Connect with us

Viral News

Read Our Wiki

,—————-, ,———, ,———————–, ,” ,”| ,” ,”| ,” ,” | +———————–+ | ,” ,” | | .—————–. | | +———+ | | | | | | | -==—-‘| | | | WELCOME TO THE | | | | | | | | /r/hacking wiki | | |/—-|`—= | | | | C:>_ | | |…

               ,----------------,              ,---------,
          ,-----------------------,          ,"        ,"|
        ,"                      ,"|        ,"        ,"  |
       +-----------------------+  |      ,"        ,"    |
       |  .-----------------.  |  |     +---------+      |
       |  |                 |  |  |     | -==----'|      |
       |  |  WELCOME TO THE |  |  |     |         |      |
       |  | /r/hacking wiki |  |  |/----|`---=    |      |
       |  |  C:>_          |  |  |   ,/|==== ooo |      ;
       |  |                 |  |  |  // |(((( [33]|    ,"
       |  `-----------------'  |," .;'| |((((     |  ,"
       +-----------------------+  ;;  | |         |,"     -Kevin Lam-
          /_)______________(_/  //'   | +---------+
     ___________________________/___  `,
    /  oooooooooooooooo  .o.  oooo /,   ,"-----------
   / ==ooooooooooooooo==.o.  ooo= //   ,`--{)B     ,"
  /_==__==========__==_ooo__ooo=_/'   /___________,"

Welcome to /r/hacking!

A subreddit dedicated to hacking and hacking culture.

What we are about: quality and optimistic discussion about the culture, occupation and admire of hacking.

This sub is aimed at those with an belief of hacking – please search recommendation from /r/HowToHack for posting newbie links and tutorials; any newbie questions may perchance well honest quiet be directed there as they’ll lead to a ban here.

Guides and tutorials are welcome here so long as they are suitably complex and most severely lawful!

Please dangle now no longer post unlawful stuffs. Bans are handed out at moderator discretion.

  1. Take care of it lawful. Hacking may perchance well honest additionally be a grey living but gain it above board. Discussion round the legality of complications is k, encouraging or helping unlawful actions is now no longer.
  2. We’re now no longer your internal most military. Right here’s now no longer the keep of living to try to search out hackers to defend out your dirty work and you may perchance well be banned for attempting. This involves: Asking any individual to hack for you, searching to rent hackers, soliciting for support with your DoS, asking how you doubtlessly can obtain into your “lady friend’s” instagram, and offering to defend out these items will additionally lead to a ban.
  3. No “how elevate out i initiating hacking?” posts. Anticipate /r/howtohack or the stickied post. Intermediate questions are welcomed – e.g. “How does HSTS prevent SSL stripping?” is an correct search files from. “How elevate out I hack wifi with Kali?” is atrocious.
  4. No “I bought hacked” posts unless it is an enthralling autopsy of a undeniable attack. Your nan being phished would no longer count.
  5. Sharing of non-public files is forbidden – no doxxing or IP dumping.
  6. Spam is precisely forbidden and may perchance well honest lead to a ban. Professional promotion e.g. from security firms/pen attempting out companies is allowed within the course of the confines of role-broad rules on self promotion chanced on here, but will in any other case be belief to be unsolicited mail.
  7. Off-topic posts will likely be handled as unsolicited mail.
  8. Low-effort stutter will likely be removed at moderator discretion.
  9. We’re now no longer tech toughen, these posts may perchance well honest quiet be kept on /r/techsupport.
  10. Assemble now no longer be a dick. Play good, toughen every heaps of and again learning.

Beginning & Basics to hacking

How elevate out I initiating hacking?

Hacking is an incredibly wide topic. There is is no longer any single “hacking” action. You will ought to characterize what you may perchance well successfully be searching to be taught. This post will enable you make clear hacking. From there, check out resources connected to the areas of hacking you may perchance well successfully be attracted to.

Where may perchance well honest quiet I initiating?

