After Install Run These Command
----------------------------

sudo apt install mariadb-server mariadb-client php php-mysql php-gd libapache2-mod-php

sudo service mysql start
sudo mysql -u root -p
root
create user 'user'@'127.0.0.1' identified by 'pass';
grant all privileges on dvwa.* to 'user'@'127.0.0.1' identified by 'pass';
create user 'admin'@'%' identified by 'pass';
grant all privileges on *.* to 'admin'@'%' identified by 'pass';

sudo apt install phpmyadmin


wget -q -O - https://archive.kali.org/archive-key.asc  | apt-key add
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys ED05F7B2EC3C9224
apt update

deb http://http.kali.org/kali kali-rolling main non-free contrib
deb https://deb.parrotlinux.org/parrot/ rolling main contrib non-free



sudo add-apt-repository ppa:micahflee/ppa
apt install -y torbrowser-launcher
sudo apt install -y onionshare


sudo add-apt-repository ppa:backbox/six
sudo apt-get update



image loading
Kalu Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. The repository contains working tools. You can install tools individually or in groups. Kalu Linux is compatible with existing Arch installs. For more information, see the installation instructions. Also, news is published on our website.
image loading
image loading
image loading
Kalu Linux Developed by Mr. AAKi of Hacker Computer School, it is a version and continuation of their previous Linux Penetration Testing distribution. It supports all platforms of the Metasploit project (s), the Metasploit Framework, security development and execution tool. Kalu Linux is a multi-platform solution that is accessible and available to both IT security professionals and hobbyists. It has an ARM repository that integrates with the rest of the distribution into the mainline distribution and tools for ARM updates. It is available for a wide range of ARM devices and the ARM repository is constantly updated.  

Kalu Linux is not only a collection of various security tools installed that can be installed but also standard Debian-based and pre-configured to get you up and running. It is one of the open-source security packages from Ethical Hackers, which contains a number of tools that are divided into categories. Open source hacking tools contain a host of dependencies when they are installed on Linux as they need to be installed in a predefined order and the authors of the tools do not publish accurate documentation which makes life difficult for us. If you are interested in penetration testing and cybersecurity you will need some special tools to perform the tasks that are pre-installed and done in Kalu Linux so you can use them without configuration. If you want to check for vulnerabilities in a website or know about security-related bugs in an application, it is great to use Kalu Linux.



Kalu Linux is a Debian-derived Linux distribution that maintains Hacker Computer School. It is designed as an operating system for penetration testers and functions, to put it simply, under the umbrella of cybersecurity analysis. You can familiarise yourself with the potash system by demonstrating the tools provided by potash to perform penetration tests. There are more than 600 permeability tests and hacking tools for powerful penetration that can handle complex interventions with little programming knowledge. You will not find heavy office applications or productivity tools here. Instead, AirCrack-NG provides WiFi network security checking, John the Ripper for password cracking and an extensive collection of tools for penetration testing for all your cybersecurity needs. Kalu Linux ensures that since penetration tools tend to be written in English it provides true multilingual support that allows more users to work in their native language and find the tools they need for the job. It is designed as an operating system for network analysts and penetration testers. An operating system designed to perform intrusion testing and vulnerability detection on various types of computer systems. As an open-source operating system, its many extensions and versions are designed or developed for a specific purpose or purpose. This allows you to focus on the use of network penetration, password cracking and forensic tools, not the operating system. The last thing you want is for the tools you use to be compromised.This prevents you from customizing it to your design and kernel needs. It's a tool that you can hack and use, but it's hacking and taking advantage of something that's illegal. Tools that support ARMEL and ARMHF systems allow you to perform hacks without much effort.
Copyright 2022 Hacker Computer School
All Rights Reserved
Powered by Hacker's Group

Privacy Policy | Terms And Condition