LINUX HACKING KITS

LINUX PRECOMPILED BINARIES WITH FORENSIC/SECURITY MODULES

http://www.securitydistro.com/

NUMEROUS DOWNLOADS TO PRECOMPILED LINUX SECURITY BINARIES

LINUX PRECOMPILED BINARIES

http://distrowatch.serve-you.net/

NUMEROUS LINKS TO PRECOMPILED LINUX BINARIES WITH RATINGS

BACKTRACK 2

http://www.remote-exploit.org/backtrack.html

BACKTRACK 2 IS THE MOST TOP RATED LINUX LIVE DISTRIBUTION FOCUSED ON PENETRATION TESTING. WITH NO INSTALLATION WHATSOEVER, THE ANALYSIS PLATFORM IS STARTED DIRECTLY FROM THE CD-ROM AND IS FULLY ACCESSIBLE WITHIN MINUTES.
IT'S EVOLVED FROM THE MERGE OF THE TWO WIDE SPREAD DISTRIBUTIONS WHAX AND AUDITOR SECURITY COLLECTION. BY JOINING FORCES AND REPLACING THESE DISTRIBUTION THE BACKTRACK COULD GAIN A MASSIVE POPULARITY AND WAS VOTED IN 2006 AS #1 AT THE SURVEIL OF INSECURE.ORG. SECURITY PROFESSIONALS AS WELL AS NEW-COMERS ARE USING IT AS THEIR FAVORITE TOOLSET ALL OVER THE GLOBE.

THE TOOLS LISTED ON BACKTRACK 2 CAN BE FOUND HERE:

http://backtrack.offensive-security.com/index.php?title=Tools

ASTALAVISTA SECURITY TOOLBOX DVD V4.0

http://astalavista.com/index.php?page=162

ASTALAVISTA'S SECURITY TOOLBOX DVD V4.0 IS CONSIDERED TO BE THE LARGEST AND MOST COMPREHENSIVE INFORMATION SECURITY ARCHIVE. AS ALWAYS WE ARE COMMITTED TO PROVIDE YOU WITH A RESOURCE FOR ALL OF YOUR SECURITY AND HACKING INTERESTS, IN AN INTERACTIVE WAY! THE INFORMATION FOUND ON THE SECURITY TOOLBOX DVD HAS BEEN CAREFULLY SELECTED, SO THAT YOU WILL ONLY BROWSE THROUGH QUALITY INFORMATION AND TOOLS. NO MATTER IF YOU ARE A COMPUTER ENTHUSIAST, A COMPUTER GEEK, A NEWBIE LOOKING FOR INFORMATION ON "HOW TO HACK", OR AN IT SECURITY PROFESSIONAL LOOKING FOR QUALITY AND UP TO DATE INFORMATION FOR OFFLINE USE OR JUST FOR CONVENIENCE, WE ARE SURE THAT YOU WILL BE SATISFIED, EVEN DELIGHTED BY THE DVD!

HAKIN9 LIVE

NOTE: NOW USING BACKTRACK 2 AS THE BACKEND ENGINE

http://www.hakin9.org/en/haking/hakin9_live.html

A BOOTABLE LINUX DISTRIBUTION CONTAINING ALL THE TOOLS AND MATERIALS NEEDED FOR PRACTICING METHODS AND TECHNIQUES DESCRIBED WITHIN THE HAKIN9 MAGAZINE ARTICLES.

(PSK) PENGUIN SLEUTH KIT

http://sourceforge.net/projects/psk

THE PENGUIN SLEUTH KIT IS A BOOTABLE CD AND A VMWARE VIRTUAL PLATFORM.THE PENGUIN SLEUTH KIT ADAPTS A GREAT LINUX RESOURCE TO INCLUDE TOOLS THAT ARE USEFUL WHEN PERFORMING A FORENSIC COMPUTER ANALYSIS & SECURITY AUDITING.
DETAILS: WWW.LINUX-FORENSICS.COM

SECUREDVD

http://www.securedvd.org/about.html

SECUREDVD IS A LIVE DVD COLLECTION*) FEATURING THE 10 BEST SECURITY LIVE CD DISTROS (PEN-TEST, FORENSICS & RECOVERY) AS PER DARKNET ON ONE SINGLE DVD.