Yet again, slim down what you may perchance well successfully be searching to be taught. There may perchance be merely too mighty within the broad world of hacking to now no longer slim it down. Listed below are about a resources that offer an correct total foundation:

  • Hacking: the art work of exploitation (amazon) – Licensed overview of hacker mentality and total exploitation tactics

  • Violent Python (amazon) – The utilization of total python talents to dangle highly effective tools for offence and defence.

  • Internet Application Hacker’s Handbook (amazon) – Very broad files to web page security and outdated skool vulnerabilities.

  • Perfect Malware Prognosis (amazon) – This will well honest educate you programs you doubtlessly can analyze malware thoroughly. Optimistic, it is going to educate you programs malware is written and how malware authors non-public.

Have I been hacked? What elevate out I elevate out if I’ve been hacked?




Reading & Culture

One other one bought caught these days, it is all around the keep the papers. “Teenager Arrested in Pc Crime Scandal”, “Hacker Arrested after Bank Tampering”…

Damn teens. They’re all alike.

However did you, to your three-portion psychology and 1950’s technobrain, ever bewitch a witness within the abet of the eyes of the hacker? Did you ever surprise what made him tick, what forces formed him, what may perchance well honest dangle molded him?

I am a hacker, enter my world…

Mine is a world that begins with college… I’m smarter than loads of the utterly different teens, this crap they educate us bores me…

Damn underachiever. They’re all alike.

I’m in junior excessive or excessive college. I’ve listened to teachers level to for the fifteenth time how you doubtlessly can gash a section. I brand it. “No, Ms. Smith, I did no longer level to my work. I did it in my head…”

Damn kid. Potentially copied it. They’re all alike.

I made a discovery these days. I chanced on a laptop. Wait a 2d, here’s frigid. It does what I favor it to. If it makes a mistake, it is because I screwed it up. Now not because it would no longer like me…
Or feels threatened by me…
Or thinks I’m a dapper ass…
Or would no longer like teaching and ought to not be here…

Damn kid. All he does is play video games. They’re all alike.

And then it occurred… a door opened to a world… speeding by the mobile phone line like heroin by an addict’s veins, an electronic pulse is dispensed out, a refuge from the day-to-day incompetencies is sought… a board is chanced on.
“Right here’s it… here’s where I belong…”
I do know all americans here… despite the incontrovertible fact that I’ve by no methodology met them, by no methodology talked to them, may perchance well honest by no methodology hear from them again… I do know you all…

Damn kid. Tying up the mobile phone line again. They’re all alike…

You wager your ass we’re all alike… we now had been spoon-fed toddler food at college when we hungered for steak… the bits of meat that you doubtlessly did let scamper by had been pre-chewed and tasteless. Now we had been dominated by sadists, or overlooked by the apathetic. The few that had something to coach chanced on us willing pupils, but those few are like drops of water within the barren region.

Right here’s our world now… the enviornment of the electron and the swap, the elegance of the baud. We dangle say of a provider already existing without paying for what is going to likely be dust-low-rate if it wasn’t bustle by profiteering gluttons, and you name us criminals. We explore… and you name us criminals. We gape after files… and you name us criminals. We exist without skin coloration, without nationality, without spiritual bias… and you name us criminals. You obtain atomic bombs, you wage wars, you raze, cheat, and deceive us and bewitch a witness at to dangle us think it is for our have appropriate, yet we are the criminals.

Optimistic, I am a felony. My crime is that of curiosity. My crime is that of judging other folks by what they are saying and non-public, now no longer what they witness like. My crime is that of outsmarting you, something that you may perchance well now no longer ever forgive me for.

I am a hacker, and here’s my manifesto. You would honest conclude this particular person, but you may perchance well now no longer conclude us all… in spite of the complete lot, we’re all alike.

