Is it dangerous to install hacking tools on my private linux machine?Are there any hardware diagnostic tools?How to install vmware tools?How do I install development tools for 12.10?Install python setup tools for Ubuntu 12.04Kali Linux tools on Ubuntu 15.04Is it possible to install sketch and zeplin in Ubuntu?

What plausible reasons why people forget they didn't originally live on this new planet?

The use of SlotSequence in If[#1 > #2, ##] &

Truth table generator for an arbitrary function

Given a Fibonacci number , find the next Fibonacci number

What do you do when brand new pads are rubbing on new rotor? It smokes and smells so bad and it seems like it is going to catch on fire

Can Chill Touch prevent Regeneration?

Does using an img title attribute in addition to the alt attribute help image SEO?

Why apt asking to uninstall GIMP when installing ardour?

Replacing each letter with the letter that is in the corresponding position from the end of the English alphabet

Do I need a visa for Japan as a New Zealand Citizen?

Repeating Numbered Items in Beamer

Heat-shrink tubing available as a roll like adhesive tape?

How was the space shuttle fuelled?

In this scene from the novel, 'The Martian', by Andy Weir, how does Mark Watney store hydrogen made from water in the tank?

What does "away to insignificance" mean?

PUTTY - Most insecure SSH client?

As a vegetarian, how can I deal with microwaves smelling of meat and fish?

Is there a minimal approach speed for airliners during rush hour?

What is an idiom, phrase or expression for situation such as "throw a pigeon among cats"

What are the advantages to banks being located in the City of London (the Square Mile)?

Why doesn't the nucleus have "nucleus-probability cloud"?

What can I wear to avoid getting frisked and crotch searched by TSA at the airport?

Visualize a large int

Compress .hex file for micro-controller



Is it dangerous to install hacking tools on my private linux machine?


Are there any hardware diagnostic tools?How to install vmware tools?How do I install development tools for 12.10?Install python setup tools for Ubuntu 12.04Kali Linux tools on Ubuntu 15.04Is it possible to install sketch and zeplin in Ubuntu?






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty
margin-bottom:0;









12

















I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?










share|improve this question























  • 1





    Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

    – Sergiy Kolodyazhnyy
    Apr 21 at 6:25


















12

















I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?










share|improve this question























  • 1





    Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

    – Sergiy Kolodyazhnyy
    Apr 21 at 6:25














12












12








12


6






I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?










share|improve this question

















I use my Ubuntu for private and business purposes. Can I also install tools on my computer that are actually there to perform penetration tests? Or is it harmless?







command-line software-installation tools hacking kali-linux-tools






share|improve this question
















share|improve this question













share|improve this question




share|improve this question








edited Apr 20 at 15:02







Yannick

















asked Apr 20 at 11:24









YannickYannick

613 bronze badges




613 bronze badges










  • 1





    Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

    – Sergiy Kolodyazhnyy
    Apr 21 at 6:25













  • 1





    Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

    – Sergiy Kolodyazhnyy
    Apr 21 at 6:25








1




1





Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

– Sergiy Kolodyazhnyy
Apr 21 at 6:25






Certain tools are used by both penetration testers and network administrators, such as nmap scanning tool. They are installed on business computers as well. Debugging and tracing tools are used by developers and engineers. Those tools in general are perfectly OK to install. Python, Perl, netcat, nmap - all those are used for pentesting, but they are not exclusively used for that, so there's no reason not to have them installed. Vulnerability injection tools - those are specifically used to attack, so there's no reason to have them unless you're a professional pentester.

– Sergiy Kolodyazhnyy
Apr 21 at 6:25











3 Answers
3






active

oldest

votes


















15


















That really depends on the programs.



As with any program you install, you ideally:



  • trust the publisher not to perform malicious actions

  • trust the publisher to develop secure software

The same trust must be given to any dependencies of the program.



What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.



Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.



As a general guideline, I would use these rules:



  1. run pentest programs on a dedicated computer or at least dedicated VM if possible.

  2. the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.

  3. The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.





share|improve this answer

































    1


















    IMG: Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.



    The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.






    share|improve this answer























    • 10





      Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

      – a CVn
      Apr 20 at 12:59






    • 2





      Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

      – karel
      Apr 20 at 13:13







    • 5





      I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

      – a CVn
      Apr 20 at 13:46






    • 5





      Kali linux tools tag,

      – karel
      Apr 20 at 14:00



















    0


















    in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual






    share|improve this answer



























      Your Answer








      StackExchange.ready(function()
      var channelOptions =
      tags: "".split(" "),
      id: "89"
      ;
      initTagRenderer("".split(" "), "".split(" "), channelOptions);

      StackExchange.using("externalEditor", function()
      // Have to fire editor after snippets, if snippets enabled
      if (StackExchange.settings.snippets.snippetsEnabled)
      StackExchange.using("snippets", function()
      createEditor();
      );

      else
      createEditor();

      );

      function createEditor()
      StackExchange.prepareEditor(
      heartbeatType: 'answer',
      autoActivateHeartbeat: false,
      convertImagesToLinks: true,
      noModals: true,
      showLowRepImageUploadWarning: true,
      reputationToPostImages: 10,
      bindNavPrevention: true,
      postfix: "",
      imageUploader:
      brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
      contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/4.0/"u003ecc by-sa 4.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
      allowUrls: true
      ,
      onDemand: true,
      discardSelector: ".discard-answer"
      ,immediatelyShowMarkdownHelp:true
      );



      );














      draft saved

      draft discarded
















      StackExchange.ready(
      function ()
      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1135505%2fis-it-dangerous-to-install-hacking-tools-on-my-private-linux-machine%23new-answer', 'question_page');

      );

      Post as a guest















      Required, but never shown


























      3 Answers
      3






      active

      oldest

      votes








      3 Answers
      3






      active

      oldest

      votes









      active

      oldest

      votes






      active

      oldest

      votes









      15


















      That really depends on the programs.



      As with any program you install, you ideally:



      • trust the publisher not to perform malicious actions

      • trust the publisher to develop secure software

      The same trust must be given to any dependencies of the program.



      What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.



      Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.



      As a general guideline, I would use these rules:



      1. run pentest programs on a dedicated computer or at least dedicated VM if possible.

      2. the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.

      3. The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.





      share|improve this answer






























        15


















        That really depends on the programs.



        As with any program you install, you ideally:



        • trust the publisher not to perform malicious actions

        • trust the publisher to develop secure software

        The same trust must be given to any dependencies of the program.



        What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.



        Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.



        As a general guideline, I would use these rules:



        1. run pentest programs on a dedicated computer or at least dedicated VM if possible.

        2. the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.

        3. The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.





        share|improve this answer




























          15














          15










          15









          That really depends on the programs.



          As with any program you install, you ideally:



          • trust the publisher not to perform malicious actions

          • trust the publisher to develop secure software

          The same trust must be given to any dependencies of the program.



          What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.



          Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.



          As a general guideline, I would use these rules:



          1. run pentest programs on a dedicated computer or at least dedicated VM if possible.

          2. the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.

          3. The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.





          share|improve this answer














          That really depends on the programs.



          As with any program you install, you ideally:



          • trust the publisher not to perform malicious actions

          • trust the publisher to develop secure software

          The same trust must be given to any dependencies of the program.



          What makes some pentest tools special is that they provide a larger attack surface than many other programs and the people using them are more interesting targets than the users of many other programs.



          Wireshark for example specifically warns against running as root, because of the high number of vulnerabilities (because of a high attack surface, insecure language (C), novice contributors, etc). Of course, you may not be happy with having your user account compromised either.



          As a general guideline, I would use these rules:



          1. run pentest programs on a dedicated computer or at least dedicated VM if possible.

          2. the larger the attack surface of the program, and the higher the amount of known vulnerabilities / the less secure the code is, the more important rule 1 becomes.

          3. The less reputable the source of the program is, the more you want to follow rule 1. Ubuntu repositories eg can generally be trusted more than a random github repository from an unknown entity or a nodejs program with dozens of npm dependencies.






          share|improve this answer













          share|improve this answer




          share|improve this answer










          answered Apr 20 at 12:36









          timtim

          2511 silver badge4 bronze badges




          2511 silver badge4 bronze badges


























              1


















              IMG: Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.



              The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.






              share|improve this answer























              • 10





                Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

                – a CVn
                Apr 20 at 12:59






              • 2





                Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

                – karel
                Apr 20 at 13:13







              • 5





                I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

                – a CVn
                Apr 20 at 13:46






              • 5





                Kali linux tools tag,

                – karel
                Apr 20 at 14:00
















              1


















              IMG: Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.



              The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.






              share|improve this answer























              • 10





                Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

                – a CVn
                Apr 20 at 12:59






              • 2





                Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

                – karel
                Apr 20 at 13:13







              • 5





                I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

                – a CVn
                Apr 20 at 13:46






              • 5





                Kali linux tools tag,

                – karel
                Apr 20 at 14:00














              1














              1










              1









              IMG: Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.



              The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.






              share|improve this answer
















              IMG: Kali linux tools are hacking tools that are neither safe nor harmless. Installing Kali linux tools in Ubuntu by Katoolin or other means can turn Ubuntu into a hybrid Ubuntu/Kali Linux OS that is made possible by the fact that both OSs are Debian-based.



              The only secure way to install Kali linux tools is to install Kali Linux in a virtual machine.







              share|improve this answer















              share|improve this answer




              share|improve this answer








              edited May 28 at 23:28

























              answered Apr 20 at 11:39









              karelkarel

              69k15 gold badges155 silver badges181 bronze badges




              69k15 gold badges155 silver badges181 bronze badges










              • 10





                Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

                – a CVn
                Apr 20 at 12:59






              • 2





                Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

                – karel
                Apr 20 at 13:13







              • 5





                I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

                – a CVn
                Apr 20 at 13:46






              • 5





                Kali linux tools tag,

                – karel
                Apr 20 at 14:00













              • 10





                Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

                – a CVn
                Apr 20 at 12:59






              • 2





                Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

                – karel
                Apr 20 at 13:13







              • 5





                I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

                – a CVn
                Apr 20 at 13:46






              • 5





                Kali linux tools tag,

                – karel
                Apr 20 at 14:00








              10




              10





              Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

              – a CVn
              Apr 20 at 12:59





              Where, other than in this answer of yours, does this question discuss Kali Linux? I don't see it.

              – a CVn
              Apr 20 at 12:59




              2




              2





              Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

              – karel
              Apr 20 at 13:13






              Kali linux tools is what Katoolin refers to as hacking tools from the Kali Linux distribution. Kali Linux Tools can also be a synonym for Katoolin. Katoolin is a script that helps to install Kali Linux tools on Ubuntu and other Linux distributions. I didn't want to answer this question because I know from experience that a lot of people want to be fed a pack of lies that Kali Linux tools in Ubuntu are safe, however since I'm the top upvoted answerer on the katoolin tag I feel that I have a responsibility to tell the truth about this topic.

              – karel
              Apr 20 at 13:13





              5




              5





              I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

              – a CVn
              Apr 20 at 13:46





              I'm not arguing against that installing binaries built for other distributions can be, at the best of times, risky from a compatibility point of view. (Usually, though, my experience is that the worst that will happen is that whatever binary you installed will refuse to run due to missing or mismatched libraries.) But I don't see anywhere that this question discusses Kali. All I'm seeing is a question about installing pentesting tools, and whether that carries (any special) risk. I would expect an answer to such a question to discuss such tools in general (as tim's answer does), not Kali.

              – a CVn
              Apr 20 at 13:46




              5




              5





              Kali linux tools tag,

              – karel
              Apr 20 at 14:00






              Kali linux tools tag,

              – karel
              Apr 20 at 14:00












              0


















              in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual






              share|improve this answer






























                0


















                in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual






                share|improve this answer




























                  0














                  0










                  0









                  in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual






                  share|improve this answer














                  in my opinion install kali Linux in place of Ubuntu. but if you work with thi last one you can find the kali linux hacking tools in this link https://tools.kali.org/tools-listing some script can be found in GitHub. and before to download anything from the web check the comments of in the section and also the website if is official or not. and virtual machine its virtual







                  share|improve this answer













                  share|improve this answer




                  share|improve this answer










                  answered Apr 21 at 8:19









                  salah eddin lamnayrasalah eddin lamnayra

                  1




                  1































                      draft saved

                      draft discarded















































                      Thanks for contributing an answer to Ask Ubuntu!


                      • Please be sure to answer the question. Provide details and share your research!

                      But avoid


                      • Asking for help, clarification, or responding to other answers.

                      • Making statements based on opinion; back them up with references or personal experience.

                      To learn more, see our tips on writing great answers.




                      draft saved


                      draft discarded














                      StackExchange.ready(
                      function ()
                      StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f1135505%2fis-it-dangerous-to-install-hacking-tools-on-my-private-linux-machine%23new-answer', 'question_page');

                      );

                      Post as a guest















                      Required, but never shown





















































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown

































                      Required, but never shown














                      Required, but never shown












                      Required, but never shown







                      Required, but never shown









                      Popular posts from this blog

                      Tamil (spriik) Luke uk diar | Nawigatjuun

                      Align equal signs while including text over equalitiesAMS align: left aligned text/math plus multicolumn alignmentMultiple alignmentsAligning equations in multiple placesNumbering and aligning an equation with multiple columnsHow to align one equation with another multline equationUsing \ in environments inside the begintabularxNumber equations and preserving alignment of equal signsHow can I align equations to the left and to the right?Double equation alignment problem within align enviromentAligned within align: Why are they right-aligned?

                      Where does the image of a data connector as a sharp metal spike originate from?Where does the concept of infected people turning into zombies only after death originate from?Where does the motif of a reanimated human head originate?Where did the notion that Dragons could speak originate?Where does the archetypal image of the 'Grey' alien come from?Where did the suffix '-Man' originate?Where does the notion of being injured or killed by an illusion originate?Where did the term “sophont” originate?Where does the trope of magic spells being driven by advanced technology originate from?Where did the term “the living impaired” originate?