• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery)

March 14, 2006

Views: 1,199,683

1. BackTrack

The newest contender on the block of course is BackTrack, which we have spoken about previously. An innovative merge between WHax and Auditor (WHax formely WHoppix).

BackTrack is the result of the merging of two Innovative Penetration Testing live Linux distributions Whax and Auditor, combining the best features from both distributions, and paying special attention to small details, this is probably the best version of either distributions to ever come out.

Based on SLAX (Slackware), BackTrack provides user modularity. This means the distribution can be easily customised by the user to include personal scripts, additional tools, customised kernels, etc.

Get BackTrack Here.

2. Operator

Operator is a very fully featured LiveCD totally oriented around network security (with open source tools of course).

Operator is a complete Linux (Debian) distribution that runs from a single bootable CD and runs entirely in RAM. The Operator contains an extensive set of Open Source network security tools that can be used for monitoring and discovering networks. This virtually can turn any PC into a network security pen-testing device without having to install any software. Operator also contains a set of computer forensic and data recovery tools that can be used to assist you in data retrieval on the local system.

Get Operator Here

3. PHLAK

PHLAK or [P]rofessional [H]acker’s [L]inux [A]ssault [K]it is a modular live security Linux distribution (a.k.a LiveCD). PHLAK comes with two light gui’s (fluxbox and XFCE4), many security tools, and a spiral notebook full of security documentation. PHLAK is a derivative of Morphix, created by Alex de Landgraaf.

Mainly based around Penetration Testing, PHLAK is a must have for any pro hacker/pen-tester.

Get PHLAK Here (You can find a PHLAK Mirror Here as the page often seems be down).

4. Auditor

Auditor although now underway merging with WHax is still an excellent choice.

The Auditor security collection is a Live-System based on KNOPPIX. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Independent of the hardware in use, the Auditor security collection offers a standardised working environment, so that the build-up of know-how and remote support is made easier.

Get Auditor Here

5. L.A.S Linux

L.A.S Linux or Local Area Security has been around quite some time aswell, although development has been a bit slow lately it’s still a useful CD to have. It has always aimed to fit on a MiniCD (180MB).

Local Area Security Linux is a ‘Live CD’ distribution with a strong emphasis on security tools and small footprint. We currently have 2 different versions of L.A.S. to fit two specific needs – MAIN and SECSERV. This project is released under the terms of GPL.

Get L.A.S Linux Here

6. Knoppix-STD

Horrible name I know! But it’s not a sexually trasmitted disease, trust me.

STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.

Get Knoppix-STD Here

7. Helix

Helix is more on the forensics and incident response side than the networking or pen-testing side. Still a very useful tool to carry.

Helix is a customized distribution of the Knoppix Live Linux CD. Helix is more than just a bootable live CD. You can still boot into a customized Linux environment that includes customized linux kernels, excellent hardware detection and many applications dedicated to Incident Response and Forensics.

Get Helix Here

8. F.I.R.E

A little out of date, but still considered the strongest bootable forensics solution (of the open-source kind). Also has a few pen-testing tools on it.

FIRE is a portable bootable cdrom based distribution with the goal of providing an immediate environment to perform forensic analysis, incident response, data recovery, virus scanning and vulnerability assessment.

Get F.I.R.E Here

9. nUbuntu

nUbuntu or Network Ubuntu is fairly much a newcomer in the LiveCD arena as Ubuntu, on which it is based, is pretty new itself.

The main goal of nUbuntu is to create a distribution which is derived from the Ubuntu distribution, and add packages related to security testing, and remove unneeded packages, such as Gnome, Openoffice.org, and Evolution. nUbuntu is the result of an idea two people had to create a new distribution for the learning experience.

Get nUbuntu Here

10. INSERT Rescue Security Toolkit

A strong all around contender with no particular focus on any area (has network analysis, disaster recovery, antivirus, forensics and so-on).

INSERT is a complete, bootable linux system. It comes with a graphical user interface running the fluxbox window manager while still being sufficiently small to fit on a credit card-sized CD-ROM.

The current version is based on Linux kernel 2.6.12.5 and Knoppix 4.0.2

Get INSERT Here

Extra – Knoppix

Remember this is the innovator and pretty much the basis of all these other distros, so check it out and keep a copy on you at all times!

Not strictly a security distro, but definately the most streamlined and smooth LiveCD distribution. The new version (soon to be released – Knoppix 5) has seamless NTFS writing enabled with libntfs+fuse.

