Breaking News

Bluetooth 5 Will Be

Late last year we got an early look at  improvements  coming to the next version of Bluetooth, and now the Bluetooth Special Interest ...

Saturday, April 30, 2016

World Of Hacking! KALI LINUX

by Unknown  |  in Hacking at  9:44:00 PM


About the Kali Linux Distribution

Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.

Kali Linux Core Developers

forums
Mati Aharoni (muts) is the lead Kali developer, trainer and founder of Offensive Security. With over 10 years of experience as a professional penetration tester, Mati has uncovered several major security flaws and is actively involved in the offensive security arena.
forums
Devon Kearns (dookie) is an Offensive Security instructor, Kali Linux developer, the administrator of the Exploit Database, co-creator of the Metasploit Unleashed project, exploitation fanatic, and co-author of Metasploit: The Penetration Tester’s Guide.
forums
Raphaël Hertzog (buxy) is an experienced Debian developer and consultant, author of the well known Debian Administrator’s Handbook. He’s the packaging wizard in our team and manages our continuously growing development infrastructure.

Kali Linux Developers and Forum Moderators

forums
bolexxx has been administering the Kali forums (and previously BackTrack forums) for over 7 years now, keeping the forums running and spam free. 
forums
steev does our ARM development for Kali Linux. Steev has been working with and on arm devices since 2009 and is also a co-lead of the Gentoo ARM team.

forums
g0tmi1k has been a helping hand and active member since the days of remote-exploit and was promoted to a staff member in 2010.
forums
Sickness is an object of torture and abuse in Offensive Security, and often gets the bad end of our masochistic jokes. He also does kernel exploit stuff.

0 comments:

Proudly Powered by Blogger.