• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

  1. protectaccount

    Udemy Kali Linux for Advanced Pen Testing and Ethical Hacking

    Kali Linux is the penetration-testing professional’s main tool, and includes hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course, Malcolm Shore teaches you advanced pen testing with Kali, including stealthy testing, privilege escalation, and pivoting...
  2. NIZO

    Method/Tut CYBERSECURITY WITH LINUX

    *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  3. protectaccount

    Udemy OpenVas Basic to Advanced With Kali Linux

    With the growing number of cyber attacks, system invasions, data theft, malware attacks such as Ransomware among others, vulnerability management to prevent invasions and ensure information security has become an indispensable task for IT professionals and organizations in general. In addition...
  4. protectaccount

    Udemy Demythifying Linux Virus Engineering

    Have you ever wondered how a computer virus runs and spreads? Assuming you possess some knowledge of computer systems, this course will guide you through the intricacies of virus engineering. You will learn how they exploits design trade-offs in computer operating systems and user programs to...
  5. protectaccount

    IT & Software Linux Hardening

    Are you a Linux systems administrator seeking to learn the best practices for securing your network? New threats are emerging every day, and as an administrator, you need to stay ahead of threats. In this course, Corey Holzer takes you through hardening for the system level, services, and user...
  6. protectaccount

    Udemy RHCSA – Red Hat Enterprise Linux Administration Training+LAB

    Are you ready to dive into the world of Linux system administration? Our RHCSA Essentials course is designed to equip you with the skills and knowledge needed to become a proficient Red Hat Certified System Administrator. In this comprehensive course, you’ll delve into the essentials of Linux...
  7. protectaccount

    Udemy Kali Linux Tutorial for Ethical Hacking & Penetration Test

    Welcome to the “Kali Linux Tutorial for Ethical Hacking & Penetration Test” course Mastering Kali Linux for Ethical Hackers and Penetration Testers with tools like Wireshark, NMAP, Metasploit, Burp Suite Today, many critical systems continue to work on the Linux operating system Because Linux...
  8. protectaccount

    Udemy Linux Privilege Escalation Course 2024

    Are you ready to delve deep into the world of Linux privilege escalation? In this comprehensive course, you’ll master the art of elevating your privileges on Linux systems, equipping you with essential skills to defend against potential security breaches and enhance your overall cybersecurity...
  9. protectaccount

    Udemy Linux Redhat Certified System Administrator (RHCSA – EX200)

    Are you looking for a course that can prepare you to pass for Redhat9 certification exam? If yes, then look no further because this course is designed for students who want to prepare for RHCSA exam in the SHORTEST amount of time!!!. I will hold your hand and teach you everything you need to...
  10. protectaccount

    IT & Software Specialized Exploits: Windows and Linux x32 Shellcode

    Understanding the intricacies of system vulnerabilities and mastering exploit techniques is crucial in the cybersecurity field. Understanding the anatomy of shellcode gives you the edge when it comes to offensive security, defensive security, and malware analysis. In this course, Specialized...
  11. protectaccount

    Udemy Linux Mastery: Real-World Job Simulation Projects 2024

    “Welcome to ‘Linux Mastery: Real-World Job Simulation Projects,’ a course carefully designed for those eager to deepen their expertise in Linux and apply their knowledge in real-world scenarios. This course stands out by offering hands-on, practical experience through a series of job simulation...
  12. protectaccount

    Udemy Kali Linux Essential Training

    For ethical hackers, from beginners through to the most experienced professionals, Kali Linux provides the most effective platform from which to run penetration tests. In this course, cybersecurity expert Malcolm Shore introduces you to the set of tools necessary for efficient and effective...
  13. protectaccount

    Udemy Ubuntu Class – Linux Administration & Monitoring

    Explore the world of Linux administration in this comprehensive course designed for both Windows and Linux users. Delve into system management, text editing, and IDE proficiency, while mastering password generation and correcting errors efficiently. Elevate your skills through process...
  14. protectaccount

    Udemy Linux Kernel Development Course

    Daniel McCarthy has worked in senior Linux kernel development positions creating third party kernel drivers for the Linux kernel for a private company. This course is designed for beginners who want to learn kernel development Have you ever wanted to create your very own Linux kernel module and...
  15. Deadpool

    PC Sid Meiers Civilization VII v1.3.0 Linux - Razor1911 - 25GB

    <----------------------------------------> Sid Meiers Civilization VII v1.3.0 Linux Razor1911 Release GroupRazor1911 GenreSimulation, Strategy Release Date10 Feb, 2025 Size25 GB Posted20/11/2025 Overview The award-winning strategy game franchise returns with a revolutionary new…...
  16. protectaccount

    Udemy Rocky Linux Practical Course – Linux Administration

    Welcome to the Rocky Linux Practical Course, the perfect course for anyone looking to get started with Rocky Linux and master the essential skills of system administration. Whether you’re new to Linux or transitioning from another distribution, this course is designed to guide you through the...
  17. protectaccount

    Course Linux Security & Network Hardening: Practical Defense

    This course equips you with essential knowledge and hands-on techniques to secure Linux systems, covering critical aspects of system logging, auditing, data security, and service hardening. Starting with System Logging and Auditing Essentials, you’ll learn how to set up secure Linux logging...
  18. protectaccount

    Udemy Zero-Trust Linux Administration: Complete Root Sudo Security

    Transform Your Linux Security Skills with Advanced Root Access Control and Sudo Mastery Are you ready to become a Linux security expert? This comprehensive course takes you from basic sudo knowledge to advanced enterprise-level privilege management, equipping you with the critical skills...
  19. Deadpool

    Windows Kali Linux - v2025.3 - 23/09/2025 - Windows Cracked

    <----------------------------------------> Kali Linux Version 2025.3 PlatformWindows Version2025.3 Size4.3 GB Updated23/09/2025 Overview Kali contains a vast array of hacker tools and utilities (password attacks, sniffing and spoofing, reverse engineering, ...). Hacking foreign...
  20. Deadpool

    Windows Paragon Linux File Systems for Windows - v7.0.29 - 26/10/2024 - Windows Cracked

    <----------------------------------------> Paragon Linux File Systems for Windows Version 7.0.29 PlatformWindows Version7.0.29 Size38.6 MB Updated26/10/2024 Overview Linux File Systems for Windows by Paragon Software is a unique tool which gives you full access to Linux volumes...
  21. protectaccount

    Udemy Linux and AI for Ethical Hackers

    Welcome to Linux for Ethical Hackers, a complete course designed to give you both the practical skills and the professional confidence you need to step into the world of cybersecurity. In this course, you will move step by step from the basics of Ethical Hacking to hands-on Linux commands...
  22. protectaccount

    Udemy Cybersecurity Lab: Windows Server, Wazuh, Nmap, Linux & AD

    Welcome to Active Directory Lab with Nmap & Hydra: Build a Windows Server 2022 & Linux Lab for CySA+ & Sec+. This course is designed for beginners who want real, practical cybersecurity skills — not theory, not memorization, and not overwhelming jargon. It’s the course I always wanted when I...
  23. protectaccount

    Udemy Use Kali Linux like a hacker with Red Team Tactics

    What is ethical hacking? Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security...
  24. carxproveteran

    Udemy Linux Commands Line Certification Prac. Test | 90+ Commands

    Linux Commands Line Certification Prac. Test | 90+ Commands Linux Command Line Practice Test | Linux File Management, User Permissions, Linux Shell Scripting, Networking Commands Current Price: Free Discount: 100% off Original Price: $19.99 What you will learn: Navigate the Linux command line...
  25. snake__security

    [Linux Persistence] | VIA SSH KEYS - PART 1

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  26. COMRAE911

    [Linux Persistence] | VIA WEB SHELL - PART 2

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  27. snake__security

    [Linux Persistence] | PRIVILEGED LOCAL ACCOUNT - PART 3

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  28. COMRAE911

    Linux Persistence] UNIX SHELL CONFIG - PART 4

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  29. snake__security

    [Linux Persistence] VIA CRON JOBS - FINAL PART 5

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  30. Saphyking

    ETHICAL HACKING

    Link:https://mega.nz/file/b5JxkawD#cfUV_kSoI-x8Nm4GuQ8NwuuLCCVx_aX8YSSiyLtTF_A
  31. protectaccount

    Book Linux For Beginners - The Ultimate Practical Guide To Operating System, Command Line and Programming. Improve Your Computer Skills and Become A C

    This document provides an introduction and overview of Linux for beginners. It discusses the history and development of Linux. Key people who have contributed to Linux development include Greg Kroah-Hartman, who maintains the Linux kernel, and Richard Stallman, who heads the Free Software...
  32. Legend@

    Attacking Active Directory Wi' Linux | Suss Out Actives

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  33. protectaccount

    Book Linux For Hacking For Install Test and Hack Tools

    This document provides an overview and table of contents for a book about installing and securing Linux. The book covers topics such as Linux installation, access control, administration, networking, monitoring systems, and backing up data. It also discusses hacking techniques but emphasizes...
  34. protectaccount

    Hacking With Kali Linux A Beginner's Guide To Study Penetration

    The document provides an introduction to hacking and penetration testing using Kali Linux. It discusses the history and types of hacking, including ethical versus unethical hacking. It also covers cybersecurity fundamentals and using tools in Kali Linux to conduct penetration tests and network...
  35. sijeb95991

    IT & Software Hacker vs Defender: Linux Servers

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  36. EarlHickey

    Open Source Face Recognition SDK for Windows and Linux

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  37. azamat41

    IT & Software A Cloud Guru – Certified Ethical Hacker (CEH) – Linux Academy’s Prep Course 2025-1

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  38. hack0_bin

    Winboat Run Windows apps on Linux

    Winboat Run Windows apps on Linux WinBoat lets you run Windows in a Docker container on Linux. It uses KVM and RemoteApp for seamless integration, creating the ideal sandbox for analyzing tools securely and in isolation. How Does It Work? WinBoat is an...
  39. hack0_bin

    HydraPWK2 penetration testing iso

    It is a Linux distribution that is an alternative to Kali Linux. Hydra (previously named by BlackTrack) is an Opensource project developed and founded by @me-joe for purposes oriented to the realm of industry. Link: *** Hidden text: You do not have sufficient rights to view the hidden text...
  40. crakyman

    Linux Zorin OS 18.0 Pro (x64) Multilingual Linux

    Zorin OS 18.0 Pro (x64) Multilingual Linux iNFO: Size: 7.57 GB Format: Rar/exe/iso/dmg Languages: Multilanguage, English, German... Compatibility: UNIX (64Bit) Zorin OS is the alternative to Windows and macOS designed to make your computer faster, more powerful, secure, and...
  41. mrwolf09

    Kali Linux cheat sheet for penetration testers

    Link:https://github.com/NoorQureshi/kali-linux-cheatsheet *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  42. Sebasmend

    Linux Rootkit Malware

    Link:https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware?utm_source=chatgpt.com Linux Rootkit Malware * Deep Dive (https://www.fortinet.com/blog/threat-research/deep-dive-into-a-linux-rootkit-malware?utm_source=chatgpt.com) #rootkits #linux
  43. Sebasmend

    * 0-click RCE exploit against the Linux kernel from KSMBD N-Days

    Link:https://github.com/BitsByWill/ksmbd-n-day Say hello to Eternal Tux🐧 * 0-click RCE exploit against the Linux kernel from KSMBD N-Days собака старая - трюки новые, в ядре 6.1.45 * подробный WriteUP (https://www.willsroot.io/2025/09/ksmbd-0-click.html) няшный exploit...
  44. vhacker518

    Multi/Others Method Hacking Wi-Fi networks using Evil Twin attack on Kali Linux | 2025

    Method : *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  45. Sebasmend

    CVE-2025-21692 * Linux kernel version 6.6.75 * WriteUp POC exploit #linux #exploit

    https://github.com/volticks/CVE-2025-21692-poc CVE-2025-21692 * Linux kernel version 6.6.75 * WriteUp POC exploit #linux #exploit
  46. Sebasmend

    Dirty Pageflags: Revisiting PTE Exploitation in Linux * writeUp + POC exploit

    https://ptr-yudai.hatenablog.com/entry/2025/09/14/180326 [RESPONDER] explotación de PTE en Linux * Explotación de writeUp + POC [RESPONDER]
  47. royal98

    Login:Pass Mail:Access Linux rat

    Download: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  48. mayoufi

    Udemy Learning Linux Command Line (2025)

    Released: 08/2025 Duration: 3h 4m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 357 MB Level: Beginner | Genre: eLearning | Language: English Having a basic understanding of the command line is critical for any Linux administrator and in this course, experienced author Scott Simpson covers...
  49. EarlHickey

    Run macOS apps on Linux with ease.

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
  50. Legend@

    mastering Kali Linux Advanced Penetration Testing

    Link: *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! *** *** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Top Bottom