Are there any x86 security Linux distributions based on Ubuntu? [closed]

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP












-3















Are there any x86 security distributions like Kali Linux or better them based on Ubuntu?










share|improve this question















closed as too broad by Thomas, Archemar, Anthony Geoghegan, RalfFriedl, telcoM Jan 22 at 0:54


Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.






















    -3















    Are there any x86 security distributions like Kali Linux or better them based on Ubuntu?










    share|improve this question















    closed as too broad by Thomas, Archemar, Anthony Geoghegan, RalfFriedl, telcoM Jan 22 at 0:54


    Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.




















      -3












      -3








      -3








      Are there any x86 security distributions like Kali Linux or better them based on Ubuntu?










      share|improve this question
















      Are there any x86 security distributions like Kali Linux or better them based on Ubuntu?







      ubuntu security distributions






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Jan 21 at 8:39







      Tom Anderson

















      asked Jan 21 at 6:49









      Tom AndersonTom Anderson

      32




      32




      closed as too broad by Thomas, Archemar, Anthony Geoghegan, RalfFriedl, telcoM Jan 22 at 0:54


      Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.









      closed as too broad by Thomas, Archemar, Anthony Geoghegan, RalfFriedl, telcoM Jan 22 at 0:54


      Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer. Avoid asking multiple distinct questions at once. See the How to Ask page for help clarifying this question. If this question can be reworded to fit the rules in the help center, please edit the question.






















          1 Answer
          1






          active

          oldest

          votes


















          2














          The DistroWatch.com search allows for filtering distributions by “Distribution category”, one being “Security”, as well as descendance (“Based on”). The search yields the following three results:



          • BackBox Linux (https://www.backbox.org)

            BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.


          • Linux Kodachi (https://www.digi77.com/linux-kodachi/)

            Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.


          • Zentyal Server (http://www.zentyal.org)

            Zentyal Server (formerly eBox Platform) is a commercial unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.


          It’s not on DistroWatch (yet), but another security and privacy aimend distro based on Ubuntu is:



          • Discreete Linux (https://www.privacy-cd.org)

            Discreete Linux is an operating system with the special purpose of protecting data (more precisely: people) against surveillance attacks with trojan software.





          share|improve this answer































            1 Answer
            1






            active

            oldest

            votes








            1 Answer
            1






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            2














            The DistroWatch.com search allows for filtering distributions by “Distribution category”, one being “Security”, as well as descendance (“Based on”). The search yields the following three results:



            • BackBox Linux (https://www.backbox.org)

              BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.


            • Linux Kodachi (https://www.digi77.com/linux-kodachi/)

              Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.


            • Zentyal Server (http://www.zentyal.org)

              Zentyal Server (formerly eBox Platform) is a commercial unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.


            It’s not on DistroWatch (yet), but another security and privacy aimend distro based on Ubuntu is:



            • Discreete Linux (https://www.privacy-cd.org)

              Discreete Linux is an operating system with the special purpose of protecting data (more precisely: people) against surveillance attacks with trojan software.





            share|improve this answer





























              2














              The DistroWatch.com search allows for filtering distributions by “Distribution category”, one being “Security”, as well as descendance (“Based on”). The search yields the following three results:



              • BackBox Linux (https://www.backbox.org)

                BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.


              • Linux Kodachi (https://www.digi77.com/linux-kodachi/)

                Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.


              • Zentyal Server (http://www.zentyal.org)

                Zentyal Server (formerly eBox Platform) is a commercial unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.


              It’s not on DistroWatch (yet), but another security and privacy aimend distro based on Ubuntu is:



              • Discreete Linux (https://www.privacy-cd.org)

                Discreete Linux is an operating system with the special purpose of protecting data (more precisely: people) against surveillance attacks with trojan software.





              share|improve this answer



























                2












                2








                2







                The DistroWatch.com search allows for filtering distributions by “Distribution category”, one being “Security”, as well as descendance (“Based on”). The search yields the following three results:



                • BackBox Linux (https://www.backbox.org)

                  BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.


                • Linux Kodachi (https://www.digi77.com/linux-kodachi/)

                  Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.


                • Zentyal Server (http://www.zentyal.org)

                  Zentyal Server (formerly eBox Platform) is a commercial unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.


                It’s not on DistroWatch (yet), but another security and privacy aimend distro based on Ubuntu is:



                • Discreete Linux (https://www.privacy-cd.org)

                  Discreete Linux is an operating system with the special purpose of protecting data (more precisely: people) against surveillance attacks with trojan software.





                share|improve this answer















                The DistroWatch.com search allows for filtering distributions by “Distribution category”, one being “Security”, as well as descendance (“Based on”). The search yields the following three results:



                • BackBox Linux (https://www.backbox.org)

                  BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.


                • Linux Kodachi (https://www.digi77.com/linux-kodachi/)

                  Linux Kodachi is a Debian-based distribution which can be run from a DVD or USB thumb drive. The distribution filters all network traffic through a VPN and the Tor network, obscuring the user's network location. The distribution attempts to clean up after itself, removing traces of its use from the computer.


                • Zentyal Server (http://www.zentyal.org)

                  Zentyal Server (formerly eBox Platform) is a commercial unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.


                It’s not on DistroWatch (yet), but another security and privacy aimend distro based on Ubuntu is:



                • Discreete Linux (https://www.privacy-cd.org)

                  Discreete Linux is an operating system with the special purpose of protecting data (more precisely: people) against surveillance attacks with trojan software.






                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Jan 21 at 12:34

























                answered Jan 21 at 7:28









                dessertdessert

                1,054421




                1,054421












                    Popular posts from this blog

                    How to check contact read email or not when send email to Individual?

                    Displaying single band from multi-band raster using QGIS

                    How many registers does an x86_64 CPU actually have?