Tag: Network Forensics

Helix3 [Commercial Version]

Helix3 Enterprise is an easy to use cyber security solution integrated into your network giving you visibility across your entire infrastructure revealing malicious activities such as Internet abuse, data sharing and harassment.  H3E also allows you to isolate and respond to incidents or threats quickly and without user detection through a central administration tool.   …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/helix3-commercial-version/


Bugtraq system offers the most comprehensive distribution, optimal, and stable with automated services manager in real time. This distribution based on the 3.2 and 3.4 kernel Generic available in 32 Bits & 64 Bits has a huge range of penetration, forensic and laboratory tools. Bugtraq is available with XFCE, Gnome and KDE based on Ubuntu, …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/bugtraq/


CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics Currently the project manager is Nanni Bassetti. CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface. The main design objectives that CAINE …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/14/caine-and-nbcaine/


The Matriux is a phenomenon that was waiting to happen. It is a fully featured security distribution based on Debian consisting of a powerful bunch of more than 300 open source and free tools that can be used for various purposes including, but not limited to, penetration testing, ethical hacking, system and network administration, cyber …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/13/matriux/

The Samurai Web Testing Framework

The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/13/the-samurai-web-testing-framework/


Blackbuntu is distribution for penetration testing which was specially designed for security professional and practitioners of information security. It’s currently being built using the xubuntu 12.04. It’s created in our own time as a hobby. Download Blackbuntu

Permanent link to this article: http://www.darknessgate.com/2013/06/13/blackbuntu/


Pentoo is a security-focused livecd based on Gentoo It’s basically a gentoo install with lots of customized tools, customized kernel, and much more. Here is a non-exhaustive list of the features currently included : Hardened Kernel with aufs patches Backported Wifi stack from latest stable kernel release Module loading support ala slax Changes saving on …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/13/pentoo/


STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/06/12/std/

Anonym.OS LiveCD

kaos.theory’s Anonym.OS LiveCD is a bootable live cd based on OpenBSD that provides a hardened operating environment whereby all ingress traffic is denied and all egress traffic is automatically and transparently encrypted and/or anonymized. Download Anonym.OS LiveCD

Permanent link to this article: http://www.darknessgate.com/2013/06/12/anonym-os-livecd/

CSCI 130 Introduction to Computer Forensics – Fall 2008

Computer forensics is the scientific examination and analysis of data held on, or retrieved from, computer storage media in such a way that the information can be used as evidence in a court of law. The need for computer forensic services and equipment has derived from the widespread use of personal computers in both business …

Continue reading »

Permanent link to this article: http://www.darknessgate.com/2013/03/31/csci-130-introduction-to-computer-forensics-fall-2008/

Naval Postgraduate School’s Center for Information Systems Security Studies and Research

CISR Video Library.  Most of the videos available here are from the Invited Lecture Series which injects commercial and military relevance into the CISR activities. Leading experts in the field of computer science and Information Systems Security from government, academe, and industry address the students, staff, and faculty. View Website

Permanent link to this article: http://www.darknessgate.com/2013/03/31/naval-postgraduate-schools-center-for-information-systems-security-studies-and-research/