F.H.C.

F.H.C.

Web site: fhclive.org (not active)
Origin: Italy?
Category: Security, Pentest
Desktop environment: CLI
Architecture: x86, x86_64
Based on: Independent
Wikipedia:
Media: Live USB
The last version | Released: 2019.02 | June 9, 2019
Zobacz po polsku Zobacz po polsku: F.H.C.

F.H.C. (Forensic Hard Copy) – a Linux distribution, bootable from CD / USB (live), created exclusively to automate and speed up the identical copy of mass memories.

Such copying procedures are commonly used in the field of forensic computers; it is orthodox practice in this field of information technology, to acquire data from the offending media so as to preserve them from possible alterations or damage, and then subsequently analyze the identical copy. The project was created to meet the operational needs of law enforcement agencies involved in investigative activities of judicial police, technical consultants (CTU) and part (CTP), ensuring the inalterability and use of IT evidence in the criminal trial.

Download

F.H.C. live 2019.02 i386 471MB.iso
md5sum: 725c616024888eba53c152048131ae75

F.H.C. live 2019.02 amd64 471MB.iso
md5sum: 8232690add2e00fe630730d1a2ae9014

Hack|Track

Hack|Track

Web site: hacktrack-linux.blogspot.com
Origin: Indonesia
Category: Security, Pentest
Desktop environment: MATE
Architecture: x86
Based on: Debian
Wikipedia:
Media: Live DVD
The last version | Released: 2020.1 | April 24, 2020
Zobacz po polsku Zobacz po polsku: Hack|Track

Hack|Track – a specialized Linux distribution based on Debian and dedicated to pentesting. The live system is equipped with the MATE desktop and can be launched from DVD or USB.

Hack|Track offers:
– Tools built from source packages
– Modern desktop style
– Ease of use

Root password: toor

Hack|Track 2020.1 is based on Debian 8 “Jessie”.

Download

Hack|Track 2020.1 i386 1.2GB.iso
md5sum: a2028339b76f88157b4049493518716c

WHYDAH

WHYDAH

Web site: airteam.sourceforge.io
Origin: unknown
Category: Pentest
Desktop environment: Fluxbox
Architecture: x86
Based on: Slax
Wikipedia:
Media: Live CD
The last version | Released: 2.0 | May 6, 2013

WHYDAH – a fast, lightweight and easy Slax based Linux live distribution focused on wireless security testing, automatic hardware detection, and support for many graphics cards, sound cards, wireless, SCSI and USB device.

WHYDAH provides users with easy access to a comprehensive and large collection of security-related tools. Support for live USB functionality allows users to boot directly from portable media without requiring installation, though permanent installation to hard disk is also an option. With WHYDAH you can easily grasp the concepts and understand the techniques to perform wireless attacks in your own lab. Get started with wireless testing, security and hacking with basic wireless concepts.

Download

WHYDAH 2.0 i486 588MB.iso
md5sum: 08f689b0807472fef1cc0314b16adeda

Apartheid Linux

Apartheid Linux

Web site: (not active)
Origin: unknown
Category: Pentest
Desktop environment: LXDE
Architecture: x86, x86_64
Based on: Debian
Wikipedia:
Media: Live CD
The last version | Released: Cyberwar Edition | October 29, 2019

Apartheid Linux – a minimal anti-forensic live CD, based on a stripped down version of Debian Jessie with the light and nimble LXDE desktop environment. Built for privacy, Apartheid comes with a working and properly configured version of the Tor Browser. Since the OS is run from RAM, no trace of Tor usage is found on the computer, and no data can of course be written to the CD.

Apartheid Linux can be installed to the hard drive using the «refractainstaller» tool. It can also be installed to a USB stick.

Apartheid Linux is compatible with Debian, and can be turned into a regular Debian install. The biggest difference is that Apartheid comes pre-configured and supports more hardware.

The first version of Apartheid Linux was based on PCLinuxOS, the latest ones on Debian.

Live CD info
User name: guest
Password: guest
Root password: root

Download

Apartheid Linux Antiforensic Debian Edition 14.88 i586 598MB.iso
md5sum: 6d8ff812a50de2740f23e08418fe6d8c

Apartheid Linux Cyberwar Edition x64 1.48GB.iso
md5sum: cc3a713174584899508857e323e8f9bf

Weakerthan Linux

Weakerthan Linux

Web site: weaknetlabs.com (not active)
Origin: unknown
Category: Security, Pentest
Desktop environment: Fluxbox
Architecture: x86
Based on: Debian
Wikipedia:
Media: Live DVD
The last version | Released: 8 | February 19, 2018
Zobacz po polsku Zobacz po polsku: Weakerthan Linux

Weakerthan Linux – a specialist Linux distribution dedicated to conducting penetration testing and security checking of operating systems.

Weakerthan Linux >= 6.x is based on the Debian GNU/Linux distribution.
Older versions of the system were built on Ubuntu.

