All About Hacking Based Operating Systems

I almost hate to admit it because it takes some of the “Prestige” away from “Being a Hacker,” but the fact of the matter is that most of the worlds most famous hackers and/or hacktivists aren’t really hackers at all – they merely just run Operating Systems designed around “Ethical Hacking” and “Penetration Testing,” the field of legalized hacking. In fact, I’m willing to bet that 95% of “Hackers,” or at least 95% of anyone whom calls themselves a hacker, aren’t necessarily hackers at all – they merely just run any one of the operating systems disclosed below. The people whom design these systems and/or build, program or code the tools inside of them are the real hackers – though they make up an extreme minority of the overall hacking population.

You might also be surprised to learn that nearly all of the worlds top hacking programs and operating systems aren’t necessarily some sort of big secret either, but rather, they are all free and open source – open to the public and 100% legal for anyone to own or download. On top of this, one of the most famous websites used by hackers to post and retrieve source codes for various exploits and tools – – is actually one of the worlds top 100 most trafficked websites.

However, it must be noted that while owning these programs, tools and systems is legal, using them without the proper licenses, certifications, consent or permissions can be illegal. For example, in order to perform their work, Penetration Testers usually have to pass some sort of written exam for certification/licensing, register with the Government as a public hacker, then sign a contract with a given company to attack their systems – usually designated on a certain time or day(s) and launched from behind a pre-defined or pre-designated number of IP Addresses. However, just as with anything else in life, there are ways around everything.

How To Hack Legally?

There are many ways you can learn computer hacking or the hacking arts, legally, from your home. For example, you can learn how to set up security on one computer, by hacking it from a different computer. Or, you can join an online chatroom and agree to hack some of your friends or friends systems. It is important to understand that the US Computer Fraud and Abuse Act directly states that “any unauthorized access to another persons devices, systems  or networks” is illegal, meaning that it is not illegal if you have authorization. Just find the right group of people and/or friends, and you can learn as much as you want – really.

Also, you can learn more about hacking and how to hack by simply entering different searches on Google or YouTube than any article you could possibly ever read – just saying.

Top Open Source Hacking Systems:

Kali Linux

See the source image

For anyone whom has ever watched the hit series “Mr. Robot,” you would know that this is Elliot’s Operating System of choice. Outside of television, Kali Linux is hands down the most popular hacking OS on the market. In fact, I’m willing to bet that anyone/everyone whom has ever thought about becoming a hacker or went on to become one has at one point or another used/run Kali Linux in their lifetime. It’s not for no reason that I top today’s list of hacking OS’s with Kali, it’s pretty much king.



See the source image

In terms of Ethical Hacking distro’s, ParrotSec OS is one of the newest systems on the market – but has quickly developed a massive following. For whatever reason, ParrotSec tends to be particularly popular amoungst some of the worlds newest or youngest hackers/hacking groups. What has always been the systems biggest claim to fame, and what I think has made it so popular over recent years, is it’s graphic package – which has essentially turned a world class hacking OS into something that’s visually stunning, which people therefore do not mind running on their computers on a regular basis.



See the source image

BlackArch Linux just so happens to be my personal Operating System of choice, or at least used to be. This is because the OS itself is extremely simple and straight forward, with literally thousands of exploits, tools programs built in. In terms of sheer quantity, the system is virtually unmatched. However, BlackArch has always had somewhat of a smaller following due to its generic user interface. While some people prefer things simple and straight to the point, seeing this as a positive, others look at it as boring – and therefore see it as a negative. Honestly, it’s all relative to your personal preferences.



See the source image

Truth be told I never heard of Backbox until very recently, but it just so happens to the OS of choice for Al1ne3737 – an international hacker, formerly of Pryzraky, whom has made a number of appearances on Rogue Media Labs. In an interview earlier this week, Al1ne3737 said that BackBox is her Operating System of choice because it only hosts a few hacking tools/exploits – only tools/exploits relevant to modern hackers. In addition to this, the OS comes in an extremely light weight package, therefore making it easier and faster to use – especially when duel booting.



See the source image

TAILS OS is typically known as an “incognito live system,” and this is because it’s almost exclusively designed around cyber security and privacy – which is why I include it here today. While you can not hack anything outright with this system, you can duel boot on it – creating a world class security system you can then utilize for hacking. While it may be a bit extreme, there is perhaps no better way to hide your tracks whilst hacking – which is growing ever more important to hackers worldwide.


Windows cmd

Yes, you read that right. Most people think that Windows cmd has no seat at the drivers table when it comes to hacking – but they are sorrily mistaken. In fact, you might not know it, but a mastery of Windows cmd is demanded of all of the US Governments top hackers – including the FBI. Combining Windows cmd with a duel boot of any hacking OS of your choosing for example, quite literally provides hackers with the best of both worlds – from both Linux and Windows.