THE LIVE DVD COLLECTION FEATURES THE FOLLOWING SECURITY BASED LIVE DISTRIBUTIONS (CLICK NAMES FOR FURTHER INFORMATION):

1. BACKTRACK 1.0
2. OPERATOR V3.3.20
3. PHLAK V0.3
4. AUDITOR V200605-02 (NO-IPW2100)
5. L.A.S. LINUX - LOCAL AREA SECURITY V0.5
6. KNOPPIX-STD V0.1
7. HELIX V1.7
8. F.I.R.E. V0.3.5
9. NUBUNTU VFLIGHT 6
10. INSERT RESCUE SECURITY TOOLKIT V1.3.6

THE DVD COLLECTION WAS CREATED UTILIZING NAUTOPIA'S DVD COLLECTION SCRIPTS

DAMN VULNERABLE LINUX (DVL)

http://www.damnvulnerablelinux.org/

DAMN VULNERABLE LINUX (DVL) IS A LINUX-BASED TOOL FOR IT-SECURITY. IT WAS INITIATED FOR TRAINING TASKS DURING UNIVERSITY LESSONS BY THE IITAC (INTERNATIONAL INSTITUTE FOR TRAINING, ASSESSMENT, AND CERTIFICATION) AND S²E - SECURE SOFTWARE ENGINEERING IN COOPERATION WITH THE FRENCH REVERSE ENGINEERING TEAM.

STD 0.1

SECURITY TOOLS DISTRIBUTION

http://s-t-d.org/index.html

STD IS A LINUX-BASED SECURITY TOOL. ACTUALLY, IT IS A COLLECTION OF HUNDREDS IF NOT THOUSANDS OF OPEN SOURCE SECURITY TOOLS. IT'S A LIVE LINUX DISTRO, WHICH MEANS IT RUNS FROM A BOOTABLE CD IN MEMORY WITHOUT CHANGING THE NATIVE OPERATING SYSTEM OF THE HOST COMPUTER. ITS SOLE PURPOSE IN LIFE IS TO PUT AS MANY SECURITY TOOLS AT YOUR DISPOSAL WITH AS SLICK AN INTERFACE AS IT CAN.

ARUDIUS

http://arudius.sourceforge.net/

PACKAGES ON ARUDIUS CAN BE FOUND AT WEB URL:

http://www.tdisecurity.com/iso/arudius_list.txt

ARUDIUS IS A LINUX LIVE CD WITH TOOLS THAT TRY TO ADDRESS THE NETWORK SECURITY ASPECT (PENETRATION TESTING AND VULNERABILITY ANALYSIS) OF INFORMATION ASSURANCE. IT IS BASED ON SLACKWARE (ZENWALK) FOR I386 SYSTEMS AND TARGETS THE INFORMATION SECURITY AUDIENCE. IT IS RELEASED UNDER THE GNU GPL AND CONTAINS ONLY OPEN-SOURCE SOFTWARE. ARUDIUS USES FLUXBOX AS ITS WINDOW MANAGER BUT MOST OF THE TOOLS INCLUDED IN THE DISTRIBUTION ARE COMMAND-LINE. NOTE: ARUDIUS IS NOT A REMASTERED SLAX! THE DISTRIBUTION WAS DEVELOPED FROM SCRATCH USING VANILLA ZENWALK CORE (MINISLACK) INSTALL AND LINUX LIVE SCRIPTS (SLAX). THE NICE FEATURE IT INHERITS FROM SLAX IS THAT ALL SLAX MODULES (.MO FILES) SHOULD WORK FINE WITH ARUDIUS AND YOU SHOULD EVEN BE ABLE TO REMASTER ARUDIUS USING THE NICE WINDOWS PROGRAM "MYSLAX CREATOR".
THERE ARE SEVERAL DIFFERENCES BETWEEN ARUDIUS AND OTHER SECURITY DISTROS. ONE OF THEM IS THE COLLECTION OF TOOLS INSTALLED. ARUDIUS AIMS AT BEING A "SECURITY TOOL" AND NOT JUST A COLLECTION OF ALL SECURITY SOFTWARE OUT THERE. THUS WE HAVE TRIED TO CONDENSE AS MANY USEFUL TOOLS AS POSSIBLE WHILE KEEPING THE ISO FILE SIZE UNDER 210MB – SMALL ENOUGH TO FIT ON A MINI-CD, THUS SMALL ENOUGH TO LOAD AND RUN COMPLETELY IN RAM. ANOTHER POTENTIAL DIFFERENCE IS THAT ARUDIUS IS DEVELOPED BY PEOPLE EMPLOYED IN THE COMPUTER SECURITY INDUSTRY AND HAS BEEN MADE A PART OF THEIR DAILY TASKS, WHICH ENSURES TIMELY UPDATES AND RELEASES

ANONYM.OS LIVECD

http://sourceforge.net/project/showfiles.php?group_id=136357

ANONYM.OS LIVECD IS A BOOTABLE LIVE CD BASED ON OPENBSD THAT PROVIDES A HARDENED OPERATING ENVIRONMENT WHEREBY ALL INGRESS TRAFFIC IS DENIED AND ALL EGRESS TRAFFIC IS AUTOMATICALLY AND TRANSPARENTLY ENCRYPTED AND/OR ANONYMIZED.