The system is equipped with an ultra-light Fluxbox desktop and a wide set of specialized applications, such as:
– BRuWRT-FORSSE
– Easy-SSHd
– Web-Hacking-Portal
– Perlwd
– Netgh0st
– YouTube-Thief
– Netgh0st
– DomainScan
– ADtrace
– Admin-Tool
– Tartarus
– Fang md5 cracker
– CredCrack
– Bettercap
– Browser Exploitation Framework
– EFF Privacy Badger Plugin

The system developer is Douglas Berdeaux.

Download

No download is available.
md5sum:

DEFT Linux

DEFT Linux

Web site: deftlinux.net (not active)
Origin: Italy
Category: Specialist, Pentest
Desktop environment: LXDE
Architecture: x86_64
Based on: Lubuntu
Wikipedia (IT): DEFT Linux
Media: Live CD
The last version | Released: 2018.2 | September 1, 2018
Zobacz po polsku Zobacz po polsku: DEFT Linux

DEFT Linux – a live GNU/Linux distribution of free software based on Ubuntu for uses related to Computer Forensics (computer forensics in Italy) and IT security.

The tools included in the system allow you to open encrypted files and recover deleted data.
DART – Digital Advanced Response Toolkit – a graphical tool allows you to check the integrity of each tool before its execution.

The system is built on a lightweight Lubuntu distribution and is available for 64 bit machines as hybrid ISO DVD/USB image.

DEFT Zero was released at the beginning of 2017, which offers a reduced version of the system, which fits on a single CD.

Download

DEFTZ Linux 2018.2 amd64 691MB.iso
md5sum: cd410c27ac580f0efd1d7eab408b4edb

 

irBSD

irBSD

Web site: pclite.net/page/irbsd (not active)
Origin: Iran
Category: Security, Pentest
Desktop environment: Ratpoison
Architecture: x86_64
Based on: NetBSD
Wikipedia:
Media: Live USB
The last version | Released: 8.0 | January 7, 2019
Zobacz po polsku Zobacz po polsku: irBSD

irBSD – a digital forensics kit based on the NetBSD operating system designed for cryptography, penetration testing, data recovery, reverse engineering, privacy protection and other security tasks.

irBSD is based on the NetBSB operating system, uses ‘pkgin’ for package management and the Ratpoison window manager as a default desktop. irBSD is configured for USB drives on x86_64 platforms.

Requires a USB drive with a minimum size of 8 GB.

User: irBSD
Password: irbsd.net

Download

irBSD amd64 992MB.img.gz
md5sum: b825fecf5c1c6f5df5a2f40c06de488d

 

Advanced Persistent Security

Advanced Persistent Security

Web site: sourceforge.net/projects/sistemas-operativos/
Origin:
Category: Security, Pentest
Desktop environment: GNOME
Architecture: x86_64
Based on: Debian
Wikipedia:
Media: Live DVD
The last version | Released: 5.4 | December 31, 2017
Zobacz po polsku Zobacz po polsku: Advanced Persistent Security

Advanced Persistent Security – a Debian based specialist Linux distribution for digital forensics and penetration testing.

The system is designed from a core that avoids the detection of sdhash and Memory analysis and to navigate without being detected or registered by any search engine or online platform denying all types of response to servers.

Built-in security allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure.
The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core.

The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity.

With a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis.

Download

Advanced Persistent Security 5.4 amd64 2.93GB.iso
md5sum: 5d6ad6c873478cb94b71d74a8a003fbf

 

VAST

VAST

Web site: vipervast.sourceforge.net
Origin: USA
Category: Secutiry, Pentest
Desktop environment: Cinnamon
Architecture: x86
Based on: Linux Mint
Wikipedia:
Media: Live DVD
The last version | Released: 3.1 | October 29, 2012

VAST – a Linux-based security distribution specifically designed for pentesting VoIP and UC networks.

It enables security professionals and UC administrators to rapidly perform VoIP security assessments and enumerate vulnerabilities in IP Phones or IP PBX servers in a lab environment. With VAST, a security consultant has every tool necessary to carry out a successful onsite or remote penetration test or vulnerability assessment against a UC network.

VAST is built on Mint Linux 13 and includes all of the open source VIPER Lab tools, in addition to some other network pentest tools.

Live system username/password: vast

Download

VAST 3.1 i386 1.72GB.iso
md5sum: 22651c33e23a7e3a4225947937a49a0b

 

ArcheryOS

ArcheryOS

Web site: archeryos.org (not active)
Origin:
Category: Security, Pentest
Desktop environment: i3
Architecture: x86_64
Based on: Arch Linux
Wikipedia:
Media: Live DVD
The last version | Released: 2018.04.22 | April 22, 2018

ArcheryOS – a custom pentesting distro based on Arch Linux. It was released under two versions, one with OpenRC and the second one with Systemd.

It has a curses installer, some preinstalled applications such as i3, ranger, polybar, and firefox. It has a pentesting focus, but only has about 30 tools preinstalled, as not to provide hundreds of similar tools, that are ultimately useless.

Firefox has some about:config tweaks built in, and some privacy addons preinstalled. There is also offline Documentation, written in latex, containing the pentesting tools installed, and the i3 keybinds.