• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

The Kcpentrix Project – Penetration Testing Toolkit LiveDVD

June 26, 2007

Views: 12,167

[ad]

The Kcpentrix Project was founded in May 2005 , KCPentrix 1.0 was liveCD designed to be a standalone Penetration testing toolkit for pentesters, security analysts and System administrators

What’s New in KcPentrix 2.0

Now release 2.0 is a liveDVD, It features a lot of new or up to date tools for auditing and testing a network, from scanning and discovering to exploiting vulnerabilities

Kcpentrix is based on SLAX 5, a Slackware live DVD, the Powerful modularity which Kcpentrix uses, allow it to be easily customised and include relevant modules.

It has switched to 2.6 kernel line and Zisofs compression was replaced by SquashFS, which provides better compression ratio and higher read speed.

You can download the ISO from Kcpentrix.com or Securitydistro.com here:

Kcpentrix v2.0

Or read more here.

Some of the key tools/software included:

ARP

arping-2.04
seringe
arp-sk
arpspoof

Backdoors

hbkdr.tar.gz
hbkdr.zip
sbd-1.37.tar.gz
ssheater-1.1.tar.gz
x86-linux-connectback.c
x86-linux-portbind.c

Bruteforce

adsmb-0.3
adsnmp-0.1
brutus-0.9.2
crackcvspass-v0.1
john-1.7.2
Online_Rainbow
onesixtyone-0.3.2
nat-1.0.4
mdcoll
lodowep
SIPcrack-0.1
smbat
TFTP-bruteforce
VNCcrack-0.9.1
wyd
crunch
md5crack.pl
ophcrack
thc-pptp-bruter
vncrack

Cisco

brute-enable-v.1.0.2
cisco-auditing-tool-v.1.0
cisco-global-exploiter
cisco-scanner-v.1.3
cisco-torch-0.4b
ciscopack
copy-router-config-v.0.1
eigrp-tools
ios-w3-vul
ios7decrypt-v.1.1
jitney-0.10

Database

sqlbrute.py
bsqlbf.pl
mysql_bftools
metacoretex-0.8.0
oat
oscanner_bin
checkpwd
sidguess
tnscmd10g.pl
bfora.pl
dbcool_audit.pl
oracletest.pl
tnsprobe.sh
oracle-scanner-v.1.0.6
oracle-dump-sids-v0.0.1
oat-v.1.3.1

Enumeration

dnswalk
DNSBruteforce.py
dns-ptr
dnsenum
dnsmap
dns-predict-v.0.0.2
fingergoogle-1.1
googrape-v.0.1
gooscan-v0.9
goog-mail.py
qgoogle.py
google-search
dnspython-1.3.2
dnslib.py
httplib.py
inet-enum.py
isr-form-1.0
ldap-enum-v.003
ldapbrowser
list-urls
lsrtunnel-0.2.1
mibble-2.6
mibble-2.7
nmbscan-1.2.4
nstx
relayscanner
revhosts
smb-enum
smtp-vrfy
snmpenum.pl
httprint_301

Firewall

ftester-1.0
Morena
hping2

Forensics

autopsy-2.06
sleuthkit
sleuthkit-2.03

Fuzzers

bed
bed-v.0.5
cirt-fuzzer
clfuzz
fuzzer-1.1
fuzzer-1.2
fuzzer-mod
mistress
Peach
pirana-0.2.1
snmp-fuzzer-0.1.1
spike

Misc-tools

find_ddos3.1
fping-2.4b2
ipgenv2

Proxies

3proxy_0_5_2
paros
penproxy-0.4.10

Scanners

banshee-3.3
dcom_scanner
hydra-5.3
knocker-0.7.1
lsrscan-1.0
ike-scan
amap
nikto-1.35
pbnj
nbtscan
nmap
nmapfe
sinfp.pl
VNC_bypauth

Sniffers

aimsniff-0.9d
aimsniff-1.0beta
PHoss
xspy
dsniff
p0f
wireshark

Spoofing

netsed

Tunnelling

3proxy
iodine-0.3.2
proxytunnel-1.6.3

Web

asp-audit
metoscan04
proxyfinder-1.0
sqlibf
sqlinject-1.1
wal
easy-scraper.pl
hacker_webkit.tar.gz
mysql-miner.pl
put.pl

