LAF – Linux Application Firewall (LAF) application firewall for Linux

fire-wall

LAF – Linux Application Firewall (LAF) application firewall for Linux Requirements LAF requires libnetfilter-queue, it’s dependency libnfnetlink and a kernel 2.6.14 or later. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Install Install the required dependencies. sudo apt-get install libnfnetlink-dev libnetfilter-queue-dev Compile with make: make Run [clang](http://clang-analyzer.llvm.org/scan-build.html) static analyser: scan-build make Create an iptables rule: sudo iptables -A … Read more

Kali Linux Hacking eBooks Download in PDF 2019

kali linux hacking

Kali Linux Hacking List of Free Kali Linux Hacking eBooks Download In PDF 2019 Ethical Hacking, Hacking ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks. List curated by Hackingvision.com Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to … Read more

Maybe – See what a program does before deciding whether you really want it to happen

maybe

  See what a program does before deciding whether you really want it to happen. rm -rf pic* Are you sure? Are you one hundred percent sure? maybe… … allows you to run a command and see what it does to your files without actually doing it! After reviewing the operations listed, you can then … Read more

WiFi Frequency Hacker – Regulatory Domain Configuration That Doesn’t Limit You

wifi

wifi-frequency-hacker A modified frequency regulatory domain configuration that doesn’t limit you. Overview Different countries enforce different frequency restrictions on the various wifi channels. This can be a pain if your card/OS is forcing you into a different configuration than the one you need. There are numerous reasons why this may be happening. From drivers favouring … Read more

SCUTUM – Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller

scutum-firewall

SCUTUM Firewall Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller Current Version: 2.4.3 Current Version Change log: Added option to choose whether to delete the installer file after installation Fixed arptables detection errors on some Linux distributions Fixed some bugs that is unnoticeable 😀 TODO: Use a class to control network interfaces individually … Read more

GonnaCry – Linux Ransomware That Encrypts All User Files

linux-pad-lock

Read our disclaimer before you continue. This tool is only provided as a convince any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. The authors of hackingvision.com will … Read more

Makemon – Create Single or Multiple Monitor Mode WiFi Interfaces

Makemon Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Credits: Yo-kai-Sei-shin-kage # makemon by Yokai Seishinkage # Make a single (or up to 10) monitor mode wireless interfaces with unique mac addresses. Dependencies 1.) iw 2.) macchanger Installation Move “makemon” to “/usr/bin/” directory/folder or any directory you choose … Read more

Create Customized .onion Addresses For Tor Hidden Services

tor

Create Customized .onion Addresses For Tor Hidden Services Tor’s .onion links can often look quite random in this article I will show you how to create customized .onion address for use with Tor’s hidden services. Customized .onion links can often help other Tor users find and recognize your site easier. For example take Facebook’s .onion … Read more

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux

Self Destructing Encrypted LUKs Partitions Emergency Nuke Kali Linux   Welcome back today I will show you to set up a self destructing LUKSs partition in Kali Linux this process is often referred to as an emergency nuke. Due to high demand from users the guys over at Kali.org decided to implement LUKs nuke patch … Read more

WikiLeaks Revealed CIA Tool To Monitor Linux Network Traffic

wikileaks

WikiLeaks as part of Vault 7 leaks published documents from a project of CIA dubbed as ‘OutlawCountry‘. The documents published on Thursday on their website explains about a malware which probably CIA used to monitor the network traffic of Linux users. The two documents named as ‘OutlawCountry v1.0 User Manual‘ and ‘OutlawCountry v1.0 Test Plan‘ … Read more

Linux Machine Can Be Remotely Hijacked By Malicious DNS Response

linux systemd bug

Now Linux machines can be hacked using a malicious DNS response (TCP). An attacker just has to send a Psuedo DNS Response to the victim. This vulnerability has been discovered in Systemd, which is a popular service manager for Linux machines, it allows remote attackers to overflow the buffer to execute a malware on the … Read more

How to use Hacking Tools Without Opening Ports on Router NAT Firewall

How to use Hacking Tools Without Opening Ports on Router NAT Firewall

Hello, welcome back in a recent tutorial (How to Use Metasploit, SEToolkit Without Opening Ports Kali Linux) we worked with Ngrok creating secure introspectable tunnels. Using tunnels while pentesting can be a lot safer using these encrypted tunnels we can expose a local server behind a NAT or firewall to the Internet essentially bypassing restrictions … Read more

Fix Could not get lock /var/lib/dpkg/lock – Resource temporarily unavailable

get lock /var/lib/dpkg/lock - Resource temporarily unavailable

Fix get lock /var/lib/dpkg/lock – Resource temporarily unavailable You have been installing packages or updating your repositories and you run in an error message from apt. “Fix get lock /var/lib/dpkg/lock – Resource temporarily unavailable” this error can become quite annoying to beginners don’t worry I will show you how to remove the lock from /var/lib/dpkg/lock this will … Read more

Fix Update Errors in Kali Linux, Updating Official Repositories in Kali Linux

Fix Update Errors Kali Linux

Fix Update Errors in Kali Linux, Updating Official Repositories in Kali Linux Fix Update Errors Kali Linux So you have installed Kali Linux and now you get errors when your trying to install software ? don’t worry this is a common problem in Kali Linux. Today I will show you how to modify and update … Read more

Encrypting USB, Mass Storage Devices With LUKS

usb stick

In this guide you will learn how to Encrypt a USB or Mass Storage Devices with LUKS encryption. What is LUKS ? Known as Linux Unified Key Setup or LUKS it is a disk encryption specification LUKS specifies a platform-independent standard on-disk format for use in various tools. This not only facilitates compatibility and interoperability among different … Read more

fb-messenger-cli

terminal

fb-messenger-cli Facebook Messenger Command line client Use your Facebook account to chat with your friends sneakily in the command line, it’s as easy as logging in, choosing a convo and chatting away. Install npm install -g fb-messenger-cli Then fb-messenger-cli from anywhere Choose a friend Chat away Helpful options Features: Real time refreshing on new messages … Read more

How to Install Arch Linux

how-to-install-arch-linux-install

In this Guide I will show you how to Install Arch Linux first of all you will need to go to Arch Linux Official website and download the correct .ISO image for your CPU Architecture you can download these files via HTTP in your web browser or by Torrent using a Torrent Client. In this … Read more

yoast seo premium free

Spelling error report

The following text will be sent to our editors: