Welcome, Guest
You have to register before you can post on our site.



Search Forums

(Advanced Search)

Forum Statistics
» Members: 9
» Latest member: axapybip
» Forum threads: 43
» Forum posts: 136

Full Statistics

Online Users
There is currently 1 user online
» 0 Member(s) | 1 Guest(s)

Latest Threads
TP 1.3 and Wifite PMKID A...
Forum: General:
Last Post: LittlePAW
11-05-2018, 03:17 AM
» Replies: 43
» Views: 288
WiFi-autopwner ( adjusted...
Forum: Packages & Drivers:
Last Post: r1sen
11-05-2018, 02:09 AM
» Replies: 7
» Views: 84
Airgeddon 8.11 ( captive ...
Forum: General:
Last Post: LittlePAW
11-05-2018, 12:17 AM
» Replies: 1
» Views: 27
booting with grub on a us...
Forum: General:
Last Post: r1sen
11-02-2018, 01:27 AM
» Replies: 6
» Views: 48
v1.3 first run
Forum: General:
Last Post: r1sen
11-02-2018, 12:45 AM
» Replies: 7
» Views: 37
How Set Display Resolutio...
Forum: General:
Last Post: LittlePAW
11-02-2018, 12:24 AM
» Replies: 10
» Views: 50
Where's the appsbrowser/p...
Forum: Release Notes:
Last Post: r1sen
11-01-2018, 11:14 PM
» Replies: 0
» Views: 20
Hashcat 5.0.0
Forum: Packages & Drivers:
Last Post: r1sen
10-31-2018, 04:18 AM
» Replies: 0
» Views: 16
v1.3 - released!
Forum: News:
Last Post: r1sen
10-28-2018, 01:45 PM
» Replies: 0
» Views: 74
JohnTheRipper ( ...
Forum: Packages & Drivers:
Last Post: r1sen
10-24-2018, 04:48 PM
» Replies: 0
» Views: 10

  Where's the appsbrowser/package manager?
Posted by: r1sen - 11-01-2018, 11:14 PM - Forum: Release Notes: - No Replies

Effective as of release v1.3

Very simple - the core utility is still present, the wbar launcher icon was removed via the removal of the appbrowser *.desktop file from the Xprogs package. Along with this then mirrors package has been removed as well removing the TCL repository listings from the appbrowser utility. Why? Quite simply at this point initiating any core update via the TCL repositories or downloading packages that fetch dependencies and write over existing TinyPaw core or lib files will render your installation unstable and more then likely unusable. At this time I do not have a dedicated repository that can be listed in the mirrors extension and accessible via the appbrowser utility and to minimize accidental system corruption the tools accessibility has been buried but not removed for the hope of being able to provide an accessible repository in the future.

At this time, as a build release is rolled out it is as up to date as it will be until the next build is rolled out. Any packages or libraries released in between can be installed manually as has been documented across this forum and others.

For more information on the risks of updating or writing over TP extension with ones fetched from the TCL repository please view this wiki page from the TinyPaw-Linux sourceforge page:


For more information on the process of manually installing packages , libs or updates please view this thread on installing packages:


Otherwise if you are booting and running TinyPaw as LIVE then you need not worry about applying additional updates or packages - wait for the next release build is published.

Print this item

  How Set Display Resolution
Posted by: LittlePAW - 11-01-2018, 09:38 PM - Forum: General: - Replies (10)

I'm a new TP user, and I'm trying it in Virtualbox, virtualized the screen is square, but my monitor is widescreen, how I can set the resolution, I can't find it

Print this item

  Hashcat 5.0.0
Posted by: r1sen - 10-31-2018, 04:18 AM - Forum: Packages & Drivers: - No Replies

By request of the TinyPaw community and accidental exclusion on my part, here is hashcat v5.0.0

What is hashcat?

hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking.


Quoted from the project github: https://github.com/hashcat/hashcat






1.) Download the extension from either of the above repositories.'

2.) Copy the extension to your (*/tce/optional/) directory.

3.) Open your onboot.lst file located in your (*/tce/) directory and make the following changes:

- add line item: hashcat-5.0.0.tcz

*make sure to include one extra empty line at the bottom of your onboot.lst*

4.) Save the changes you've made by either "file+save" or "cntl+s" and close your editor.

5.) Reboot your system and hashcat will be ready to use.

Print this item

  TP 1.3 and Wifite PMKID Attack
Posted by: LittlePAW - 10-31-2018, 03:19 AM - Forum: General: - Replies (43)

Risen, thanks for v.1.3, many bugs fixed, I waited this version much because of PMKID atack, I want try it, but I cant with v 1.3, Wifite write, Skipping PMKID, because is without hashcat dependence, I never used this attack, the new wpapcap2john have PMKID support, I ask to you: Is possible (with hashcat dependence) take the PMKID with Wifite, and convert the captured file with wpapcap2john? If the answer is Yes, is unacceptable this Wifite dependence, but..., can you add hashcat in an 1.3.1?

Print this item

  booting with grub on a usb stick
Posted by: efasnu - 10-31-2018, 12:48 AM - Forum: General: - Replies (6)

Can not boot the ISO, no problems with TCL 9.0 but TP 1.2Z.1 boots to base only no extentions loaded.

Booting the kernel and initrd works at least to the desktop, have not tested all the programs to see if they work.
Had to rename cde to tce and all extentions loaded.

The system can be modified which somewhat defeats TCL's inherent security of booting a pristine system every time.
For my laptop, I have to add xf86-input-synaptics to use the mouse pad and
also put a work around for the broadcom b43 wireless chip.
Make dir /lib/firmware and copy the b43 firmware to it then unload and load the modules with modprobe.
The kernel will not load them if placed in the /usr/local spot TCL usually puts them, that method may be deprecated,
and it is not a tcz that is in use for the firmware.
Still testing that chip and the ATH9k_htc which uses the firmware in the tcz.
Can the boot media be unmounted and removed? get the 'device or resource busy' error

Print this item

  v1.3 first run
Posted by: efasnu - 10-31-2018, 12:46 AM - Forum: General: - Replies (7)

Tried out v1.3, first run the screen stayed blank but back light was on, had to sys req to reboot.
Does hackedbox have the option of killing the X server with CTL-ALT-<backspace> like fluxbox?
on reboot the desktop showed up as normal and subsequent boots had no problems, just a glitch I guess.

I am booting using grub and boot the kernel and initrd but had to rename cde to tce for the extensions to load.
Seems to take a long time to shut down if back up is selected, I guess lots of files in home dir.
Times for a new system: v1.2Z.1 13 seconds, v1.3 about 3 minutes.
Would it be better for me to blacklist some of those directories from being backed up?

I use the boot option showapps and it reports mirrors.tcz not found is it even needed?

PcmanFM does not show the trash can in the side bar when box is checked in preferences.
It shows in places though.

what is [BOOT]/Bootable_NoEmulation.img used for?

Print this item

Star v1.3 - released!
Posted by: r1sen - 10-28-2018, 01:45 PM - Forum: News: - No Replies

New TinyPaw-Linux release build!

Almost a year and running, thanks to all the support so far.

In this build there has been some... changes, fluxion and linset will no longer be included by default in favor of airgeddon. Along with that seamonkey has also been dropped in favor of fifth. There has been many updates to firmware, drivers and core files, as well as scripts and tools, pyqt4 and almost qt4 entirely have been dropped in favor of pyqt5 and qt5. There have been many necessary tweaks and some bug hunting - I know the *.iso size has grown and I apologize, I have tried to shed just about every non essential package - hoping this is a more formidable stable release in comparison to previous builds.

Thank you for your support!

*Oh, BTW sourceforge automated serverside malware scan has flagged v1.3 as having malware/shell code within it. Let me be the first to say, it absolutely does - both EaST and RouterSploit contain live/active exploitation code and frameworks to launch it - So yes, yes it does contain this, and so has every version of TinyPaw-Linux. This release contains updates to EaST and the newest build (at the time of this posting) of RouterSploit, so new build, new modules, new exploit code - new signatures flagged by their malware scan*

Download available at:







Print this item

  JohnTheRipper ( jumbo archive incl )
Posted by: r1sen - 10-24-2018, 04:48 PM - Forum: Packages & Drivers: - No Replies

Entire John-The-Ripper- compiled however this package includes all JohnTheRipper standalone executable and lib files - the jumbo portion of JohnTheRipper includes various Perl, Python, Ruby, etc scripts that are... more or less experimental and there for not included by default. I have archived these additional files which is available as jtr-jumbo.zip which you can unzip and test, use, experiment with as you see fit.

Also, all standalone JohnTheRipper executables inflate themselves into you (/usr/local/bin/) directory making the accessible from your terminal/cli with the following:

sudo john

sudo bitlocker2john

sudo wpacap2john


Also included in this thread is a new copy of "crack.hackedbox" which replaces your current hackedbox submenu for "cracking" and included a "JohnTheRipper" submenu entry for launching the JohnTheRipper tools from your hackedbox drop down menu system.

*next TinyPaw release will have menu/submenu systems configured for (JTR) and any other package, this is only needed for tools which were released before the next build*

What is (JTR)?

John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), Windows, DOS, BeOS, and OpenVMS (the latter requires a contributed patch). Its primary purpose is to detect weak Unix passwords. Besides several crypt(3) password hash types most commonly found on various Unix flavors, supported out of the box are Kerberos/AFS and Windows LM hashes, as well as DES-based tripcodes, plus many more hashes and ciphers in "community enhanced" -jumbo versions and/or with other contributed patches.

Quoted from the project github: https://github.com/magnumripper/JohnTheRipper





JohnTheRipper installation:

1.) Download the jtr- extension from either of the above repositories.

2.) Copy the downloaded extension to your (*/tce/optional/) directory.

3.) Locate your onboot.lst files located in your (*/tce/) directory and make the following changes:

-Add line item: jtr-

*make sure to include one additional line of extra(white) space at the bottom of your onboot.lst*

4.) Save the changes you've made by either "file+save" or "cntl+s" and exit out of our text editor.

5.) Close all open windows and restart your system.

6.) Upon restart JohnTheRipper as standard tools will be available to launch from your terminal/cli:

sudo john

crack.hackedbox installation/replacement:

1.) Download the "crack.hackedbox" file from either of the above repositories.

2.) Copy the "crack.hackedbox" file and navigate to your (/home/tc/.hackedbox_tp/) directory.

3.) I recommend renaming the current crack.hackedbox file to "crack.hackedbox.1" in case you decide to revert back at a later time.

4.) After renaming the default crack.hackedbox file copy over the newly downloaded file in the same directory (/home/tc/.hackedbox_tp/).

*very important - DO NOT rename the downloaded file - hackedbox upon boot searches specifically for the menu item files - i.e. crack.hackedbox - renaming or removing this menu file will remove the "cracking" submenu from your TinyPaw hackedbox menu/submenu system*

5.) Once your new crack.hackedbox menu file has been copied over, the change will be instant - by right clicking on your desktop and selecting "cracking" from the drop down menu you will now see a new entry item "JohnTheRipper" which expands into and additional submenu for the JohnTheRipper bundle.

jtr-jumbo installation: *very simple*

1.) Download the "jtr-jumbo.zip" archive file from either of the above repositories.

2.) Navigate to your (/home/tc/Downloads/) directory.

3.) Open your terminal/cli and enter the following string:

cd Downloads

unzip jtr-jumbo.zip

4.) Now within your (/home/tc/Downloads/) directory you've now unzipped this archive creating a new folder within this directory (/home/tc/Downloads/jtr-jumbo/) which included all the various abstract and more or less experimental JohnTheRipper scripts.

These are scripts so they will needed to be launched from within your terminal/cli and in accordance to script type:

(*.pl files) - sudo perl + file_name
(*.py files) - sudo python / sudo python3.6 + file_name
(*.rb files) - sudo ruby + file_name
(*.sh files) - sudo bash + file_name


[Image: screenshot_tinypaw_v1-3_testing_2018-10-...9-png.4339]
[Image: screenshot_tinypaw_v1-3_testing_2018-10-...0-png.4340]

Included with JohnTheRipper:


Included with jtr-jumbo:


Originally posted on the Xiaopan OS forum: https://xiaopan.co/forums/threads/johnth...post-54497

Print this item

  Wireshark 2.6.4 ( QT )
Posted by: r1sen - 10-23-2018, 01:31 AM - Forum: Packages & Drivers: - No Replies

Wireshark 2.6.4 build for TinyPaw

Wireshark is the world’s foremost and widely-used network protocol analyzer. It lets you see what’s happening on your network at a microscopic level and is the de facto (and often de jure) standard across many commercial and non-profit enterprises, government agencies, and educational institutions. Wireshark development thrives thanks to the volunteer contributions of networking experts around the globe and is the continuation of a project started by Gerald Combs in 1998.
Quoted from project website: https://www.wireshark.org/

Compiled in system with QT and following libs as was v2.6.3:


*default in TinyPaw_v1.2Z.x*






1.) Download wireshark from one of the above repositories.

2.) Copy all downloaded files to your (*/tce/optional/) directory.

3.) Locate your onboot.lst file located in your (*/tce/) directory.

4.) Open your onboot.lst file and make the following adjustments:

- change any line item listings of: "wireshark-2.6.x-qt.tcz" and change it to: "wireshark-2.6.4-qt.tcz"

5.) Save all changes to your onboot.lst file and close your editor.

6.) Reboot your system and wireshark 2.6.4 should be ready for use.

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...1-png.4332]

Print this item

  RouterSploit 3.4.0 & pyPack_3.6_rev2
Posted by: r1sen - 10-21-2018, 02:40 PM - Forum: Packages & Drivers: - No Replies

New python-package extension for TinyPaw , as I have adopted a new standard for scripts - especially python and some r+rw and compatibility issues I am now embedding them into the core "/home/tc/" directories. That being said RouterSploit as a default tool will not be included until the next build release. However with the new python-packages extension zipped out , it contains every essential python3.6 module and bin files necessary to run RouterSploit 3.4.0 - so until the next release simple download and unzip the RSF source from the project Github: https://github.com/threat9/routersploit and once uncompressed you should have "routersploit-master" directory available within your "home/tc/Downloads" directory. From there you can initiate RSF from the terminal. Easy steps below:

First - ABSOLUTELY NECESSARY - python3.6-package extension & python3.6

python3.6 can either be installed from the appsbrowser/package manager or from your terminal:

-tce-load -wil python3.6

SourceForge: pyPack_3.6_rev2.tcz

BitBucket: pyPack_3.6_rev2.tcz

*TinyPaw must be installed - LIVE run need not worry , wait for the next build*


1.) Download the pyPack_3.6_rev2.tcz extension from one of the above repositories.

2.) Copy the pyPack_3.6_rev2.tcz extension to your (*/tce/optional/) directory.

3.) Open your onboot.lst file located in your (*/tce/) directory and make the following adjustment:

-Add line item: pyPack_3.6_rev2.tcz *adding one additional empty line at the end of your onboot.lst*

4.) Download the RSF source at: https://github.com/threat9/routersploit

5.) Navigate to your (/home/tc/Downloads/) directory and open your terminal and enter the following:

-unzip routersploit-master.zip

6.) At this step close all windows and reboot your system.

7.) Now once your system has rebooted and now your pyPack_3.6_rev2.tcz is active navigate back to your (/home/tc/Downloads/routersploit-master/) directory and once again open your terminal and this time enter the following:

-sudo python3.6 rsf.py

8.) Enjoy~

[Image: screenshot_tinypaw_v1-3_testing_2018-10-...3-png.4330]
[Image: screenshot_tinypaw_v1-3_testing_2018-10-...8-png.4331] Packaged python3.6 modules:


Originally posted on the Xiaopan OS forum: https://xiaopan.co/forums/threads/router...ev2.32933/

Print this item