Linux Exploit Suggester; based on operating system release number
(Android Forensics & Malware Analysis Included)
BHS debian (testing) jessie/sid
CodeName CIA Wheezy7.1 kali-linux IMPROVE 2 Darkc0d3 TOP-HAT-SEC Team
Active-probing-based network IDS for wireless networks
linux distro for anonymized penetration based on Kali and TAILS
A Linux kernel module for logging keystrokes
Modules for remote attestation.
Monitor of the available entropy stored within the Linux kernel
Lock file/folder on NTFS to prevent file/folder from misdeleting
pure pentesting distribution
Linux Kernel Module to Encrypt & Decrypt Files
TPM Device Driver for Linux