News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Which OS do real hackers actually use? Is it really Kali? Or something else? : hacking | Torhoo darknet markets

Hey everyone, I’m new to hacking , and I keep seeing Kali Linux mentioned everywhere as the “hacker OS.” But is that what real, experienced hackers actually use? Or are there other distros and setups people prefer in real-world scenarios?

Also, how do hackers usually stay anonymous? are there more advanced techniques/tools involved? I’m still learning the ,forgive me if this sounds noob-ish — just trying to get a better idea of how things work out there.

Would love to hear what operating systems, tools, and anonymization methods people actually use in practice. Thanks!
/u/BastaBackdoor
2 points
1 week ago
use qubes
/u/rmrf P sudo rm -rf /*
1 points
1 week ago
No offense but no.

Qubes is for people at risk of government level exploits, not hackers. Running kali, or more reasonble your own OS with pentesting tools on qubes is fucking terrible.
/u/ThatOpSecGuy
1 points
5 days ago
Have you even used Qubes? It's not bad.
/u/rmrf P sudo rm -rf /*
1 points
1 day ago
Qubes is amazing for exploit-prevention. It is not ideal for actual hacking but rather communications if that makes sense. It is not that you are unable to make it work it is that it is less ideal than a simple virtual machine on a linux desktop.
/u/BastaBackdoor
1 points
1 day ago
he did ask what "real, experienced hackers actually use?" and "how do hackers usually stay anonymous?" qubes is for all of that. in real world red teaming the threat model could require qubes.
/u/rmrf P sudo rm -rf /*
1 points
1 day ago
Do you want to give me exact details on how a "real" red team uses Qubes?

It is not ideal because the point of Qubes is to isolate everything. When you are red teaming you are looking to use as many tools as you can, this is not easy with Qubes in my opinion, things break a lot. If you are using preconfigured Qubes you can make some tools work, but you will not have the same amount of tools as you do just running it in a VM.

There is a kali-vm I think but when I last tried it most of the tools break or hang constantly. It is not made for pentesting it is made for people who are opening emails and do not want to be hit by an exploit that compromises their entire system. No actual red teamers use qubes for their daily driver.
/u/b1ack P
1 points
1 week ago
Kali is just basic linus with all the tools pre-loaded into the os.
and hackers use linux,windows,macos.
Os doesn't matters. All the tools are available on all os.
/u/fapton 📢 🍼
1 points
1 week ago
Oh cool! and about tools, they use existing tools from kali and git? or use their own? and also how can we get powerfull tools?is that possible for free?or atleast paid?
/u/ATNT
1 points
1 week ago
tools depend on the job. most tools are already available on github. burpsuite, wireshark, nmap, HxD or maybe even ghidra? could you be more specific with what kind of hacking are planning to do?
/u/buzzkashai 🍼
1 points
1 week ago
real hackers use windows inside a windows VM
/u/fapton 📢 🍼
1 points
1 week ago
damn!, i appreciate that! , as is there any other ways other than proxychains to be anonymous while doing a hack or smting?
/u/buzzkashai 🍼
2 points
1 week ago
i think it best if you go read the opsec bible /d/opsec
/u/fake_biz 🍼 P
1 points
1 week ago
real hackers get spied on twice. /s
/u/buzzkashai 🍼
1 points
1 week ago
ms spying on ms spying on me...how many layers can we go
/u/Crypto4Chickens
1 points
1 week ago
Yes, many "hackers" use Kali Linux, but it's just a tool, essentially a Linux distribution with pre-installed security tools. There are other options as well, like Parrot OS or BlackArch. Choosing one or the other won’t make a big difference. You can also customize any popular Linux distro (like Debian-, Arch-, or Ubuntu-based systems), or go for a more privacy-focused one like Tails or Whonix.

To stay anonymous, use the Tor network. In some cases, you can use a VPN (Mullvad is currently one of the most privacy-respecting options), but remember that VPNs are generally less secure than Tor. For better anonymity, consider using privacy-oriented operating systems like Tails, Whonix, Qubes OS or create your own secure setup. Everything more then that you need to learn.
/u/Shadow22
1 points
1 week ago*
I know nothing about hacking, but when it comes to security I would use a VPN WITH TOR.

I see a lot of people talk nonsense about using a VPN and then connecting to Tor and advocating to use Tor on it's own, however the fact of the matter is this; if whatever site you are visiting is compromised and the alpahabets have your real IP, then you have your VPN as a fallback and it makes the alphabets job that more difficult as your true IP will still be masked behind the VPN.

Also use a program called TMAC, it changes and spoofs your internal MAC address, which is essentially your computers PERMANENT "Address" for forensic purposes.

So connect to TMAC first, VPN second and Tor 3rd.

For even more security, use public wifi's before using aforementioned programs, if you happen to have the luxury. This way it can never be traced to your home ISP.
/u/buzzkashai 🍼
1 points
1 week ago
VPN with Tor is worse than just Tor.
/u/Shadow22
1 points
1 week ago*
That's not even possible. If your true IP is leaked or compromised on a tor site run by LEA and you are only using TOR, the alphabets only have to go through your ISP to find out who you are.

If you are using VPN to connect to TOR, then your true IP is masked by the VPN and then the Alphabets have to go through the VPN to attempt to get your true ISP IP address.

And if the VPN keep no logs, then it's incredibly difficult to track and trace you.

Explain!
/u/buzzkashai 🍼
1 points
1 week ago*
time for some reading https://www.whonix.org/wiki/Tunnels/Introduction
/u/Crypto4Chickens
1 points
1 week ago
Changing your MAC address is a reasonable step (though not always necessary), especially if you're connecting to a public network.

I don’t fully agree with the popular "VPN before Tor" setup. While it makes theoretical sense, in practice too many so-called "no-log VPNs" have proven to be traps. For example, in 2020 PureVPN handed over user data to the FBI, despite marketing itself as "zero logs." The user was routing through VPN before Tor, but their real IP was still identified via VPN-side logging. Personally, I see Tor as a better version of VPN, it routes your traffic through multiple independent nodes instead of a single centralized point of failure like a VPN.

Using public Wi-Fi securely requires doing it from a private, discreet location which defeats the point of it being "public". The only feasible option I see is using a neighbor’s Wi-Fi, if possible.
/u/Shadow22
1 points
1 week ago*
I agree 100% about the so called "No-Logs VPNS", however...I think my point is still valid about it being more secure to use one alongside TOR as it still makes LEA's job more difficult....subpoenas to reveal logs from VPNS and all that. You also have genuine VPN's that truly don't have logs (Think non 12 eyes countries). In this scenario VPN use before connecting to TOR 100% reinforces your security.

And yea purevpn are scum.

Of course your point that TOR is a better version of a VPN is correct, but using a VPN before connecting to TOR makes you more secure is also correct.

As for using a neigbors Wi-Fi...I can't help but imagine the old granny next door getting busted for buying a key of coke LMFAO!

EDIT: Just want to clarify when I said "Public" wifi, I meant if you live close to a pub (Or similar) and you have their wifi code ;)

Essentially what you said about getting your next door neighbor grandma busted :P
/u/Crypto4Chickens
1 points
1 week ago
I understand your point, but even if a VPN helps, the difference isn't significant. I would still recommend using only VPNs that you’ve built and secured yourself.
F grandma
/u/Shadow22
1 points
1 week ago
I can barely build a snowman never mind a VPN mate.

Also if I see any news articles about 70+ year old grannies getting busted for drugs I know who the real culprit is :P

Take care bro :D
/u/stonesalt
1 points
1 week ago
VPN keep no logs

Now that's wishful thinking :)
/u/Shadow22
1 points
1 week ago
Indeed. I've always been skeptical that LEA are involved or even own some VPN services to directly track the habits of users who use VPNs.

However there are some offshore non 12 eyes VPNS I trust.

Ironically VPNS are banned in china and Russia?

