop 2.2 Multi Node Cluster Setup


In this tutorial  you will learn how to setup Hadoop Multi Node cluster

bWAPP – Vulnerable Web Application

An extremely buggy vulnerable web application
bWAPP, or a buggy web application, is a deliberately insecure web application.
bWAPP helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it has over 60 web bugs! It covers all major known web vulnerabilities, including all risks from the OWASP Top 10 project.
bWAPP is a PHP application that uses a MySQL database. It can be hosted on Linux and Windows using Apache/IIS and MySQL. It can be installed with WAMP or XAMPP. Another possibility is to download bee-box, a custom VM pre-installed with bWAPP.
This project is part of the ITSEC GAMES project. ITSEC GAMES are a fun approach to IT security education. IT security, ethical hacking, training and fun… all mixed together.
You can find more about the ITSEC GAMES and bWAPP projects on teams blog.

For educational purposes only!
vulnerable web application


  • Injection vulnerabilities like SQL, XML/XPath, SSI, LDAP, HTML, CMD and SMTP injection
  • Cross-Site Scripting (XSS), Cross-Site Tracing (XST) and Cross-Site Request Forgery (CSRF)
  • Malicious, unrestricted file uploads
  • Authentication, authorization and session management issues
  • Arbitrary file access and directory traversals
  • Local and remote file inclusions (LFI/RFI)
  • Configuration issues: Man-in-the-Middle, Cross-domain policy file, information disclosures,…
  • HTTP parameter pollution and HTTP response splitting
  • Denial-of-Service (DoS) attacks
  • HTML5 ClickJacking, Cross-Origin Resource Sharing (CORS) and web storage issues
  • Unvalidated redirects and forwards
  • Parameter tampering
  • Insecure cryptographic storage
  • Server Side Request Forgery (SSRF)
  • HTTP verb tampering
  • AJAX and Web Services issues (JSON/XML/SOAP)
  • Local privilege escalation
  • Cookie poisoning
  • Insecure WebDAV and FTP
  • PHP CGI remote code execution
  • and much more…


 Torrent for live CD

Not hacking but a game made by me

Hey guys I recently made this game for an english project at my school if you like macbeth or just like rpg's it's for you. I have ...