~ The Sense of right and wrong of a Hacker aka The Hacker Manifesto – Written on January 8, 1986





  • Adrian Lamo – obtained media consideration for breaking into several excessive-profile laptop networks, including those of The New York Conditions, Yahoo!, and Microsoft, culminating in his 2003 arrest. Lamo turned into once finest identified for reporting U.S. soldier Chelsea Manning to Military felony investigators in 2010 for leaking a complete bunch of hundreds of sensitive U.S. authorities paperwork to WikiLeaks.
  • Albert Gonzales – an American laptop hacker and laptop felony who is accused of masterminding the blended bank card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007: the greatest such fraud in historical previous.
  • Andrew Auernheimer (identified as Weev) – Went to penal complex for using math in opposition to AT&T web page.
  • Barnaby Jack – turned into once a New Zealand hacker, programmer and laptop security professional. He turned into once identified for his presentation at the Dusky Hat laptop security convention in 2010, in which he exploited two ATMs and made them dispense unsuitable paper forex on the stage. Amongst his heaps of most important works had been the exploitation of assorted medical devices, including pacemakers and insulin pumps.
  • Benjamin Delpy – Mimikatz
  • DVD-Jon – He wrote the DeCSS tool, which decodes the Bellow material Crawl Blueprint ragged for DVD licensing enforcement.
  • Eric Corley (identified as Emmanuel Goldstein) – 2600
  • Gary McKinnon – a Scottish systems administrator and hacker who turned into once accused in 2002 of perpetrating the “greatest defense drive laptop hack of all time,” though McKinnon himself states that he turned into once merely purchasing for evidence of free vitality suppression and a mask-up of UFO job and heaps of applied sciences doubtlessly precious to the public. 👽🛸
  • George Hotz aka geohot – “The historical Fb engineer took on the giants of the tech world by developing the principle iPhone carrier-unlock tactics,” says Designate Greenwood, head of files science at Netacea, “followed about a years later by reverse engineering Sony’s PlayStation 3, clearing the manner for customers to bustle their very have code on locked-down hardware. George sparked an passion in a younger generation pissed off with hardware and tool restrictions being imposed on them and led to a recent scene of opening up devices, within the damage leading to raised security and more openness.”
  • Guccifer 2.0 – a persona which claimed to be the hacker(s) that hacked into the Democratic Nationwide Committee (DNC) laptop community and then leaked its paperwork to the media, the web site WikiLeaks, and a convention tournament.
  • Hector Monsegur (identified as Sabu) – an American laptop hacker and co-founding father of the hacking community LulzSec. He Monsegur grew to change into an informant for the FBI, working with the company for over ten months to support them in figuring out the utterly different hackers from LulzSec and connected groups.
