TUXDB - LINUX GAMING AGGREGATE
 NEWS TOP_PLAYED GAMES ITCH.IO CALENDAR CHAT WINE SteamDeck
 STREAMERS CREATORS CROWDFUNDING DEALS WEBSITES ABOUT
 PODCASTS REDDIT 

 

SUPPORT TUXDB ON KO-FI

MENU

ON SALE

New Twitch streamer aggregation implemented (#FuckTwitch) due to Twitch's API issues (more info on my Discord )


Name

 Grey Hack 

 

Developer

 Loading Home 

 

Publisher

 Loading Home 

 

Tags

 

Simulation 

 

MMO 

 

Singleplayer 

 

 Early Access 

Release

 2017-12-14 

 

Steam

 € £ $ / % 

 

News

 400 

 

Controls

 Keyboard 

 

 Mouse 

 

Players online

 32 

 

Steam Rating

 n/a 

Steam store

 https://store.steampowered.com/app/605230 

 

SteamSpy

Peak CCU Yesterday

  

Owners

 0 .. 20,000 +/-  

 

Players - Since release

  +/-  

Players - Last 2 weeks

  +/-  

Average playtime (forever)

 0  

Average playtime (last 2 weeks)

 0 

Median playtime (forever)

 0 

Median playtime (last 2 weeks)

 0 

Public Linux depots

 Grey Hack Linux [515.12 M] 




LINUX STREAMERS (1)
tontonayo




[Nightly] Update v0.7.2120a - Revamped Exploit System.


The first iteration of the new exploit system is ready!
You can see more details about the update here.

This system is based on the libraries that are in the operating system.

Now some programs need to have certain libraries installed to work. In next updates this number will be increased.

The main program to start exploring the exploits system is scanlib, which you can find in the hackshops. This program is based on the new metaxploit library. As the vulnerabilities of the programs are patched, scanlib will not be able to scan the new vulnerabilities unless you update the metaxploit library.

You can check the source code of this program in the Manual. The new classes and methods have been added to the Manual too.

All exploits are procedurally generated, as well as their names. At the moment only the option to download the source code is available from hackshops. The download of the compiled version will be added soon.

Currently the system has ready the main vulnerability, buffer overflow, on which exploits and attacks that can be made are based. In the next updates this system will expand to add more modules and therefore more actions as well as other main vulnerabilities besides buffer overflow, such as code injection and more.

In this first iteration of the system there are some parts that are not yet ready and will be completed soon:


  • A failed attack attempt leaves no log in the system.
  • The Social Engineering part related to the exploits system is not implemented.

Also note that in this version, the npcs do not upload the versions of the updated libraries to the stores although the admins update them on the computers.
As a workaround you can take the updated library of some npc. Also as a temporary method reinstalling the service the library is updated to the latest version if there is one.

As always I am open to feedback and suggestions, happy hacking!


[ 2019-05-01 07:02:39 CET ] [ Original post ]