KNOPPIX is a bootable CD or DVD with a collection of GNU/Linux software, automatic hardware detection, and support for many graphics cards, sound cards, SCSI and USB devices and other peripherals. KNOPPIX can be used as a productive Linux desktop, educational CD, rescue system, or adapted and used as a platform for commercial software product demos. It is not necessary to install anything on a hard disk.

Get Knoppix Here

Other Useful Resources:

SecurityDistros
FrozenTech LiveCD List
DistroWatch

Others to consider (Out of date or very new):

SlackPen
ThePacketMaster
Trinux
WarLinux
Network Security Toolkit
BrutalWare
KCPentrix
Plan-B
PENToo

New ones added from authors e-mail/slashdotters and diggers:

Arudius
The Gentoo Forensic Toolkit
Anonym-OS

Digg This Article

Share
Tweet48
Share12
Buffer
WhatsApp
Email
60 Shares

Filed Under: Hacking Tools, Networking Hacking Tools Tagged With: auditor, backtrack, knoppix, livecd, Security Software, whax



Reader Interactions

Comments

  1. Janel says

    March 14, 2006 at 11:21 pm

    INSERT also installs on USB thumb drives, though not very easily. I ordered one pre-installed from http://linuxusb.nfshost.com/ and it works great (though not on some of the older computers I’ve tried). Great for quickly bypassing security on computers. -Janel

  2. AF-Geek says

    March 15, 2006 at 1:18 am

    I also like “Auditor” at http://www.remote-exploit.org/index.php/Auditor

    Thanks for the great listing. Time to use up some downloading bandwidth!

    Dugg!

  3. Darknet says

    March 15, 2006 at 2:44 am

    Janel: Thanks I might edit that in, haven’t tried it on USB.

    AF-Geek: Auditor is there at number 4 :) Even though it’s merged with WHax they are still both great on their own.

  4. JB says

    March 15, 2006 at 6:13 am

    I have used both Auditor and Helix, with great results from both. I will have to check out the rest of these recommendations, especially BackTrack.

  5. Ivan Minic says

    March 15, 2006 at 8:01 am

    Wow… Thanks for this :)

  6. TP says

    March 15, 2006 at 9:45 am

    Where is OpenBSD???

  7. freak says

    March 15, 2006 at 9:55 am

    my e-penis is bigger/better than yours!! thats all this article is. its like comparing vi to emacs, or slackware to redhat. there is no ‘better’ they all have/lack something that the others do not. just list the pros/cons and let the end user decide which best suites his/her needs. then there is less likely a chance of a flame way.

  8. piercedfreak says

    March 15, 2006 at 9:57 am

    why not just roll your own. the scripts are everywhere, and you can be sure there isnt a hidden rootkit in the installer, or apps, plus you can make sure it has the tools you know how to use, and will need, instead of having to deal with pico, if you are a emacs person, or vi, and what not.

  9. Fred says

    March 15, 2006 at 11:10 am

    OpenBSD live cd =

    OliveBSD

  10. Joe says

    March 15, 2006 at 11:24 am

    Great synopsis of these tools. Thanks for gathering it all together.

  11. John Doe says

    March 15, 2006 at 11:39 am

    Most certainly not the top 10, but here’s one which should have been added…

    http://g.paderni.free.fr/olivebsd/

  12. John Smith says

    March 15, 2006 at 12:40 pm

    OpenBSD

  13. JD says

    March 15, 2006 at 12:45 pm

    To all the people asking why the OpenBSD Live CD isn’t included :

    Does using OpenBSD damage your eyes or something? Look at the big bold letters at the top of this page – this is about Live CDs used for security testing and not about how secure the Live CDs are. I checked out OliveBSD and I didn’t see a single security auditing package included.

    Thank you wasting my time – keep up the excellent advocacy work.

  14. obaid says

    March 15, 2006 at 3:36 pm

    lol

  15. tankgrrl says

    March 15, 2006 at 4:30 pm

    Not for pentesting, but good for investigations:

    Anonym.OS BSD Live CD

  16. antifreak says

    March 15, 2006 at 5:26 pm

    Yeah, freak(s)…just shut it. Darknet put this all together for people who appreciate it. If you don’t…then ‘roll your own’ e-penis. Many of us don’t have time to track down all the scripts, compare versions, and put it all together.

    Thanks, Dark, mucho appreciated from this side…

  17. Hackbird says

    March 16, 2006 at 7:18 am

    I tested BackTrack in and out. The basic idea and concept is really great. Since it’s just a beta version it’s not too stable. But anyway, a terrific toolset one couldn’t avoid!

  18. Rubén says

    March 16, 2006 at 4:25 pm

    OpenBSD is not GNU/Linux.

    So, the term ‘distro’ is usually used to GNU/Linux.

  19. SiD3WiNDR says

    March 19, 2006 at 10:27 am

    You may also want to check out lnx4n6 (Linux Forensics) created by the Belgian Federal Computer Crime Unit.

  20. SwordlessSamuri says

    March 27, 2006 at 4:54 am

    BackTrack Rocks, altough there is some wireless bug’s… but all else is A-ok… Knoppix STD is out of date, and PHLAK has old packages…

  21. Paul says

    May 15, 2006 at 11:53 am

    All 10 distros are available on one DVD:
    http://www.securedvd.org/ sdfsdfasd

  22. jac0b says

    July 6, 2006 at 6:02 pm

    just bump into your site. its a good article. a well compiled reference.

  23. Joe says

    July 22, 2006 at 8:08 pm

    Becareful. Backtrak is great, but on some laptops it does not control the fans well and will burn them up. Compaq/HP NW and NC series especially.

  24. ozgur says

    January 12, 2007 at 4:41 am

    I tried SecureDVD. It is great…but…
    4th and 8th distros don’t work!

  25. Steve says

    March 5, 2007 at 8:38 pm

    Great write up. I really like BackTrack myself. You’ll have to update this in a year when other distros have been created!

    _Steve

  26. SiD3WiNDR says

    March 7, 2007 at 8:38 pm

    Heh, it’s actually been just about a year since this was posted ;-)

  27. kolli says

    March 11, 2007 at 1:55 pm

    Great write up. I really like BackTrack myself. You’ll have to update this in a year when other distros have been created!

  28. Oyun says

    July 13, 2007 at 8:47 pm

    Good document.thanks

  29. tek se7en says

    December 12, 2007 at 9:58 am

    pen-test live cd’s + crappy old laptop = easily disposable evidence…

  30. Sir Henry says

    December 15, 2007 at 6:22 pm

    I would be interested to see your updated list for this year. After the bumps in the road for the guys developing nUbuntu, I would wonder where it would end up on your list now.

  31. Nick says

    January 29, 2008 at 6:09 pm

    Very usefull article.Wait for new things!!!

  32. Mada R Perdhana says

    March 31, 2008 at 3:02 am

    May be you might see my forensic distro Stagos FSE (Forensics Suite Edition) on my site.

    See you, there!

  33. James C says

    March 31, 2008 at 7:38 pm

    @ Mada R Perdhana
    Your site seem’s down?

  34. Pantagruel says

    March 31, 2008 at 9:02 pm

    @James C

    The site was up this afternoon, perhaps he’s doing some updates, slashdotted seems unlikely.

  35. Mada R Perdhana says

    April 3, 2008 at 3:37 am

    @James C

    I’m sorry for the inconvenience, the hosting server looks like have a trouble with their server.

    if you like you could download Stagos FSE from http://www.forensicfocus.com or
    download directly from my campus server
    http://lab.akakom.org/~mada/stagos

    best regards,
    Mada R Perdhana

  36. Allan says

    May 6, 2008 at 10:16 pm

    I’ve become a big big big fan of grml (http://grml.org/). Based on Debian, it has the hardware detection capability of Knoppix without the extra weight of OpenOffice, KDE, etc. It’s “for sysadmins / texttool-users / geeks” but X is included (and runs great).

  37. travesti says

    May 28, 2008 at 11:22 pm

    I have used both Auditor and Helix, with great results from both. I will have to check out the rest of these recommendations, especially BackTrack
    yes …

  38. razta says

    May 29, 2008 at 9:45 am

    Ive tried knoppix and backtrack, both great live cds! Theres a good windows boot cd, more of a recovery cd than security, however still a mint cd to have! “UBCD for Win” http://www.ubcd4win.com

  39. Giuseppe says

    June 1, 2008 at 5:31 pm

    I need to crack a Wifi with a Wep Key. I tried Russix but it seems to not work with my Laptop that is: Fujitsu Siemens Amilo Pro V3205.. Somebody knows a Live cd or a software suitable for that Laptop?

