[ 0.000000] Linux version 6.9.2-halit-sec (root@sys-build) (gcc 12.2.0) [ 0.000100] Command line: BOOT_IMAGE=/vmlinuz-6.9.2-halit-sec root=/dev/mapper/sys-sec ro quiet [ 0.000200] __ __ ______ __ __ ______ [ 0.000200] /\ \_\ \ /\ __ \ /\ \ /\ \ /\__ _\ [ 0.000200] \ \ __ \ \ \ __ \ \ \ \____ \ \ \ \/_/\ \/ [ 0.000200] \ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \ \_\ [ 0.000200] \/_/\/_/ \/_/\/_/ \/_____/ \/_/ \/_/ [ 0.045000] x86/fpu: Enabled xsave features 0x2e7 (avx, avx512) [ 0.120000] SELinux: Initializing. [ 0.850000] sys_init: loading core security modules... [ 1.100100] loading module: reverse_engineering [0xffff88000] [ 1.100250] ├── symbol: exploitation [ 1.100400] └── symbol: malware_analysis [ 1.200100] loading module: red_team [0xffff88100] [ 1.200250] ├── symbol: penetration_testing [ 1.200400] └── symbol: vulnerability_analysis [ 1.300100] loading module: blue_team [0xffff99000] [ 1.300250] ├── symbol: incident_response [ 1.300400] ├── symbol: digital_forensics [ 1.300550] └── symbol: threat_intelligence [ 2.100000] [ OK ] Started httpd: halit.alptekin.im [ 2.100250] [ OK ] Started networkd: linkedin [ 2.100500] [ OK ] Started maild: halit@alptekin.im [ 3.000000] halit login: █
halit/halit
Folders and files
| Name | Name | Last commit date | ||
|---|---|---|---|---|