  • Jacob Appelbaum – an American autonomous journalist, laptop security researcher, artist, and hacker. He has been employed by the University of Washington, and turned into once a core member of the Tor challenge, a free tool community designed to present on-line anonymity.
  • James Forshaw – one amongst the enviornment’s foremost worm bounty huners
  • Jeanson James Ancheta – On Could also 9, 2006, Jeanson James Ancheta (born 1985) grew to change into the principle person to be charged for controlling important numbers of hijacked computers or botnets.
  • Jeremy Hammond – He turned into once convicted of laptop fraud in 2013 for hacking the internal most intelligence firm Stratfor and releasing files to the whistle-blowing web page WikiLeaks, and sentenced to 10 years in penal complex.
  • John Draper – additionally known as Captain Crunch, Crunch or Crunchman (after the Cap’n Crunch breakfast cereal mascot), is an American laptop programmer and historical legendary mobile phone phreak.
  • Kevin Mitnick – Free Kevin
  • Kimberley Vanvaeck (identified as Gigabyte) – a scourge creator from Belgium identified for a long-standing dispute which full of life the rep security firm Sophos and one amongst its staff, Graham Cluley. Vanvaeck wrote several viruses, including Quis, Coconut and YahaSux (additionally known as Sahay). She additionally created a Intelligent virus (additionally known as “Sharpei”), credited as being the principle virus to be written in C#.
  • Lauri Admire – a British activist charged with stealing files from United States Authorities computers including the United States Military, Missile Protection Agency, and NASA by laptop intrusion.
  • Michael Calce (identified as MafiaBoy) – a security professional from Île Bizard, Quebec who launched a series of highly publicized denial-of-provider assaults in February 2000 in opposition to important commercial web sites, including Yahoo!,,, Dell, Inc., E*TRADE, eBay, and CNN.
  • Mudge – Peiter C. Zatko, higher identified as Mudge, is a community security professional, open offer programmer, creator, and a hacker. He turned into once the most prominent member of the excessive-profile hacker non-public tank the L0pht as successfully because the long-lived laptop and culture hacking cooperative the Cult of the Tiresome Cow.
  • Phineas Fisher – vigilante hacker god
  • PRAGMA – Normally identified as Impragma or PHOENiX, PRAGMA is the creator of Snipr, one amongst the most prolific credential stuffing tools accessible on-line.
  • The 414s – The 414s had been a community of laptop hackers who broke into dozens of excessive-profile laptop systems, including ones at Los Alamos Nationwide Laboratory, Sloan-Kettering Most cancers Center, and Safety Pacific Bank, in 1982 and 1983.
  • The Shadow Brokers – is a hacker community who first seemed within the summer season of 2016. They revealed several leaks containing hacking tools from the Nationwide Safety Agency (NSA), including several zero-day exploits. Particularly, these exploits and vulnerabilities focused endeavor firewalls, antivirus tool, and Microsoft products.[6] The Shadow Brokers before the complete lot attributed the leaks to the Equation Neighborhood threat actor, who had been tied to the NSA’s Tailored Access Operations unit.