Other Hacking OS’s:

Alternative Hacker OS:
Anonymous Operating System:
Cyborg Hawk:

Mastering The Command Lines:

cmd Commands Encyclopedia for Windows:
Windows cmd Encyclopedia:
Linux Bash Commands Encyclopedia:
Terminal Commands Encyclopedia for Mac:
DOS Commands Encyclopedia:

Understanding Linux:

Linux Installation and Initial Configuration:
Introduction to the Bash Shell:
Shell Scripting with Bash:
Linux Command Line Interface Fundamentals:


Network Pentesting using Python and Kali Linux:
Operating Systems:
Installing Duel OS’s Through Virtual Machines:

Duel Boot Tutorial:

[pdf-embedder url=””%5D

** If you can’t navigate the document, hover you mouse over the pdf (above) and look down at the bottom left and you will see an up and down arrow. These will help you flip the pages **


Ghost Squad Hackers Begin Rolling Out Source Codes To New Tools Coded by Different Group Members

I may be a little late to the game on this posting, but this doesn’t mean I don’t have some inside information on the subject. But, for anyone whom might not have been aware, throughout the course of June 2019 “S1ege,” “Neckros” and “D4rkstat1c” of Ghost Squad Hackers (GSH) have become very active in unveiling a series of highly advanced tools to the world. Interestingly enough, world famous botnet builder “0x20k,” also of Ghost Squad Hackers, released a statement this morning reading “lets say (GSH) isn’t that active anymore, but soon will” – perhaps indicating that a large scale operation may be immanent or has already long since been underway, especially considering the release of the following tools.


Entitled “Ghost Delivery” and released to the public for the first time on June 5th, the tool is a Python script used to generate obfuscated .vbs script that delivers payload (payload dropper) with persistence and windows antivirus disabling functions. Moreover, in statements to Rogue Media Labs, S1ege explained:

This tool creates a obfuscated .vbs script to download a payload hosted on a server to %TEMP% directory, execute payload and gain persistence by editing registry keys and creating a scheduled task to run payload at login. Features: Downloads payload to TEMP directory and executes payload to bypass windows smart screen. Disables Defender, UAC/user account control, Defender Notifications, injects/creates Command Prompt and Microsoft Edge shortcuts with payload path (%TEMP%/payload.exe), adds a scheduled task called “WindowsDefender” for payload to be run at login and obfuscates the vbs delivery script. This tool also has a serveo function to deliver obfuscated vbs script. Prerequisites Python 2.7

S1ege also goes on to specify that “Neckros and Necronomikon coded Javascript encoder.” Perhaps most importantly, S1ege also stated that the free version of this tool will not be available forever, so best get the source code while you still can. Consequentially enough, this might also explain why they would dump something like this out in the open, perhaps baiting buyers to pay for the more advanced version they’ve kept to themselves.

Source Code:


Unfortunately, D4rkstat1c is one of the members of Ghost Squad Hackers I’ve never worked with before – but learned of their recent releases via “M1r0x.” But, according to a press release posted online dated June 30th 2019, D4rkstat1c explains how their new tool “Red Ghost” is a “Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.” Moreover, new privilege escalation techniques were just added/updated last night – July 1st 2019.

Source Code:
Red Ghost README:

On top of this, D4rkstat1c also released the framework of another tool earlier in June called “Blue Ghost,” a self described “network tool designed to assist blue teams in banning attackers from Linux servers.” Going on to explain how “This tool utilizes various Linux network tools and bash scripting to assist blue teams on defending Debian and Ubuntu based servers from malicious attackers.

Source Code:
Blue Ghost README:

Backbox Linux Releases Update To Version 6.0

While I was away last month I got an interesting email/request by Backbox Linux Community Staff to release an article covering the release of their latest version; upgraded to version 6.0. Before getting into that however, for those of you whom might be unfamiliar with the product, Backbox Linux is an increasingly popular ethical hacking and penetration testing Linux distro – complete with all of the most modern tools and programs utilized by professionals working in these fields. In fact, Backbox Linux made Rogue Security Labs list of the most popular/widely used hacking-based Operating Systems earlier this year after receiving a review of it from “Al1ne3737” – formerly of “Pryzraky.

Learn More About Backbox & Other Hacking OS’s:

But, without any further adieu, here is everything you need to know about Backbox Linux‘s update to version 6.0, along with everything that’s new and where you can go to download the latest version.

About Backbox Linux

BackBox Linux is a penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit. It includes some of the most commonly known/used security and analysis tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation. It has been built on Ubuntu core system yet fully customized, designed to be one of the best Penetration testing and security distribution and more.

About The Update

As usual, this major release includes many updates. These include new kernel, updated tools and some structural changes with a focus on maintaining stability and compatibility with Ubuntu 18.04 LTS.

