After Install Run These Command
----------------------------

sudo apt install mariadb-server mariadb-client php php-mysql php-gd libapache2-mod-php

sudo service mysql start
sudo mysql -u root -p
root
create user 'user'@'127.0.0.1' identified by 'pass';
grant all privileges on dvwa.* to 'user'@'127.0.0.1' identified by 'pass';
create user 'admin'@'%' identified by 'pass';
grant all privileges on *.* to 'admin'@'%' identified by 'pass';

sudo apt install phpmyadmin


wget -q -O - https://archive.kali.org/archive-key.asc  | apt-key add
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys ED05F7B2EC3C9224
apt update

deb http://http.kali.org/kali kali-rolling main non-free contrib
deb https://deb.parrotlinux.org/parrot/ rolling main contrib non-free



sudo add-apt-repository ppa:micahflee/ppa
apt install -y torbrowser-launcher
sudo apt install -y onionshare


sudo add-apt-repository ppa:backbox/six
sudo apt-get update



image loading
Kalu Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains working tools. You can install tools individually or in groups. Kalu Linux is compatible with existing Arch installs. For more information, see the installation instructions. Also, news is published on our website.
image loading
image loading
image loading
Kalu Linux was developed by Mr. AAKi of Hacker Computer School. It is a version and continuation of their previous Linux Penetration Testing distribution. The Metasploit Framework, a security development and execution tool, supports all platforms of the Metasploit project (s). Kalu Linux is a multi-platform solution accessible and available to IT security professionals and hobbyists. It has an ARM repository that integrates with the rest of its distribution and tools for ARM updates. It is available for a wide range of ARM devices and the ARM repository is constantly updated.  

Kalu Linux is not only a collection of various security programs, but also standard Debian-based and pre-configured to get you up and running. It is one of the open-source security packages from Ethical Hackers, containing a number of tools divided into categories. Open-source hacking tools contain a host of dependencies when installed on Linux as they need to be installed in a predefined order and the authors of the tools do not publish accurate documentation which makes life difficult for us. If you are interested in penetration testing and cybersecurity you will need some special tools to perform these tasks. These tools are pre-installed and done in Kalu Linux so you can use them without configuration. If you want to check for vulnerabilities in a website or know about security-related bugs in an application, use Kalu Linux.


Kalu Linux is a Debian-derived Linux distribution that is maintained by Hacker Computer School. It is designed as an operating system for penetration testers and functions, to put it simply, under the umbrella of cybersecurity analysis. You can familiarise yourself with the Potash system by demonstrating the tools provided by Potash to perform penetration tests. There are more than 600 permeability tests and hacking tools for powerful penetration that can handle complex interventions with no programming knowledge. You will not find heavy office applications or productivity tools here. Instead, AirCrack-NG provides WiFi network security checking, John the Ripper for password cracking, and an extensive collection of tools for penetration testing for all your cybersecurity needs. Kalu Linux ensures that since penetration tools tend to be written in English it provides true multilingual support. This allows more users to work in their native language and find the tools they need for the job. It is designed as an operating system for network analysts and penetration testers. An operating system designed to perform intrusion testing and vulnerability detection on various computer systems. As an open-source operating system, its many extensions and versions are created or developed for a specific purpose. This allows you to focus on network penetration, password cracking, and forensic tools, not the operating system. The last thing you want is compromised tools. This prevents you from customizing it to your design and kernel needs. It's a tool that you can hack and use, but it's hacking and taking advantage of something that's illegal. Tools that support ARMEL and ARMHF systems allow you to perform hacks without much effort.
Copyright 2023 Hacker Computer School
All Rights Reserved
Powered by Hacker's Group

Privacy Policy Terms And Condition Refund Policy