what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files

trinux-070.tgz
Posted Aug 1, 2000
Authored by Matthew Franz | Site trinux.sourceforge.net

Trinux transparently converts ordinary x86 PCs into a powerful network security workstations by combining Linux Slackware 7.1 with all of the most powerful precompiled Open Source security/monitoring tools. Trinux boots from a single floppy disk and runs entirely in RAM. Trinux is useful for Port scanning, packet sniffing, vulnerability scanning, sniffer detection, packet construction, active/passive OS fingerprinting, network monitoring, session hijacking, intrusion detection, and more. Trinux 0.70 is the most stable and compact Trinux release to date and is based on Busybox/glibc2.1.3 and kernel 2.2.16. Among the included packages are nmap2.54beta1, adm-smb, nbtstat, tcp_scan, cgichk, ddos-scan, dsniff, despoof, hunt, zodiac, netcat, openssh, hping2, sing, isic, p0f, fragrouter, tcpreplay, sentinel, ethereal 0.8.10, ngrep, nstreams, tcpdump, ntop, netwatch, and more.

tags | x86, kernel
systems | linux, slackware
SHA-256 | abf720b088d97a716c3a460f3cbc9309017e66fd5df498c0b0884026f067f04e
related.html
Posted Aug 1, 2000

Trinux related links.

systems | linux
SHA-256 | 8392bbb0e9f485ac4aa7e8beb7e7db6fd312eb0809f79962a79c8123f6ae7a72
faq.html
Posted Aug 1, 2000

A short FAQ on Trinux

systems | linux
SHA-256 | 6c8847332c7a955c9df193dd74580339aeb9b5612d3570f54763a477230583a1
rawrite3.doc
Posted Aug 1, 2000

Simple Rawrite Documentation.

systems | linux
SHA-256 | d54cb4809e173899c5f50cb91b1ca62cef0ae8a29cef3f5081fbd893852db40d
rawrite13.exe
Posted Aug 1, 2000

Rawrite v1.3 is the de-facto standard for writing kernel images to floppy disks.

tags | kernel
systems | linux
SHA-256 | 3b455434e13b3d1418fc53cc8651fe805e365068a5ac69df5032635d4f666309
trinux.gif
Posted Aug 1, 2000

The Trinux Logo

systems | linux
SHA-256 | d1609f93cb03dd689fd073dd58e4af537050cfa5d4ea8b794e910fc8c64d2ffa
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
MoD Contractor Hacked By China Failed To Report Breach For Months
Posted May 10, 2024

tags | headline, hacker, government, britain, china, cyberwar, military
Ex-White House Election Threat Hunter Weighs In On What To Expect In November
Posted May 10, 2024

tags | headline, government, usa, russia, fraud, cyberwar
FBI Working Towards Nabbing Scattered Spider Hackers, Official Says
Posted May 10, 2024

tags | headline, hacker, government, usa, fbi
Leaked FBI Email Stresses Need For Warrantless Surveillance Of Americans
Posted May 10, 2024

tags | headline, government, privacy, usa, spyware, fbi
Cybersecurity Incident Impacts Operations At Ascension Hospitals
Posted May 10, 2024

tags | headline, hacker, privacy, malware, data loss
AWS CloudQuarry: Digging For Secrets In Public AMIs
Posted May 9, 2024

tags | headline, amazon, data loss, flaw, password
LockBit Takes Credit For City Of Wichita Ransomware Attack
Posted May 9, 2024

tags | headline, malware, cybercrime, cryptography
UK Armed Forces' Personal Data Hacked In MoD Breach
Posted May 9, 2024

tags | headline, privacy, britain, data loss, cyberwar, military
TunnelVision DHCP Flaw Lets Attackers Bypass VPNs, Redirect Traffic
Posted May 9, 2024

tags | headline, privacy, flaw
Zscaler Investigates Hacking Claims After Data Offered For Sale
Posted May 9, 2024

tags | headline, hacker, flaw
View More News →
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close