Wireless

aircrack-2.2-beta1
aircrack-ng-0.6.2
airpwn-1.3
airsnarf-0.2
asleap-1.4
wifitap
hotspotter-0.4
fakeap-0.3.2
cowpatty-2.0
wep_crack
wep_decrypt

Related Posts:

  • An Introduction To Web Application Security Systems
  • RustRedOps - Rust Native Offensive Toolkit…
  • Tyton - Kernel-Mode Rootkit Hunter for Linux
  • mcp-scan - Real-Time Guardrail Monitoring and…
  • Reaper - Unified Application Security Testing with…
  • Privacy Implications of Web 3.0 and Darknets
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Exploits/Vulnerabilities, Hacking Tools, Linux Hacking Tagged With: hacking-live-cd, linux-livecd, live-cd, livecd, pen-testing-livecd, toolkit



Reader Interactions

Comments

  1. Daniel says

    June 26, 2007 at 11:47 am

    while i’m all for hacker live CD’s,
    i’m all against hacker live DVD’s
    just cut out some gui stuff and fit it on a CD, come on now. If ubuntu fits on a CD, anything with only hacker stuff should

  2. backbone says

    June 26, 2007 at 10:00 pm

    I agree with u daniel… also there are many tools that do the same stuff…

  3. therealdonquixote says

    June 27, 2007 at 9:54 pm

    Yeah, KCPentrix seems a bit bulky to me too. However, I’m not averse to a live DVD with a few different distros to choose from or one awesome one.

    I tried using Ubuntu Ultimate as a base for all the hacking apps in Back|Track but there are just too many resource hogs there to deal with. Plus, feisty fawn is buggy as all hell.

    I’m sticking with Back|Track 2.0 for now, at least until Back|Track 3.0 comes out. If BT 3.0 is a DVD I’d use it. You can always install it to a thumbdrive for faster read-write capabilities, or just sack up and install to a partition on your HDD.

    I’d like to see a modified Adept installer or Kpackage updater in there, but with hacking repositories and slax kernel updates instead of Ubuntu and GNOME craptackery. Honestly, I really don’t care how pretty my desktop looks, *cough* beryl sux *cough*. As long as everything is fast and has a bit of ease of use added in, I’m as happy as a nerd in a strip joint.

  4. Darknet says

    June 29, 2007 at 8:33 am

    I don’t mind DVD’s really.

    More choice is better, there are a lot of ways to crack a nut :)

    Some people prefer different tools for different things and all modern machines come with DVD drives anyway.

    I still think BackTrack rocks it though.

    And a release that updates the hacking tools themselves from a repository would be an awesome project.

  5. Daniel says

    June 30, 2007 at 12:21 am

    I dislike DVD’s because not always is the machine you need to compromise “modern” the main box i hack is just my friend’s fileserver (because we have an attacker-defender rivalry going on) and that’s an old beigebox with no DVD drive.

    Crap, forgot to note that, while Backtrack is the Cheese,
    i a actually like nUbuntu better. and Knoppixt STD isn’t bad for light Grey hat stuff.

  6. therealdonquixote says

    June 30, 2007 at 5:12 am

    Yep, nUbuntu is cool, but I think someone could make a better solution that can serve as a solid OS to use all the time as well as a pentesting suite.

    All someone needs to do, is use reconstructor to put all the tools from Back|Track into a strpped down Kubuntu distro. Of course this would take time. Darn you time!!

    That and my need to eat and sleep and pee all the friggin’ time are what’s really holding me back in this world.

    Sorry TMI.

  7. Daniel says

    June 30, 2007 at 1:28 pm

    @therealdonquixote

    is this you?

    i was reading both blogs simultaneously and ran across the same-ish name twice.

  8. therealdonquixote says

    July 1, 2007 at 12:33 am

    Nope, that’s why I have everything under the REAL don quixote, cause its apparently a popular handle after I made it infamous by doing absolutely nothing of importance. XD

  9. Donnie says

    May 13, 2008 at 1:06 am

    Can anyone out there who has install Kcpentrix to there harddrive, give step by step intstructions on how to do this?

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 682

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 711

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 401

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,638

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 501

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 575

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,403,900)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,903)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,361)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,192)
  • Password List Download Best Word List – Most Common Passwords (934,430)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,145)
  • Hack Tools/Exploits (674,083)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,148)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy