Local Area Security

local area security

Web site: www.localareasecurity.com (not active) Origin: USA Category: Security Desktop environment: Fluxbox Architecture: x86 Based on: Knoppix Wikipedia: Media: Live The last version | Released: 0.5 | March 6, 2004 Local Area Security (L.A.S.) – live-CD Linux distribution for information security professionals. It contains over 250 security tools including all the usual suspects (Nmap, Nessus, … Read more

Live Hacking

live hasking

Web site: www.livehacking.com/live-hacking-cd/ Origin: USA Category: Security, Pentest Desktop environment: GNOME Architecture: x86 Based on: Ubuntu Wikipedia: Media: Live DVD The last version | Released: 1.3a | May 2009 Live Hacking – a Linux distribution packed with tools and utilities for ethical hacking, penetration testing and countermeasure verification. Based on Ubuntu this ‘Live DVD” runs … Read more

Cyborg Hawk

cyborghawk

Web site: cyborg.ztrela.com Origin: India Category: Security, Pentest Desktop environment: GNOME Architecture: x86_64 Based on: Ubuntu Wikipedia: Media: Live DVD The last version | Released: 1.1 | January 21, 2015 Cyborg Hawk – a Linux distribution based on Ubuntu platform with latest kernel for cyber security professionals, but can be used by everyone, however it … Read more

ELE

ele

Web site: northernsecurity.net (not active) Origin: Category: Security Desktop environment: Fluxbox Architecture: x86 Based on: Damn Small Linux Wikipedia: Media: Live CD The last version | Released: 0.0.2 | March 23, 2005 ELE (Everything Leaves Encrypted) – a bootable Live CD Linux distribution based on Damn Small Linux. The ELE lets users to use encrypted … Read more

REMnux

remnux

Web site: zeltser.com/remnux/ Origin: USA Category: Security Desktop environment: LXDE Architecture: x86 Based on: Ubuntu Wikipedia: Media: OVA The last version | Released: 7.0 | July 21, 2020 Zobacz po polsku: REMnux REMnux – a Linux distribution based on Ubuntu, incorporates many free tools for analyzing Windows and Linux malware, examining browser-based threats such as … Read more

Skip to content