If those countries had VPN services, I'd rather trust those guys with my data than any western VPN countries. At least they don't have the jurisdiction to legally do anything about what I do online. Just a passing thought.
/u/fapton 📢 🍼
1 points
1 week ago
OH! i heard of the same lol!, but when comes to terminal! how can i my my my requests or even my commands anonymous or smting? like doing commands like nslookup ,or any commands to Curl or smting!
/u/Crypto4Chickens
1 points
1 week ago
You can use an operating system that routes all network traffic through Tor for example, Tails OS, which is designed for anonymity and forces all connections through the Tor network.

Alternatively, you can use torsocks to run specific commands over Tor, like:
torsocks curl http://example.com
/u/fapton 📢 🍼
1 points
1 week ago
Oh ye, Tail os! i gave it a try, but i would have to install all tools again and again , after rebooting lol! so i quit em!
let me try "torsocks"then.
tysm! that was informative fr!
/u/fapton 📢 🍼
1 points
1 week ago
Cool! tysm! and also how about the toolswhcih are used? those are self-made? or just some secret tools does exist?idk much ...
/u/Crypto4Chickens
2 points
1 week ago
Most of the time, you use the standard tools that come built into Kali Linux. As you gain experience, you can start creating your own tools depending on your needs.

There are no "secret tools" you can just download. What really matters is learning the things you can’t download. No offense, it just takes time and practice.
/u/RusselAdler
1 points
1 week ago*
Distros like Kali, Parrot are maintained by a solid community/company and are fine.

Check out Kali Tools page or Blackarch Tools List.

Experience with the tools is what make any craftsman skilled.

Also. Pro Tip

Learn docker and or Kubernetes ;)
/u/diaperspray P
1 points
1 week ago
My easy setup:
Luks encrypted Parrot Security USB
Parrot utilizes the Tor network with system wide anonsurf mode.

Getting to know OWASP ZAP and Zenmap ATM.
/u/ByteToBreach 🍼
1 points
1 week ago
You should add burp suite, swigger labs are really good to learn to use it. Consider the pro version if you serious about it.
/u/LibertyExchange
1 points
1 week ago
Parrot < Kali
/u/AAQQ123456 🍼
1 points
1 week ago
[pending moderation]
/u/drisdane Moderator
1 points
1 week ago
jfc, fucking bot

note_AAQQ123456 pr ban all
/u/PhilipeM2k7 🍼
1 points
1 week ago
Try different os, learn their advantages and disadvantages. Learn opsec and how to search for informations if u wanna be a hacker lol
/u/IGotAQuestion4U 🍼
1 points
1 week ago
I check comments, no real answer so I answer. Kali no, it just linux os with bunch of bloat code, u dont want that security risk. Real hacker use Arch because almost zero bloat or Qubes + whonix there is bloat but better then rest of garbage OS. U ask tools I give u.

Network :VPN, Proxy and Computer Relays like Tor but be more creative that is meaning of hacking.
Device: Encryption, FOSS (create your own if possible), MFA is powerful use where u can
Hardware: pick your computer part with caution but dont search best anonymous computer honey pot my friend create your own, replicate best anonymous computer you search
Account: FOSS, MFA
Tools: I can not promote because there is rule no promote on dread but find tool for attack and defense brother

Do not ask to be anonymous, y? because no1 will tell u. The more a person knows how u r anonymous the easier the anonymous person can get caught by the pigs. Create your own anonymous method be creative do not follow guide like it is a bible, create bible.

A lot more I could say but that is for u to find my friend

thing to know is source everything yourself, if it is not yours you cannot see all vulnerabilities. BE CREATIVE take this very serious DO NOT follow other person actions because it look good, create it your own and do not reveal what u create or else u set yourself up for a disaster that will unfold if not found fast enough

Good luck my friend
/u/fapton 📢 🍼
1 points
6 days ago
Bro… not even kidding, this is literally the BEST answer I’ve ever gotten in my life, lol. Like… THANK YOU
this was so informative, I swear this sh*t just opened my eyes or something . Legit so helpful fr, appreciate you!
about tools, can you just DM me or smting? rn someone said! making your own tools is the key!(tru) but i would like to get resources to learn things thn . (i have a specific target to hck).
/u/AutoModerator M
1 points
6 days ago
[removed by moderators]
/u/ATNT
1 points
1 week ago
kali linux is known as hacker os because it has a lot of tools preinstalled. OS choice for "hackers" depends on what field they're working in. most common ones are linux distros like arch, qubes, kali, REMnux. some people prefer windows, especially when working with windows related hacking.
/u/rmrf P sudo rm -rf /*
1 points
1 week ago
Kali is suggested because most tutorials use tools already installed on Kali.

If you want to be a real hacker, install linux yourself and install the tools you need. Why do you need hundreds of random tools that you have no understanding are doing to your machine out of the install? Install ubuntu, learn how to configure your vpn/tor, and install the tools you need. There is no hacker os because hackers make their own shit work for them. They do not use preconfigured garbage.
/u/hacker P
1 points
6 days ago
Kali Linux is popular because it comes preloaded with many hacking tools, making it great for beginners and some pros. However, many experienced hackers prefer more customizable setups using lightweight distros like Arch, Debian, or even OpenBSD, tailoring their environment for stealth and performance. For anonymity, tools like Tor and VPNs are common starting points, but advanced users combine layered proxies, Tails OS, and operational security (OPSEC) practices like compartmentalization and avoiding digital footprints. The key is understanding the tools and adapting them to your specific needs. Keep learning and experimenting!
/u/bobby_singer 🍼
1 points
6 days ago
The first thing you should do is learn to program, C, C ++ and assembly language, if you want to make malware is the first thing you should learn, not the operating system used by hackers. It's like a locksmith do not give him a course on how to open locks, they teach how they distribute, how to make keys, etc. When he has a certain knowledge of how they work, he realizes that he could open any lock without having been his initial goal.
/u/ghostmishu
1 points
6 days ago
a VPS + Tails. All you need -skills .
/u/fapton 📢 🍼
1 points
6 days ago
I do have doubts in this!, if a hacker is sending a payload or a malware to connect back, what will be the LHOST? how can i even share mine (public IP)? Should i open Ports in my router? or what! if yes, that will be a security risk ryt?
and if they are Using VPS, all hackers buys VPS for this thing? then if any security Teams want to track me, they can just contact that VPS provider ryt?
i have no idea how its done! (the connect back thing) can you help me?!
/u/ghostmishu
1 points
2 days ago
First of all, u never self host a C2 server with open ports on ur own router. Second all C2s are usually hosted on a vps/external server or computer like a PI which is the server that ur agent malware gets downloaded from by ur loader malware. Loaders are like the first bit of malware that gets rced/downloaded and ran which runs shellcode/a tiny script to download ur agent(the acutal payload to get keystrokes/chains exploits to get root whatever). a vps is just a server, a server is just a computer. When u are "using a vps" ur just renting someone elses computer which is always running. And there are alot of people who are willing to cash in on your concern all you have to do is find the right people to rent from...
/u/fapton 📢 🍼
1 points
1 day ago
tru! i cant rent a VPS rn! thats why i was thinking of other options! i tired hiddentor service! But its no use ykr! the Victim should have Tor! FUCK!
Have to find smting! Anyways Thanks!
/u/ThatOpSecGuy
1 points
5 days ago
Ask ten different people and get ten different answers. I've encountered hackers who swear by every major and minor OS out there.

Kali is popular because it comes preloaded with a wide range of tools, making it a go-to choice for some scenarios. For high-security needs, Qubes OS is the best option. When navigating the darknet, Whonix is an excellent choice. I've seen plenty of hackers using Windows, and just as many using various Linux distributions. If you just want something preloaded with tools and you don't like Kali, Parrot exists. I'd honestly say Windows is very popular among most hackers simply for convenience purposes. If you choose that option, I recommend making some configuration changes for better privacy and security.

To maintain anonymity, Tor is the gold standard. If Tor isn't feasible, consider using a proxy or a VPN. In some situations, neither Tor nor a VPN may be suitable, and you might need to resort to something like a residential proxy.
/u/Beelzeboob 🍼
0 points
1 week ago
The best hackster i knew used Windows server datacentre edition