Motion photos & TV

Motion photos



  • nmap – Port Scanner & Network Exploration Tool



Smartly-liked boards within the hacking scene.

  • HackForums (EN)
  • BlackHatWorld (EN)
  • RaidForums (EN)
  • OGUsers (EN)
  • SentryMBA (EN)
  • Nulled (EN)
  • UnKnoWnCheaTs (EN)
  • MPGH (EN)
  • (EN)
  • Leakforums (EN)
  • Antichat (RU)
  • (RU)
  • BHF (RU)
  • FuckAV (RU)


New to CTFs

For those who know nothing about CTFs or here’s your first try at doing a CTF, it is suggested you be taught over the Awesome CTF checklist first.

What’s a CTF?

CTF stands for Prefer The Flag, a kind of hacking tournament where you dangle gotten one goal: hack in and obtain the flag. Flags are positioned in varied locations — they’ll be in a file, within the database, caught into offer code, or in any other case — and your goal is to hunt all of them down.

CTF for Beginners

  • Bandit – The Bandit wargame is aimed at absolute inexperienced persons. It would educate the basics wanted in an effort to play heaps of wargames.

Smartly-liked CTFs

  • Hack The Field – Hack The Field is an on-line platform allowing you to check your penetration attempting out talents and change tips and methodologies with hundreds of parents within the safety discipline. Click below to hack our invite challenge, then initiating on one amongst our many dwell machines or challenges.
  • Hacker101 CTF – The Hacker101 CTF is a recreation designed to allow you to be taught to hack in a proper, rewarding atmosphere. Hacker101 is a free academic role for hackers, bustle by HackerOne. This CTF is one more integral component in our plans to dangle the enviornment a higher keep of living, one worm at a time.
  • Root Me CTF – Toughen your hacking talents in a lifelike atmosphere where the goal is to utterly compromise, « root » the host!
  • Hack This Residing – Hack This Residing is a free, proper and lawful training ground for hackers to check and amplify their hacking talents. Bigger than factual one more hacker wargames role, we are a living, respiration community with many active tasks in development, with a gargantuan selection of hacking articles and a gargantuan discussion board where customers can focus on hacking, community security, and factual about the complete lot. Tune in to the hacker underground and obtain full of life with the challenge.
  • Hack This! – Are searching to search out out about hacking and community security? Undercover agent how hacks, dumps and defacements are performed and proper your web page in opposition to hackers with HackThis!!
  • OverTheWire – is an major newbie resource. It gets you ragged to Linux, teaches you about a unfold of assorted tools, applied sciences, protocols etc. Even within the origin at the challenge it choices you within the lawful route while you may perchance well successfully be in doubt. This has positively helped me in more evolved CTF challenges.
  • picoCTF – is terribly appropriate for learning a wide quantity of talents or factual training mild ones. It involves reverse engineering, binary exploitation, web hacking and more. There may perchance be additionally a important alternative of walkthroughs on-line for every challenge may perchance well honest quiet it will likely be major to gape them.
  • Vulnhub – Vulnhub is a most popular platform that hosts appropriate boot2root vm’s that differ in verbalize. These too dangle heaps of on-line walkthroughs while you happen to need them.
  • The Nationwide Cyber League – The Nationwide Cyber League (NCL) is a biannual cybersecurity competition for excessive college and college students. The competition includes a series of challenges that lets in students to level to their ability to title hackers from forensic files, destroy into prone web sites, obtain successfully from ransomware assaults, and more

Are searching to chat about CTFs or tactics? Overview out /r/securityCTF.

Are searching to dangle your have CTF? Overview out ctfd.


Lessons (Free and Paid)

Certification Abet

Professor Messer Videos

How To Guides & Tutorials




Bug Bounty Programs

Receives a rate to gape vulnerabilities and security complications.


  • Pc Fraud and Abuse Act (CFAA) – US – is a United States cybersecurity bill that turned into once enacted in 1986 as an modification to existing laptop fraud legislation (18 U.S.C. § 1030), which had been incorporated within the Total Crime Control Act of 1984. The legislation prohibits gaining access to a laptop without authorization, or in diagram over authorization.
  • Pc Misuse Act 1990 – UK – 1990 is a key portion of legislation that criminalises the act of gaining access to or modifying files kept on a laptop machine without appropriate consent or permission.



  • OpenDoor – OpenDoor OWASP is console multifunctional web web sites scanner. This application obtain all doable programs to login, index of/ directories, web shells, restricted access choices, subdomains, hidden files and important backups.
  • Raccoon – A excessive efficiency offensive security tool for reconnaissance and vulnerability scanning
  • dirmap – An evolved web directory & file scanning tool which can be more highly effective than DirBuster, Dirsearch, cansina, and Yu Jian.一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。
  • dirhunt – Dirhunt is a web based crawler optimize for search and analyze directories. This tool can obtain fascinating things if the server has the “index of” mode enabled. Dirhunt is additionally precious if the directory itemizing is now no longer enabled. It detects directories with counterfeit 404 errors, directories where an empty index file has been created to cover things and mighty more.




  • hashcat
  • HAT – HAT (Hashcat Automation Tool) – An Automatic Hashcat Tool for fashioned wordlists and rules to lope up the approach of cracking hashes all the diagram in which by engagements. Created for Linux based entirely entirely systems
  • John The Ripper
  • SentryMBA
  • Dusky Bullet

Password & Wordlists (HTTP/HTTPS) – working as of 10/2019



Google Dorks

Invaluable Github Sources

Awesome Lists

  • Awesome OSINT – A curated checklist of amazingly awesome OSINT
  • Awesome Malware Prognosis – A curated checklist of awesome malware evaluation tools and resources.
  • Awesome CTF – A curated checklist of Prefer The Flag (CTF) frameworks, libraries, resources, softwares and tutorials. This checklist objectives to support starters as successfully as seasoned CTF gamers to search out the complete lot connected to CTFs at one keep of living.
  • Awesome Hacking – A curated checklist of awesome Hacking.
  • Awesome Honeypots – A curated checklist of awesome honeypots, plus connected factors and mighty more, divided into lessons equivalent to Internet, providers and products, and others, with a concentrate on free and open offer tasks.
  • Awesome Incident Response – A curated checklist of tools and resources for security incident response, aimed to support security analysts and DFIR groups.
  • Awesome Vehicle Safety – curated checklist of awesome resources, books, hardware, tool, choices, other folks to seem at, and more frigid stuff about automotive security, automotive hacking, and tinkering with the functionality of your automotive.
  • Awesome Internet Safety – Curated checklist of Internet Safety materials and resources.
  • Awesome Lockpicking – A curated checklist of awesome guides, tools, and heaps of resources concerning to the safety and compromise of locks, safes, and keys.
  • Awesome Cybersecurity Blue Personnel – A series of awesome resources, tools, and heaps of sharp things for cybersecurity blue groups.
  • Awesome AppSec – A curated checklist of resources for learning about application security. Contains books, web sites, blog posts, and self-review quizzes.
  • Awesome Safety – A series of awesome tool, libraries, paperwork, books, resources and frigid stuff about security.
  • Awesome Pentest
    A series of awesome penetration attempting out resources, tools and heaps of sharp things

Cracking & Bruteforce


  • WPScan – WPScan is a free, for non-commercial say, dim box WordPress Vulnerability Scanner written for security professionals and blog maintainers to check the safety of their WordPress web sites. Could also very successfully be ragged to gape usernames and bruteforce logins.
  • WordPress Exploit Framework – WPXF. A Ruby framework designed to support within the penetration attempting out of WordPress systems.
  • CMSeeK – CMS Detection and Exploitation suite – Scan WordPress, Joomla, Drupal and over 180 heaps of CMSs

Some distance away Administration & Payloads

  • pupy – Pupy is an opensource, noxious-platform (Windows, Linux, OSX, Android) far away administration and post-exploitation tool mainly written in python
  • BYOB (Invent Your Occupy Botnet) – BYOB is an open-offer challenge that offers a framework for security researchers and developers to obtain and characteristic a total botnet to deepen their belief of the pleasing malware that infects hundreds and hundreds of devices per annum and spawns contemporary botnets, in train to enhance their ability to dangle counter-measures in opposition to these threats.
  • QuasarRAT – Free, Launch-Source Some distance away Administration Tool for Windows

Red Personnel

  • Antivirus Evasion – Lots of Antivirus evasion tools
  • UACMe – Defeating Windows Consumer Legend Control by abusing built-in Windows AutoElevate backdoor.
  • Genesis Scripting Engine (gscript) – framework to all of sudden implement custom droppers for all three main running systems
  • SlackPirate – Right here’s a tool developed in Python which makes say of the native Slack APIs to extract ‘fascinating’ files from a Slack workspace given an access token.
  • Empire – Empire 3.0 is a PowerShell and Python 3.x post-exploitation framework.


  • Gophish – Launch-Source Phishing Toolkit
  • SocialFish – Academic Phishing Tool & Knowledge Collector
  • Blackeye – The most complete Phishing Tool, with 32 templates +1 customizable
  • Hidden Anticipate – Contemporary Phishing Tool With Developed Functionality
  • Evilginx2 – Standalone man-in-the-middle attack framework ragged for phishing login credentials along side session cookies, taking into myth the bypass of 2-ingredient authentication
  • Modlishka – Modlishka is a highly effective and versatile HTTP reverse proxy. It implements a utterly recent and enticing methodology of coping with browser-based entirely entirely HTTP traffic waft, which lets in to transparently proxy multi-enviornment vacation living traffic, both TLS and non-TLS, over a single enviornment, with no requirement of putting in any additional certificates on the patron. What does this precisely suggest? Briefly, it merely has heaps of doable, that may perchance well honest additionally be ragged in many say case scenarios.


  • RouterSploit – The RouterSploit Framework is an open-offer exploitation framework dedicated to embedded devices.


  • Fluxion – MITM WPA attack toolset
  • howmanypeoplearearound – Count the alternative of parents round you 👨‍👨‍👦 by monitoring wifi indicators 📡
  • Wifiphisher – The Rogue Access Level Framework
  • wifite2 – Rewrite of the favored wireless community auditor, “wifite”
  • wifijammer – Repeatedly jam all wifi customers and access choices internal differ. The effectiveness of this script is constrained by your wireless card. Alfa playing cards appear to successfully jam internal about a block radius with heavy access level saturation. Granularity is given within the choices for more perfect focusing on.
  • hashcatch – Prefer handshakes of nearby WiFi networks automatically
  • pwnagotchi – Pwnagotchi is an A2C-based entirely entirely “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi atmosphere in train to maximize the crackable WPA key material it captures (both by passive sniffing or by performing deauthentication and association assaults). This material is quiet on disk as PCAP files containing any create of handshake supported by hashcat, including fleshy and half WPA handshakes as successfully as PMKIDs.
  • bettercap – The Swiss Military knife for 802.11, BLE and Ethernet networks reconnaissance and MITM assaults.



  • LaZagne – The LaZagne challenge is an open offer application ragged to retrieve hundreds passwords kept on a local laptop. Each tool stores its passwords using heaps of tactics (plaintext, APIs, custom algorithms, databases, etc.). This tool has been developed for the cause of finding these passwords for the most recurrently-ragged tool
  • Sluggish script
  • Sonar.js – A framework for figuring out and launching exploits in opposition to internal community hosts. Works by WebRTC IP enumeration, WebSocket host scanning, and external resource fingerprinting.


Working Systems


  • Tails – The Amnesic Incognito Are living Blueprint. Tails is a dwell machine that objectives to defend your privacy and anonymity. It lets you make say of the Files superhighway anonymously and circumvent censorship almost anywhere you plod and on any laptop but leaving no hint unless you search files from it to explicitly.
  • Whonix – A High Safety Draw of Surfing the Files superhighway. Whonix is a desktop running machine designed for evolved security and privacy.
  • QubesOS – Qubes is a security-oriented, free and open-offer running machine for internal most computers that lets in you to securely compartmentalize your digital life.


  • Kali Linux/r/KaliLinux – a Debian-derived Linux distribution designed for digital forensics and penetration attempting out.
  • Parrot OS/r/ParrotOS – a Linux distribution based entirely entirely on Debian with a concentrate on laptop security. It’s designed for penetration attempting out, vulnerability review and mitigation, laptop forensics and nameless web taking a witness.
  • BlackArch – an Arch Linux-based entirely entirely penetration attempting out distribution for penetration testers and security researchers.

Files superhighway hosting

  • Debian – The Licensed Working Blueprint
  • FreeBSD – FreeBSD is an running machine ragged to energy contemporary servers, desktops, and embedded platforms.
  • Ubuntu – Ubuntu is an open offer tool running machine that runs from the desktop, to the cloud, to your complete web connected things.
  • Fedora – Fedora creates an modern, free, and open offer platform for hardware, clouds, and containers that lets in tool developers and community members to obtain tailored solutions for his or her customers.
  • CentOS – a Linux distribution that offers a free, endeavor-class, community-supported computing platform functionally like minded with its upstream offer, Red Hat Enterprise Linux (RHEL).
  • Windows Server 2019


  • LineageOS/r/lineageos – A free and open-offer running machine for loads of devices, based entirely entirely on the Android mobile platform.
  • GrapheneOS/r/GrapheneOS – GrapheneOS is a privacy and security focused mobile OS with Android app compatibility.


  • Mint – Linux Mint is an trim, easy to make say of, as much as this level and contented GNU/Linux desktop distribution.
  • Rasberrian – Raspbian is a free running machine based entirely entirely on Debian optimized for the Raspberry Pi hardware.

Subscribe to the newsletter news

We hate SPAM and promise to keep your email address safe

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

What’s Hot

To Top