Share This
Scroll Down
Back to Resources
//Operating System
Operating System

Arch Strike :

 

 
ArchStrike is a distribution for security professionals and researchers based on Arch Linux. ArchStrike provides an extra repository of security software and is available in Openbox and Minimal 64-bit builds. ArchStrike provides a live desktop environment based on the Openbox window manager.

Download Link : https://archstrike.org/downloads



Backbox :

 

 
BackBox is a penetration test and security assessment oriented Ubuntu-based Linux distribution providing a network and informatic systems analysis toolkit. It includes a complete set of tools required for ethical hacking and security testing.

Download Link : https://www.backbox.org/download/



Black Arch :

 

 
BlackArch is a penetration testing distribution based on Arch Linux that provides a large amount of cyber security tools. It is an open-source distro created specially for penetration testers and security researchers. The repository contains more than 2400 tools that can be installed individually or in groups.

Download Link : https://blackarch.org/downloads.html



Black Spider Windows 10 :

 

 
Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI & Terminal apps! It comes with a tone off hacking tools.

Download Link : https://thehacktronian.blogspot.com/2020/07/windows-10-black-spider-v2.html



Bugtraq :

 

 
Bugtraq is an electronic mailing list dedicated to issues about computer security. On-topic issues are new discussions about vulnerabilities, vendor security-related announcements, methods of exploitation, and how to fix them.

Download Link : http://www.bugtraq-apps.com/



Cyborg :

 

 
Cyborg Hawk – a Linux distribution based on Ubuntu platform with latest kernel for cyber security professionals, but can be used by everyone, however it is recommended to be not used by those who are unfamiliar with Linux as it contains major tools for penetration testing and cyber security purpose.

Download Link : Cyborg Hawk Linux 1.1 amd64 3.15GB.iso



DEFT Linux :

 

 
DEFT (Digital Evidence & Forensic Toolkit) is a customised distribution of the Ubuntu live Linux CD. It is an easy-to-use system that includes excellent hardware detection and some of the best open-source applications dedicated to incident response and computer forensics.

Download Link : http://www.deftlinux.net/



Fedora Security Spin :

 

 
The Fedora Security Spin is a live media based on Fedora to provide a safe test environment for working on security auditing, forensics and penetration testing, coupled with all the Fedora Security features and tools.

Download Link : https://fedoraproject.org/wiki/Security_Lab



Kali Linux :

 

 
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security.

Download Link : https://www.kali.org/downloads/



Kodachi :

 

 
Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.

Download Link : https://www.digi77.com/linux-kodachi/



Network Security Toolkit :

 

 
Network Security Toolkit (NST) is a bootable live CD based on the Fedora distribution. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools. What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.

Download Link : http://www.networksecuritytoolkit.org/



Parrot Security OS :

 

 
Parrot (formerly Parrot Security OS) is a Debian-based, security-oriented distribution featuring a collection of utilities designed for penetration testing, computer forensics, reverse engineering, hacking, privacy, anonymity and cryptography. The product, developed by Frozenbox, comes with MATE as the default desktop environment.

Download Link : https://www.parrotsec.org/download/



Pentoo :

 

 
Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64-bit installable live CD.

Download Link : https://www.pentoo.ch/downloads



Qubes :

 

 
Qubes OS is a security-focused desktop operating system that aims to provide security through isolation. Virtualization is performed by Xen, and user environments can be based on Fedora, Debian, Whonix, and Microsoft Windows, among other operating systems.

Download Link : https://www.qubes-os.org/downloads/



REMnux :

 

 
REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community. Analysts can use it to investigate malware without having to find, install, and configure the tools.

Download Link : https://remnux.org



Samurai Web Testing Framework :

 

 
The Samurai Web Testing Framework is a virtual machine, supported on VirtualBox and VMWare, that has been pre-configured to function as a web pen-testing environment. The VM contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.

Download Link : http://www.samurai-wtf.org/



Secure-K :

 

 
Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is a next generation live operating system following liveng patterns. Please refer to Resilient Linux, a fork of Open Secure-K OS which is actively developed.

Download Link : https://github.com/LumIT-Labs/open-securekos



Tails :

 

 
Tails, or The Amnesic Incognito Live System, is a security-focused Debian-based Linux distribution aimed at preserving privacy and anonymity. All its incoming and outgoing connections are forced to go through Tor, and any non-anonymous connections are blocked.

Download Link : https://tails.boum.org/install/



Trusted End Node Security :

 

 
Trusted End Node Security (TENS), previously called Lightweight Portable Security (LPS), is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.

Download Link : https://www.spi.dod.mil/download.htm



Whonix :

 

 
Whonix is a Debian GNU/Linux–based security-focused Linux distribution. It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux.

Download Link : https://www.whonix.org/



WiFi Slax :

 

 
Wifislax is a Slackware-based live CD containing a variety of security and forensics tools. The distribution's main claim to fame is the integration of various unofficial network drivers into the Linux kernel, thus providing out-of-the-box support for a large number of wired and wireless network cards.

Download Link : https://www.wifislax.com/



Want To Ask Anythink ?

© Hacktronian / All Rights Reserved / Policy
Get in Touch
Close