Parrot Security OS 3.10 Released with New Powerful Hacking Tools

Parrot Security OS 3.10  is a Penetration Testing & Forensics Distro dedicated to Ethical Hackers & Cyber Security Professionals.

With the new release 3.10, it includes some important new features to make the system more secure and reliable.

The first big news is the introduction of a full firejail+apparmor sandboxing system to proactively protect the OS by isolating its components with the combination of different techniques which already has been released in 3.9 version.

The new version of Parrot Security OS 3.10 comes with Linux Kernel 4.14 LTS, awesome features of this new kernel release, as well as the Mozilla Firefox Quantum (57.0).

Also it released with some of the most powerful security tools such as metasploit-framework, that reached its 4.21 version, or maltegoce and casefile that were merged into a unique launcher provided by the new maltego 4.1.

Also Parrot included a todo list and planner program, a personal finance management suite and a mind map designer.

So new parrot OS Shipped with new ISO files which include having seen many improvements, bug-fixes and security updates.

This version including some lightweight but useful programs for daily tasks for our users who have a parrot as their main system.

Use the Following command in terminal To upgrade the system and get new version 3.10

sudo apt update && sudo apt full-upgrade

The program is certified to run on systems that have at least 265Mb of RAM and is suitable for both 32bit (i386) and 64bit (amd64).

It also has a special version running on old 32bit (486) machines. In addition, the program is available for armel and armhf architectures. It also has a version (32bit and 64bit) developed for servers to perform Cloud pentesting and Future versions of parrot would probably include a new user friendly installer too.

Download Links for Parrot Security OS 3.10 Released

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Google Guide! How to Detect Browser Data Theft Using Windows Event Logs

In the ever-evolving cybersecurity landscape, Google is continually striving to protect user data from malicious actors. In a recent blog…

3 hours ago

Millions of Malicious “Imageless” Docker Hub Repositories Drop Malware

In a startling revelation, nearly 20% of Docker Hub repositories have been identified as conduits for malware and phishing scams,…

4 hours ago

Attackers Leverage Sidecar Container Injection Technique To Stay Stealthy

Kubernetes (K8s) is an open-source container orchestration platform designed to automate application container deployment, scaling, and running.  Containers are isolated…

6 hours ago

How to Utilize Azure Logs to Identify Threats: Insights From Microsoft

Microsoft's Azure platform is a highly acclaimed and widely recognized solution that organizations worldwide are leveraging. It is regarded as…

8 hours ago

Redline Malware Using Lua Bytecode to Challenge the SOC/TI Team to Detect

The first instance of Redline using such a method is in a new variant of Redline Stealer malware that McAfee…

21 hours ago

Threat Actor Claims Selling of Dell Database with 49M User Records

A threat actor reportedly sells a database containing 49 million user records from Dell, one of the world's leading technology…

24 hours ago