  40. zupakomputer says

    July 6, 2008 at 10:09 pm

    Anyone know a boot code / cheat code (or method) to get Knoppix ‘orrible name STD to boot from a SATA optical drive?

    It doesn’t scan at boot for SATA opticals, and I get the ‘can’t find filesystem’ error –

    gave the codes to look for files directly a go & also to ignore hardware at bootup, just in case they worked, but nah they don’t.

    Can I mount the optical drive from the limited shell (which is probably as cumbersome anyway as looking at the contents directly from within another OS)? Or do I just have to plug in an IDE optical and use that (ie – there’s just no SATA optical support)?

    1….2….3…..4 pingu’s!

  41. zupakomputer says

    July 7, 2008 at 3:17 pm

    Nobody knows yet………

    I’m using it justnow, on my older PC! Boots fine there, & I can use dialup to get online. This is so cool. I didn’t know these distros were like full OSs I thought they were just disk lists of tools.

    When it works, there is but one pingu.

  42. _a13x_ says

    July 29, 2008 at 5:58 am

    how about hex http://www.rawpacket.org

  43. lyz says

    August 15, 2008 at 9:24 am

    @ _a13x_

    Darknet highlighted this tool on the latest post.

    Look –> https://www.darknet.org.uk/2008/08/rawpacket-hex-network-security-monitoring-analysis-livecd/

  44. Morgan Storey says

    August 16, 2008 at 10:03 am

    @zukakomputer: Unfortunately the base that STD was built on is simply too old. Pre the large emergence of SATA. You will have to wait as the rest of have for a new version… whenever that is.

  45. Nic says

    November 5, 2008 at 9:03 am

    Very usefull article.Wait for new things!!!

  46. SUPREMO says

    March 6, 2009 at 12:47 am

    These are great tools but I have found that ophcrack which can be downloaded from sourceforge is easy to use and very effective for recovering windows xp and vista usernames+passwords or even rainbow crack is good too.

  47. XXX says

    April 6, 2009 at 9:40 am

    there are backtrack Virtual image available………

    contact me if u want…..

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Views: 273

As threat surfaces grow and attack sophistication increases, many security teams face the same … ...More about Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance

Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

Views: 448

With more businesses running Linux in production—whether in bare metal, VMs, or containers—the need … ...More about Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked)

SUDO_KILLER - Auditing Sudo Configurations for Privilege Escalation Paths

SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Views: 483

sudo is a powerful utility in Unix-like systems that allows permitted users to execute commands with … ...More about SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths

Bantam - Advanced PHP Backdoor Management Tool For Post Exploitation

Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

Views: 395

Bantam is a lightweight post-exploitation utility written in C# that includes advanced payload … ...More about Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation

AI-Powered Cybercrime in 2025 - The Dark Web’s New Arms Race

AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Views: 608

In 2025, the dark web isn't just a marketplace for illicit goods—it's a development lab. … ...More about AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race

Upload_Bypass - Bypass Upload Restrictions During Penetration Testing

Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Views: 562

Upload_Bypass is a command-line tool that automates discovering and exploiting weak file upload … ...More about Upload_Bypass – Bypass Upload Restrictions During Penetration Testing

Topics

  • Advertorial (28)
  • Apple (46)
  • Countermeasures (228)
  • Cryptography (82)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (431)
  • Forensics (65)
  • GenAI (3)
  • Hacker Culture (8)
  • Hacking News (229)
  • Hacking Tools (684)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (238)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (104)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (118)
  • Security Software (234)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (169)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker – Download brutus-aet2.zip AET2 (2,294,808)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,088)
  • Top 15 Security Utilities & Download Hacking Tools (2,096,624)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,199,683)
  • Password List Download Best Word List – Most Common Passwords (933,491)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (776,148)
  • Hack Tools/Exploits (673,293)
  • Wep0ff – Wireless WEP Key Cracker Tool (530,159)

Search

Recent Posts

  • Wazuh – Open Source Security Platform for Threat Detection, Visibility & Compliance May 16, 2025
  • Best Open Source HIDS Tools for Linux in 2025 (Compared & Ranked) May 14, 2025
  • SUDO_KILLER – Auditing Sudo Configurations for Privilege Escalation Paths May 12, 2025
  • Bantam – Advanced PHP Backdoor Management Tool For Post Exploitation May 9, 2025
  • AI-Powered Cybercrime in 2025 – The Dark Web’s New Arms Race May 7, 2025
  • Upload_Bypass – Bypass Upload Restrictions During Penetration Testing May 5, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy