Paul Blankenbaker Ronald W. Henderson

Network Security Toolkit (NST) is a bootable ISO image (Live DVD) based on Fedora 20 providing easy access to best-of-breed Open Source Network Security Applications and should run on most x86/x86_64 platforms.

The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of Open Source Network Security Tools. The majority of tools published in the article: Top 125 Security Tools by INSECURE.ORG are available in the toolkit. An advanced Web User Interface (WUI) is provided for system/network administration, navigation, automation, geolocation and configuration of many network and security applications found within the NST distribution. In the virtual world, NST can be used as a network security analysis, validation and monitoring tool on enterprise virtual servers hosting virtual machines.

To access the full NST Wiki, go to: http://wiki.networksecuritytoolkit.org/.

Screenshot thumbnail
1 - NST Network Interface Bandwidth Monitor
Screenshot thumbnail
2 - NST Geolocated Active Neflow Connections
Screenshot thumbnail
3 - NST GNOME Desktop Running Etherape
Screenshot thumbnail
Geolocated traceroute data shown in Google Earth
Screenshot thumbnail
Systems found by ARP scan ready for further investigation
Screenshot thumbnail
WIFI locations geolocated by Kismet shown in Google Earth

Project Admins:


  • IlyaK

    IlyaK - 2014-07-28


    I believe you need to add information to your Wiki about installing NST on USB stick on Windows.

    First of all you need some tool like http://www.linuxliveusb.com/en/features
    But the funniest part here is that Windows formats flash drive to Fat32 FS (only Fat32 and NTFS are supported on Windows out of box for USB drives).
    Fat32 is case insensitive and it has limit to volume label. So, instead of "nst-20-5663.i686" your drive is marked "NST-20-5663".

    And when you boot, darcut tries to mount /dev/disk/by-label/nst-20-5663.i686 and it fails.
    So, you need to hit "tab" on boot screen and pass root=NST-20-5663 kernel argument.

    While it is pretty clear, I've spent some time on it, so you probably need to document that.


Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

No, thanks