Exploit the possiblities
Showing 1 - 6 of 6 RSS Feed


Posted Aug 1, 2000
Authored by Matthew Franz | Site trinux.sourceforge.net

Trinux transparently converts ordinary x86 PCs into a powerful network security workstations by combining Linux Slackware 7.1 with all of the most powerful precompiled Open Source security/monitoring tools. Trinux boots from a single floppy disk and runs entirely in RAM. Trinux is useful for Port scanning, packet sniffing, vulnerability scanning, sniffer detection, packet construction, active/passive OS fingerprinting, network monitoring, session hijacking, intrusion detection, and more. Trinux 0.70 is the most stable and compact Trinux release to date and is based on Busybox/glibc2.1.3 and kernel 2.2.16. Among the included packages are nmap2.54beta1, adm-smb, nbtstat, tcp_scan, cgichk, ddos-scan, dsniff, despoof, hunt, zodiac, netcat, openssh, hping2, sing, isic, p0f, fragrouter, tcpreplay, sentinel, ethereal 0.8.10, ngrep, nstreams, tcpdump, ntop, netwatch, and more.

tags | x86, kernel
systems | linux, slackware
MD5 | e5016314821984c82a11d4c951a661d2
Posted Aug 1, 2000

Trinux related links.

systems | linux
MD5 | ead15a80927754df7a8194948b94c76a
Posted Aug 1, 2000

A short FAQ on Trinux

systems | linux
MD5 | c1c698765644b36f579603c14cd85542
Posted Aug 1, 2000

Simple Rawrite Documentation.

systems | linux
MD5 | faf2b0f09edde6a2baa24814394d309f
Posted Aug 1, 2000

Rawrite v1.3 is the de-facto standard for writing kernel images to floppy disks.

tags | kernel
systems | linux
MD5 | f46bf6c3d1c925a05de879a4ed5d994f
Posted Aug 1, 2000

The Trinux Logo

systems | linux
MD5 | d9928cebddb4e4f3b864a7359c4eae8e
Page 1 of 1

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

Top Authors In Last 30 Days

Recent News

News RSS Feed
Lebanese Government Hackers Hit Thousands Of Victims With Incredibly Simple Campaign
Posted Jan 19, 2018

tags | headline, government, malware, fraud, cyberwar, phish
Dridex Banking Trojan Compromises FTP Sites In New Campaign
Posted Jan 19, 2018

tags | headline, malware, bank, trojan, cybercrime, fraud
Triton Exploited Zero-Day Flaw To Target Industrial Systems
Posted Jan 19, 2018

tags | headline, hacker, malware, cyberwar, scada
Apple Sued Over Being Susceptible To Meltdown / Spectre
Posted Jan 19, 2018

tags | headline, flaw, apple, intel
Intel Fix Causes Reboots And Slowdowns
Posted Jan 18, 2018

tags | headline, flaw, intel
Text Bomb Is Latest Apple Bug
Posted Jan 18, 2018

tags | headline, phone, denial of service, flaw, apple
Industrial Systems Scrambling To Catch Up With Meltdown, Spectre
Posted Jan 18, 2018

tags | headline, flaw, scada, intel
German Hacker Offers Rare Look Inside Secretive World Of Julian Assange, WikiLeaks
Posted Jan 18, 2018

tags | headline, hacker, government, britain, data loss, germany
Google Intros Security Center Tool For G Suite
Posted Jan 18, 2018

tags | headline, google
Hackers Can't Dig Into Latest Xiaomi Phone Due To GPL Violations
Posted Jan 18, 2018

tags | headline, hacker, phone, google
View More News →
packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By