What’s New:

  • Updated Linux Kernel 4.18
  • Updated desktop environment
  • Updated hacking tools
  • Updated ISO Hybrid with UEFI support

System Requirements:

  • 32-bit or 64-bit processor
  • 1024 MB of system memory (RAM)
  • 10 GB of disk space for installation
  • Graphics card capable of 800×600 resolution
  • DVD-ROM drive or USB port (3 GB)

The ISO images for both 32bit & 64bit can be downloaded from the official web site download section.

Download Latest Version Here:

Kali Linux Rolls Out Second Update of 2019

Earlier today, May 22nd 2019, the popular Ethical Hacking Linux distro known as Kali Linux rolled out their 2nd update of 2019, following their last release in February 2019. Perhaps headlining today’s release is a new integration with NetHunter, allowing for a more seamless running of Kali Linux OS on Android mobile devices. The updates also features new integrations with ARM, cleaning up some of the file size problems and speeding up its operation. “This release largely features various tweaks and bug fixes but there are still many updated tools including seclists, msfpc, and exe2hex” reads their official press release. If you would like to learn more about all of the new integrations, you are invited to read the Kali Bug Tracker Change Log below.

Kali Bug Tracker Change Log:
Download Kali Linux v 2019.2:

ParrotSec OS: Popular Open Source Ethical Hacking Operating System Receives Second Update of 2019

This weekend the popular open source “Ethical Hacking” Operating System (OS) known as “ParrotSec” was updated with a number of key features. First an foremost was a complete overhaul to the systems theme and visual desktop appearance, as you can see via the Tweet by Marious Nestor included below. Additionally and perhaps most importantly, the OS now comes complete with a number of new security upgrades as well, such as Anonsurf and OpenNIC support, as well as downloads enforced through https protocols – something which was never an option in previous versions. If you would like to learn more about these changes, I invite you to read ParrotSec’s official press release via the links provided below.

Press Release:

Download Update:

Kali Linux Releases First Update of 2019

Developers at Kali Linux have officially rolled out their first update of 2019, releasing Kali Linux version 2019.1 to the public less than 24 hours ago. According to a press release made available on their website dated February 18th 2019, “The big marquee update of this release is the update of Metasploit to version 5.0, which is their first major release since version 4.0 came out in 2011.” Explaining that “Metasploit 5.0 is a massive update that includes database and automation APIs, new evasion capabilities, and usability improvements throughout.

Metasploit 5.0 Framework:
Metasploit Release Notes:

The release goes on to add that “Kali Linux 2019.1 also includes updated packages for theHarvester, DBeaver, and more. For the complete list of updates, fixes, and additions, please refer to the Kali Bug Tracker Changelog.

theHarvester Tool:
DBeaver Tool:
Kali Bug Tracker Changelog:

Lastly, developers at Kali also announced that “the 2019.1 Kali release for ARM includes the return of Banana Pi and Banana Pro, both of which are on the 4.19 kernel. Veyron has been moved to a 4.19 kernel and the Raspberry Pi images have been simplified so it is easier to figure out which one to use.” Adding that “there are no longer separate Raspberry Pi images for users with TFT LCDs because we now include re4son’s kalipi-tft-config script on all of them, so if you want to set up a board with a TFT, run ‘kalipi-tft-config’ and follow the prompts.

Download Kali Linux:

#OpOrangeNotice -Router/Iot Exploits, Botnet Payloads, Source/Shell Codes & More

So the other day I came across news that 400 international police offices and Government agencies worldwide were all teaming up together to ‘fight‘ back against “DDoS’ism.” Led by European Police (EUROPOL), in an attempt to bring down some of the worlds most (in)famous DDoS entities and/or take down persons known to be selling DDoS attacks for hire, international police are officially launching the largest operation of its kind. While the operation primarily revolves around the closing of xDedic and all of the clients associated with it, it’s fairly safe to assume that every major DDoS distributor/launcher around the world will also be at risk.

Learn More About EUROPOL Operation:

Before moving onto the meat of this article, throughout the past I’ve been known to have lent my talents/mind to international law enforcement and intelligence agencies. However, ever since going public not a single one of these offices seem to want to have anything to do with me, nor have they acknowledged a single one of the contributions I’ve made in the past. So, as a gift in kind to International Police and all of the millions of dollars in time, money, man power and resources they are surely going to be spending over the coming weeks and months to crack down on the proliferation of DDoS attacks around the world, I would like to share with them a little bit of my research.

Below you can find the scripts of various malware injections, botnet source codes, exploits, 0days and more, everything necessary to begin hijacking devices on the internet of things, infecting them and rounding them up to begin using them for whatever you want – say to launch DDoS attacks with, for example. All sources were leaked/compiled from Russia, with love. All files backed up internally, should any of the postings be taken down by law enforcement authorities 😉.

Python/per1 to run the scripts:

Slowloris Usage and DL Mirrors:

R-U-Dead-Yet? Download:

HPing2 Download:

hping [2 or 3] [TARGET] -p [PORT] –flood [PACKET TYPE] [OTHER OPTIONS]

4 most options to take a look @:

For advanced users:




Perl for Windows:



Tor Shammer: htpps://

 [ADB:5511 LOADER][PY] Jan 14th, 19 Never 102 Python
 [SONICWALL .LST] 2# Jan 14th, 19 Never 93 None
 [ADB EXPLOIT LOADER] Jan 3rd, 19 Never 126 Python
 [AVTECH LIST MAKER] Dec 30th, 18 Never 148 Python
 [AVTECH LOADER] Dec 30th, 18 Never 212 Python
 [VACRON CAM EXPLOIT LOADER][PYTHON][MIRAI] Nov 29th, 18 Never 141 Python
 [COUCHDB EXPLOIT LOADER][PYTHON] [MIRAI] Nov 29th, 18 Never 160 Python
 [NETGEAR RCE][METASPLOIT][7 FIRMWARE] 28/11/18 Nov 28th, 18 Never 129 None
 [ATLASSIAN JIRA RCE LOADER] #15/11/18 Nov 15th, 18 Never 186 None
 [CISCO PRIME INFRASTRUCTURE LOADER] UPDATE 15/11/18 Nov 15th, 18 Never 147 None
 [MICROSOFT WIRELESS DISPLAY ADAPTER 2] CE/BACV 08/11 Nov 8th, 18 Never 100 None
 [DELL OPEN MANAGER NTW 6.2.0] SQL BACKDOOR [PY] 0… Nov 8th, 18 Never 164 Python
 [ASUSTOR ADM ROUTER 3.1.0 EXPLOIT/LOADER] Nov 7th, 18 Never 95 None
 [ANOTHER ZTE VURN][DO IT YOURSELF] Nov 7th, 18 Never 122 Python
 [TP-LINK ARCHER C2 V3.0 EXPLOIT] Nov 7th, 18 Never 110 JSON
 [D-LINK ROUTERS 110/412/615/815 EXPLOIT] [PYTHON] Nov 7th, 18 Never 191 Python
 [D-LINK ROUTERS][DWR]COMMAND INJECTION 25/10 Nov 7th, 18 Never 147 Python
 [D-Link DSL-2750B EXPLOIT ][MS] Nov 7th, 18 Never 91 Python
 [NSG9000 EXPLOIT][FULL DIR] Nov 7th, 18 Never 74 Python
 [FELCOM 250 / 500 EXPLOIT/LOADER][ONLY VURN] Nov 7th, 18 Never 90 Python
 [JUMPSCALE EXPLOT LOADER][PRIVATE]31/10 Nov 7th, 18 Never 118 Python
 [ZTENR8000]EXPLOIT[INFECT 8 TYPE OF FIRMWARE 25/10 Nov 7th, 18 Never 102 Python
 [ZTE ZXDSL 831][ONLY VURN] Nov 7th, 18 Never 92 Python
 [D-LINK][PY27]LOADER/EXPLOIT Nov 7th, 18 Never 117 Python
 [RouterPWN][SHIT] Nov 7th, 18 Never 49 C
 DRUPALGEDDON EXPLOIT [PY] [OLDSHIT] Nov 4th, 18 Never 120 Python
 [PYTHON3]DRUPAL 7 EXPLOIT – LOADER Nov 4th, 18 Never 112 Python
 EPISERVER XXE LOADER-EXPLOIT [PY] Nov 4th, 18 Never 95 Python
 [Py] Windows SMB exploit Loader/Scan Nov 4th, 18 Never 132 Python
 [D-Link DSL 3782 EXPLOIT] Nov 4th, 18 Never 658 None
 [CISCO EXPLOIT LOADER] Nov 4th, 18 Never 256 Python
 [TR-064 LOADER] [OLD] Nov 4th, 18 Never 90 Python
 [GPON LOADER] ROUTERS EXPLOIT Oct 21st, 18 Never 125 Python
 [ZTE ]ROUTER LOADER EXPLOIT Oct 21st, 18 Never 137 Python
 convert.c Nov 1st, 18 Never 336 C
 routerpwn.c Jul 13th, 18 Never 1,120 C Jun 18th, 18 Never 678 Python
 Mirai Samples 2018 Apr 5th, 18 Never 1,069 None
 MemCache Amp Scanner Feb 27th, 18 Never 2,206 C
 MemCache Attack Script Feb 27th, 18 Never 1,927 C
 client.c Sep 7th, 17 Never 1,179 C Aug 27th, 17 Never 613 Perl Aug 25th, 17 Never 876 Python
 XML-RPC Attack Script Aug 16th, 17 Never 1,017 C
 ISAKMP Attack Script Aug 16th, 17 Never 842 C
 IPMI Attack Script Aug 16th, 17 Never 919 C
 LDAP Amp Scanner Aug 10th, 17 Never 2,777 C
 LDAP Attack Script Jul 29th, 17 Never 3,360 C
 bigbotPein Jun 24th, 17 Never 892 None
 client.c May 25th, 17 Never 1,182 C
 server.c May 25th, 17 Never 972 C
 CURRENT MIRAI BOTNETS Feb 3rd, 17 Never 3,495 None Jan 20th, 17 Never 888 Bash Jan 18th, 17 Never 805 Bash
 TELNET HONEYPOT LOGS Jan 14th, 17 Never 712 None
 LiGhT da Skid Oct 16th, 16 Never 1,238 None
 MIRAI BOTNET PAYLOAD Oct 12th, 16 Never 1,677 None
 MIRAI BOTNET PAYLOAD Oct 4th, 16 Never 1,806 None
 MIRAI BOTNET PAYLOAD Oct 2nd, 16 Never 1,634 None
 TELNET HONEYPOT LOLOGS Oct 2nd, 16 Never 1,011 None
 irssi.theme Aug 20th, 16 Never 698 None
 DB2-scan.c Apr 6th, 16 Never 1,090 C
 DB2.c Apr 6th, 16 Never 784 C
 RIP.c Apr 3rd, 16 Never 1,235 C
 conkyrc Mar 29th, 16 Never 547 None
 tftp-scan.c Mar 9th, 16 Never 1,324 C
 tftp.c Mar 9th, 16 Never 1,330 C
 tcp-amp.c Mar 9th, 16 Never 1,555 C
 bogus.c Jan 20th, 16 Never 878 C
 ntpscan.c Jan 1st, 16 Never 4,271 C
 dnsamp.c Dec 30th, 15 Never 3,001 C
 echoscan.c Dec 28th, 15 Never 827 C
 echo.c Dec 28th, 15 Never 925 C
 Booter DDoS API Dec 26th, 15 Never 5,064 PHP
 cfbypass.php Nov 16th, 15 Never 2,754 PHP
 inspircd.conf Oct 2nd, 15 Never 1,162 None
 xml_filter.php Sep 28th, 15 Never 1,208 PHP
 xml_scanner.php Sep 28th, 15 Never 2,395 PHP
 xml_flood.php Sep 28th, 15 Never 1,174 PHP
 esyn.c Sep 11th, 15 Never 1,238 C
 udp.c Sep 9th, 15 Never 3,178 C
 flux.c Aug 21st, 15 Never 965 C
 frag.c Aug 2nd, 15 Never 1,134 C
 psh.c Aug 1st, 15 Never 848 C
 ack.c Aug 1st, 15 Never 1,609 C
 rand.c Jul 20th, 15 Never 1,245 C
 filter.php Jul 14th, 15 Never 1,248 PHP
 Untitled Jul 5th, 15 Never 805 None
 atcp.c – Advanced TCP Flooder Jun 29th, 15 Never 3,256 C
 stcp.c Jun 17th, 15 Never 1,224 C
 csyn.c Jun 17th, 15 Never 1,601 C
 zsyn.c Jun 16th, 15 Never 1,612 C
 xsyn.c Jun 15th, 15 Never 3,054 C
 g3m.c Jun 4th, 15 Never 3,903 C
 poop.c Jun 4th, 15 Never 1,009 C
 joom.c Jun 3rd, 15 Never 1,243 C
 ntp.c May 30th, 15 Never 3,455 C
 vse.c May 28th, 15 Never 4,427 C
 dns.c May 22nd, 15 Never 2,765 C
 std.c May 16th, 15 Never 1,088 C
 kaitenstd.c May 16th, 15 Never 2,036 C
 xack.c May 16th, 15 Never 936 C
 nat-pmp.c May 15th, 15 Never 794 C
 xdmcp.c May 15th, 15 Never 741 C
 echo.c May 15th, 15 Never 691 C May 15th, 15 Never 1,393 Perl
 udp.c May 14th, 15 Never 3,921 C
 ssdp scanner May 14th, 15 Never 4,075 C
 ktx.c May 13th, 15 Never 1,071 C
 sentinel scanner. May 13th, 15 Never 995 C
 sentinel.c May 13th, 15 Never 1,176 C May 11th, 15 Never 1,677 Perl
 snmp scanner May 8th, 15 Never 2,158 C
 snmp.c May 7th, 15 Never 2,356 C
 drdos.c May 5th, 15 Never 1,172 C
 netbios scanner May 4th, 15 Never 2,004 C
 Untitled May 1st, 15 Never 925 None
 ESSYN.C NOW WITH ACK. Apr 29th, 15 Never 3,228 C
 esyn.c Apr 27th, 15 Never 727 C
 wizard.c Apr 27th, 15 Never 2,082 C
 dominate.c Apr 27th, 15 Never 2,877 C
 ttysniff.c Apr 27th, 15 Never 756 C
 syn.c Apr 25th, 15 Never 851 C
 sudp.c Apr 25th, 15 Never 4,369 C
 netbios.c Apr 24th, 15 Never 1,973 C
 mdns.c Apr 24th, 15 Never 1,212 C
 ssdpscan.c Apr 23rd, 15 Never 1,004 C
 ts3.c Apr 19th, 15 Never 2,741 C
 quake.c Apr 19th, 15 Never 685 C
 sack.c Apr 18th, 15 Never 769 C
 heartbeat.c Apr 17th, 15 Never 960 C
 IRC DoS Bot Apr 17th, 15 Never 2,229 C
 mdns.c Apr 17th, 15 Never 581 C
 netbios.c Apr 17th, 15 Never 543 C
 ssyn with fin. Apr 14th, 15 Never 1,624 C
 ack.c Apr 4th, 15 Never 773 C
 tcp.c Apr 4th, 15 Never 2,419 C
 zap.c Apr 4th, 15 Never 1,942 C
 ntp.c Mar 26th, 15 Never 9,862 C
 NTP.c Mar 25th, 15 Never 1,218 C
 sw.c Mar 24th, 15 Never 646 C
 se.c Mar 24th, 15 Never 1,425 C
 ssyn.c Mar 23rd, 15 Never 1,618 C Mar 21st, 15 Never 820 C
 ntp scanner Mar 21st, 15 Never 3,955 C
 chargen scanner Mar 21st, 15 Never 3,760 C
 scandns.c Mar 21st, 15 Never 3,923 C
 shit.c Mar 20th, 15 Never 869 C
 shit.c Mar 20th, 15 Never 642 C
 shit.c Mar 20th, 15 Never 569 C
 shit.c Mar 20th, 15 Never 624 C
 shit.c Mar 20th, 15 Never 1,054 C
 esyn.c Mar 19th, 15 Never 666 C
 esyn.c Mar 19th, 15 Never 701 C
 esyn.c Mar 19th, 15 Never 927 C
 ssdp.c Mar 17th, 15 Never 6,775 C
 ssdpscan.c Mar 16th, 15 Never 1,941 C
 bmb6.c Mar 16th, 15 Never 1,137 C
 chargen.php Mar 15th, 15 Never 890 PHP
 sudp.c Mar 15th, 15 Never 645 C
 esyn.c Mar 15th, 15 Never 493 C
 dnsamp.c Mar 15th, 15 Never 1,282 C
 shit.c Mar 15th, 15 Never 603 C
 shit.c Mar 15th, 15 Never 439 C
 shit.c Mar 15th, 15 Never 515 C
 Untitled Mar 15th, 15 Never 855 C
 SSDP.c Mar 14th, 15 Never 1,075 C
 rst.c Mar 14th, 15 Never 1,535 C
 DOMINATE.c Mar 14th, 15 Never 2,123 C
 g3m.c Mar 14th, 15 Never 889 C
 sudp.c Mar 14th, 15 Never 1,592 C
 ack.c Mar 14th, 15 Never 1,517 C
 fin.c Mar 14th, 15 Never 1,439 C
 urg.c Mar 14th, 15 Never 571 C
 psh.c Mar 14th, 15 Never 1,350 C
 syn.c Mar 14th, 15 Never 587 C
 ssdp.c Mar 14th, 15 Never 670 C
 WIZARD.c Mar 14th, 15 Never 1,144 C
 xmas.c Mar 14th, 15 Never 2,222 C
 chargen.c Mar 14th, 15 Never 3,576 C
 mssql.c Mar 14th, 15 Never 2,801 C

AnonOps Leaks ‘A Pirates Guide To Anonymous’ – Complete Online Hacking, Security, Programming & Video Tutorial Handbook

In all my years online I have never quite seen anything like this, but earlier today members of the AnonOps IRC released a comprehensive hacking guide featuring full lectures, tutorials and online courses from various pirated sources. Included in the leaked files are full certified Ethical Hacking training courses from The International Council of Electronic Commerce Consultants, study guides on hardware, software and crypto-currencies from Coursera, programming tutorials from the the Computing Technology Industry Association (CompTIA), and IT certification courses from the Cisco Certified Network Associate programme (CCNA), along with a ton of miscellaneous information.

A hacker going by the name of “ClaudiaD” is said to have been the primary source behind the leaked information below, allowing for the pirated material to be downloaded and published online in the first place. The study guide itself was assembled and released to the pubic by a hacker going by the name of “J0rn,” with contributions from “Anominous” – both presumably working off the AnonOps IRC. Due to the sensitive nature of the content contained, for the purposes of this article I am choosing to keep the exact location of the leak redacted – contact me via email if you would like more information.


No automatic alt text available.

Leak 1 | EC-Council’s Certified Ethical Hacker (CEH) Course: 

SQL Injection:
Scanning Networks:
Hacking Web Servers:
Hacking Web Applications:
Session Hijacking:
Social Engineering:
System Hacking:
Denial of Service:
Hacking Wireless Networks:
Malware Threats:
Evading IDS, Firewalls, and Honeypots:
Hacking Mobile Platforms:

Leak 2 | More Hacking Courses:

Introduction to Pentesting and Ethical Hacking with Kali Linux:
Introduction to Firewalls:
Introduction to Browser Security Headers:
Introduction to Wireshark:
Troubleshooting with Wireshark:
Wireshark 2.0:
Network Security Testing with Nmap:
All about buffer Overflows:
Network Pentesting using Python and Kali Linux:
Metasploit Basics:
CloudFlare Security:
Hack your API First:
Risk Identification, Monitoring, and Analysis:
Check Point Certified Security Administrator; Install & Deploy:
Cloud Security:
Cloud Computing:
Introduction to Pentesting using Metasploit:

Leak 3 | Coursera Training Courses:

Software Security:
Hardware Security:
Bitcoin & Cryptocurrency Tech:[Princeton+University].7z

Leak 4 | Programming:

C++ Fundamentals:
C++ Advanced Topics:
C Fundamentals:
C In Action:
Java Fundamentals:
Java from Scratch:
Introduction to Java:
Introductions to HTML:
Introduction To JQuery:
Introduction To CSS:
Introduction To Arduino:
Getting Started with AngularJS:
Building Angular & Node JS Apps:
ExtJS Desktop Fundamentals:
Python Fundamentals:
Python, Beyong The Basics:
Ruby 2.0:
Getting Started with BackBone JS:
Introduction To Powershell:
Raspberry Pi Home Server:
Raspberry Pi for Developers:

Leak 5 | Cisco CCNA Security:

Introduction To Network Security:
AAA & IP Security:
Firewalls & VPN’s:

Leak 6 | # CompTIA A+:

Computer Hardware:
Peripherals & Best Practices:
Operating Systems:
Mobile Devices & Troubleshooting:

Leak 7 | CompTIA Security+:

Network & Domain Security:
Network Architecture:
Network Operations:
Network Security 2:

Leak 8 | Linux:

Linux Installation and Initial Configuration:
Introduction to the Bash Shell:
Shell Scripting with Bash:
Linux Command Line Interface Fundamentals:

Leak 9 | Video Editing:

Adobe Premiere Pro CC Fundamentals:
Animation and Video Editing in Photoshop:
Color Correction and Grading in Adobe Premiere Pro and SpeedGrade:
Action Scene Editing Techniques in Adobe Premiere Pro:
Adobe Premiere Pro CS6 Setup (Software Itself, Not A Course):

Leak 10 | Miscellaneous:

Clean Code:
Test Driven Development with Brad Wilson:
The Fundamentals of Scrum Methodology:
Building A Successful Blog:
Building A High Traffic Profitable Blog:

Leak 11 | Other Resources:

Hacking PDF’s Extracted from
Alternative Cloud Services:

Image may contain: night and text

Anonymous Activist Publishes DDoS Tutorial Handbook

** For educational purposes only, use information at your own risk **

Before getting into this article, please note that DDoS attacks are punishable under international law and the Computer Fraud and Abuse Act. In publishing this article, Rogue Security Labs does not endorse launching attacks against any entities, persons, individuals, corporations or websites – I am simply just reporting “the news.” I am covering this story because in all my years managing online chatroom’s and forums, I have never seen anything like this.

A few days ago I managed to stumble across an online tutorial written by an unknown member of Anonymous through the Pastebin web service, describing different means, methods, programs and scripts used to conduct DDoS attacks and take websites offline. In the links and downloads provided below, you will find instructions on how to carry about different attack methods/styles, including “DDoSim,” a layer 7 DDoS simulator, “Slowloris,” a bandwidth attack exploiting HTTP headers, “ApacheKiller,” a DoS program used to crash a web servers using their own stored memory, “perl for Windows,” a DDoS script used to flood open ports on Windows devices, “pyLoris,” a DoS tool used to launch attacks using SOCKS proxies and SSL connections, “hping,” a DoS packet generator and analyzer for the TCP/IP protocols on the Command line, and “TorShammer,” a popular DDoS tool written in Python.

Full (un-Edited) DDoS Tutorial Handbook:


No automatic alt text available.

Miscellaneous Tips, Tricks & Security ‘Hacks’

The following information will help you both secure your computer straight from the start menu and help you restore you computer back to safety if it is ever compromised.

First, you should make sure that your firewall is turned on. Even if you know nothing at all about computers or security, turning on your firewall literally takes no skill, it is already pre-configured by your computer manufacturer and you just have to make sure that it is turned on. If you really want to take the time, I recommend going through your firewall’s settings, checking the rules and entering the terms onto a Google search just so you can learn yourself something new about them.

Second, if you haven’t done so already, you should encrypt your computer. If for some reason you are still unaware, “encryption” is just a fancy word for creating password entry. If you ever leave your computer unattended in a public setting or live in a house with multiple people, you should always makes sure that no one can use your computer without authorization. Meaning that when your computer starts, before anyone can physically access anything or do anything on it, they have to enter the correct password first. Setting this up is incredibly easy and you can edit or select this option straight from the settings on your computers start menu.

The next option is extremely critical, but is something which is often overlooked. You are going to want to make sure to disable remote access to your computer. Believe it or not, anyone whom knows anything about hacking can physically access/use your device through something as simple as Windows cmd if they share the same internet connection or know your IP Address. If you do not disable remote access to your computer you are essentially leaving the door wide open for anyone to walk through or exploit.

Lastly, if at any point in time you believe that you have downloaded any virus, Malware or Spyware, you can simply go to your computers start menu and search for “system restore.” All you have to do is find a date before you believe you contracted the virus, select it and restore you computers settings/files back to that date. This will restore your computers systems as it existed on that date. However, just note that while you will be losing the virus from your computer, you will also be losing all of the files, documents, pictures or anything else you have created or saved since that date. While it does not work every time or with some of its stronger versions, this should literally be your first move if you ever contract ransomware.

External Hard Drive

This next bit is something that I almost never see included in other online security tutorials, which is why I am including it here today. If you want a fool proof way to secure, protect and back up all of your most important files, you should invest in what is known as an external hard drive. You can buy a USB external hard drive in any major box store for anywhere from $75 – $200 and it fully ensures that if your computer ever gets compromised, all of your files and data is backed up.

External hard drives are extremely important if you wind up getting a serious computer virus, such as ransomware. An external hard drive will allow you to completely wipe your computers data, clear the virus off your systems and then re-load your files right back onto your computer as if nothing ever happened. Considering that most ransomware will charge your thousands of dollars to un-encrypt your data, an external hard drive back up is literally a $100 fix to a $1,000 problem. Always remember, backup, backup, backup your data – buy a USB!

Moreover, if you live in an at risk country and are ever worried about someone gaining remote access to or searching your computer, you can keep programs like Tor or TAILS on your external hard drive for safekeeping. If necessary, a USB is also much easier to hide or destroy if it ever comes to that point. You can also set up separate encryption for your USB, making it impossible to search without authentication.

How to Encrypt Your USB:

Learn Linux

Contrary to popular belief, even if you are using a “Windows Computer,” you do not actually have to run Windows as your primary operating system. While learning how to use and install Linux is not necessary and often times a useless nerd skill, there is no debating that Linux systems are far more secure than Windows or Apple will ever be. Therefore, if you are truly interested in learning a new skill or improving your cyber security practices, then learning Linux systems should be at the top of your priority list.

I am not going to teach you how to do this in this article or any other for that matter, that is what they make Google and YouTube for. Instead, I will just tell you what the world’s most secure operating system is; TAILS.

Download TAILS Here:

Why Windows Is More Secure Than Linux:

Sweet cmd Commands

If your network connection ever starts to become slow or your web pages simply aren’t loading as fast as normal, there is a simple trick that will automatically speed your internet connection back up, without disconnecting you from the internet or requiring your internet router to be reset. The best part is, not only will the following command sequence speed your internet connection back up, but it can also negate DDoS attacks and will kick any 3rd parties, such as hacker, off your computer/connection every time it is used.

Simply go to start menu, open cmd and type in the following sequence exactly as it is written below – don’t actually type “(enter),” that is simply where you press enter before typing the next command:

  • title H4x0r (press enter)
  • color a (enter)
  • echo off (enter)
  • cls (enter)
  • ipconfig/flushdns (enter)
  • ipconfig/release (enter)
  • ipconfig/renew (enter)

Please note that only the sequence in bold is necessary, the first part is just for fun 😛

Random Helpful Links

Test Hyperlinkes for Malicious/Hidden Content, Such As IP Loggers, Before You Click Them:

Test Recent Downloads for Malicious Content/Viruses:

Encrypt Your Hard Drive:

Encrypt Individual Your Files on Windows, Linux & Mac:

Enable BIOS Protection:

pfSense Firewall – The Worlds Most Used/Trusted Open Source Firewall:

How To Enable Quad9 DNS service from IBM:

How to Enable Cloudflare’s Privacy Based DNS Service: