-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …
-
Hey guys, I opened an issue here :
https://github.com/offensive-security/kali-arm-build-scripts/issues/137
Basically the problem is :
The AP is seen from other devices, but they can't connect t…
-
So I followed the install guide step by step and that brought me to this
site (offensive-security/nethunter-LRT) and I continued to follow all the steps.
Everything looked totally fine, the t…
-
Vulnerable Library - command-line-usage-4.0.1.tgz
Path to dependency file: /react-main/scripts/release/package.json
Path to vulnerable library: /react-main/scripts/release/package.json,/scripts/rel…
-
Hello again.
I am building KingK from source, and adding neccesary module support for NetHunter usage.
Mostly just adding HID Gadget patches to USB drivers from here:
https://github.com/pelya/and…
0E800 updated
5 years ago
-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …
-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …
-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …
-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …
-
```
What steps will reproduce the problem?
1. Run lazykali as root
2. Choose 4) Exploitdb
3. 1) Update Exploitdb
What is the expected output? What do you see instead?
I get the following error:
tar …