OPERATOR

http://ussysadmin.com/operator/

OPERATOR IS A COMPLETE LINUX (DEBIAN) DISTRIBUTION THAT RUNS FROM A SINGLE BOOTABLE CD AND RUNS ENTIRELY IN RAM. THE OPERATOR CONTAINS AN EXTENSIVE SET OF OPEN SOURCE NETWORK SECURITY TOOLS THAT CAN BE USED FOR MONITORING AND DISCOVERING NETWORKS. THIS VIRTUALLY CAN TURN ANY PC INTO A NETWORK SECURITY PEN-TESTING DEVICE WITHOUT HAVING TO INSTALL ANY SOFTWARE. OPERATOR ALSO CONTAINS A SET OF COMPUTER FORENSIC AND DATA RECOVERY TOOLS THAT CAN BE USED TO ASSIST YOU IN DATA RETRIEVAL ON THE LOCAL SYSTEM.

FEATURED SOFTWARE ON THE OPERATOR 3.3 CD:

  • DEBIAN BASED LINUX INSTALLATION
  • LINUX-KERNEL 2.4.31
  • KDE V3.3.2-1
  • WINE WINDOWS EMULATOR (BINARY EMULATOR)
  • KONQUEROR AND MOZILLA FIREBIRD WEB BROWSERS
  • KOFFICE WHICH INCLUDES KORGANIZER, KWORD, KSPREAD AND MORE
  • X MULTIMEDIA SYSTEM (XMMS) AN MPEG-VIDEO, MP3
  • INTERNET CONNECTION SOFTWARE KPPP,PPPOECONF (DSL)
  • UTILITIES FOR DATA RECOVERY AND SYSTEM REPAIRS, EVEN FOR OTHER OPERATING SYSTEMS
  • NETWORK AND SECURITY ANALYSIS TOOLS FOR NETWORK ADMINISTRATORS
  • MANY PROGRAMMING LANGUAGES, DEVELOPMENT TOOLS
  • IN TOTAL MORE THAN 900 INSTALLED SOFTWARE PACKAGES WITH OVER 2000 EXECUTABLE USER PROGRAMS AND UTILITIES
  • 100+ UNIX/WINDOWS EXPLOITS AND TOOLS READY TO RUN

HACKTIVISMO'S .TB

http://sourceforge.net/projects/hacktivismo

AND

http://www.hacktivismo.com/

.TB IS A PORTABLE, LIVE(-CD) LINUX OPERATING SYSTEM. THE GOAL CONSISTS OF CREATING
A SECURE-BY-DEFAULT, TRUSTED INTERNET COMMUNICATION-AND CONNECTIVITY PLATFORM WITH
ANONYMIZED CONNECTIONS, AND SECURED STORAGE, OUT OF THE BOX, ON TOP OF A PORTABLE
OS, SUPPORTING A MAXIMUM OF DIVERSE HARDWARE AND MEDIA. IT CAN BE COMPILED ENTIRELY
FROM SOURCES (AND HENCE, ENTIRELY CUSTOMIZED, IF YOU WANT) FOR REASONS OF PEER-REVIEW
AND TRUST, HENCE THE NAME TRUSTED BUILD — .TB.

OWASP LIVECD

http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project

OWASP LIVECD IS READY TO DOWNLOAD. THIS DISTRO IS BETA VERSION 0.8 NAMED "LABRAT" AND IS PART OF THE OWASP AUTUMN OF CODE SPONSORSHIP. THE DISTRO IS FOCUSED ON PROVIDING ALL OF OWASP TOOLS AND DOCUMENTS ON A BOOTABLE CD. THE GOAL IS TO HAVE A PORTABLE DISTRO THAT CAN BE USED BY PROFESSIONAL PENETRATION TESTERS,SECURITY ADMINS, STUDENTS, OR ANYONE INTERESTED IN COMPUTER SECURITY TO PERFORM WORK,TRAINING, OR RESEARCH. ALL YOU HAVE TO DO IS BURN THE .ISO TO DVD OR START UNDER VMWARE/VIRTUAL PC AND YOU WILL HAVE A FULL LINUX DESKTOP ENVIRONMENT LOADED WITH OWASP TOOLS AND DOCUMENTS.ANOTHER INSTANT ADVANTAGE IS THAT THE CD CAN BE DISTRIBUTED WITHIN TESTING TEAMS AND NEW HIRES TO ENSURE EVERYONE HAS THE SAME TOOLS WITHOUT SPENDING A WEEK SETTING UP A LAPTOP. SAME SCENARIO APPLIES FOR STUDENTS LEARNING COMPUTER SECURITY. THE CD CONTAINS THE WEBGOAT APPLICATION DESIGNED FOR LEARNING ABOUT APPLICATION VULNERABILITIES UTILIZING EASY TO FOLLOW LESSONS.

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License