Alternatives to Parrot OS

Compare Parrot OS alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Parrot OS in 2024. Compare features, ratings, user reviews, pricing, and more from Parrot OS competitors and alternatives in order to make an informed decision for your business.

  • 1
    GlitchSecure

    GlitchSecure

    GlitchSecure

    Continuous Security Testing for SaaS Companies - Built by Hackers Automatically assess your security posture with continuous vulnerability assessments and on-demand pentests. Hackers don't stop testing, and neither should you. We use a hybrid approach that combines testing methodologies built by expert hackers, a real-time reporting dashboard, and continuous delivery of high-quality results. We improve the traditional pentesting lifecycle by continually providing expert advice, remediation verification, and automated security testing throughout the entire year. Our dedicated team of experts works with you to properly scope and review your applications, APIs, and networks to ensure in-depth testing coverage all year. Let us help you sleep better at night.
    Compare vs. Parrot OS View Software
    Visit Website
  • 2
    Magnet AXIOM Cyber

    Magnet AXIOM Cyber

    Magnet Forensics

    Enterprise organizations large and small use Magnet Forensics’ solutions to close cases quickly with powerful analytics that surface intelligence & insights while also being able to leverage automation and the cloud to reduce downtime and enable remote collaboration at scale. Some of the world’s largest corporations use Magnet Forensics to investigate IP theft, fraud, employee misconduct and incident response cases such as ransomware, business email compromise and phishing attacks. The benefits of hosting your applications in the cloud ranges from cost savings to more centralized operations. Deploy AXIOM Cyber in Azure or AWS to leverage the benefits of cloud computing plus the ability to perform off-network remote collections of Mac, Windows and Linux endpoints.
  • 3
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 4
    Ubuntu

    Ubuntu

    Ubuntu

    Better security. More packages. Newer tools. All your open source, from cloud to edge. Secure your open source apps. Patch the full stack, from kernel to library and applications, for CVE compliance. Governments and auditors certify Ubuntu for FedRAMP, FISMA and HITECH. Rethink what’s possible with Linux and open source. Companies engage Canonical to drive down open source operating costs. Automate everything: multi-cloud operations, bare metal provisioning, edge clusters and IoT. Whether you’re a mobile app developer, an engineering manager, a music or video editor or a financial analyst with large-scale models to run — in fact, anyone in need of a powerful machine for your work — Ubuntu is the ideal platform. Ubuntu is used by thousands of development teams around the world because of its versatility, reliability, constantly updated features, and extensive developer libraries.
  • 5
    Kali Linux
    Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. You can take any Linux and install pentesting tools on it, but you have to set the tools up manually and configure them. Kali is optimized to reduce the amount of work, so a professional can just sit down and go. A version of Kali is always close to you, no matter where you need it. Mobile devices, Docker, ARM, Amazon Web Services, Windows Subsystem for Linux, Virtual Machine, bare metal, and others are all available. With the use of metapackages, optimized for the specific tasks of a security professional, and a highly accessible and well documented ISO customization process, it's always easy to generate an optimized version of Kali for your specific needs. Whether you are a seasoned veteran or a novice, our documentation will have all the information you will need to know.
  • 6
    Tails

    Tails

    Tails

    Tails is a portable operating system that protects against surveillance and censorship. Tails uses the Tor network to protect your privacy online and help you avoid censorship. Enjoy the Internet like it should be. Shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. Tails leaves no trace on the computer when shut down. Tails includes a selection of applications to work on sensitive documents and communicate securely. Everything in Tails is ready-to-use and has safe defaults. You can download Tails for free and independent security researchers can verify our work. Tails is based on Debian GNU/Linux. Activists use Tails to hide their identities, avoid censorship, and communicate securely. Journalists and their sources use Tails to publish sensitive information and access the Internet from unsafe places. Domestic violence survivors use Tails to escape surveillance at home.
  • 7
    Belkasoft X

    Belkasoft X

    Belkasoft

    Belkasoft X Forensic (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile, drone, car, and cloud forensics. It can help you to acquire and analyze a wide range of mobile and computer devices, run various analytical tasks, perform case-wide searches, bookmark artifacts, and create reports. Belkasoft X Forensic acquires, examines, analyzes, and presents digital evidence from major sources—computers, mobile devices, RAM, cars, drones, and cloud services—in a forensically sound manner. If you need to share the case details with your colleagues, use a free-of-charge portable Evidence Reader. Belkasoft X Forensic works out of the box and can be easily integrated into customer workflows. The software interface is so user-friendly that you can start working with your cases right after the Belkasoft X Forensic deployment.
    Starting Price: $1500
  • 8
    CyFIR Investigator
    CyFIR digital security and forensic analysis solutions provide unparalleled endpoint visibility, scalability, and speed to resolution. Cyber resilient organizations suffer little to no damage in the event of a breach. CyFIR cyber risk solutions identify, analyze, and resolve active or potential threats 31x faster than traditional EDR tools. We live in a post-breach world where data breaches are more frequent and more aggressive in their capacity to do harm. Attack surfaces are expanding beyond the walls of an organization to encompass thousands of connected devices and computer endpoints located throughout remote facilities, cloud and SaaS providers, controlled foreign assets, and other locations.
  • 9
    EnCase Forensic
    The Gold Standard in Forensic Investigations – including Mobile Acquisition. Improve investigation efficiency with the release of optical character recognition (OCR) support that seamlessly extracts embedded text from scanned images, documents and PDFs as part of the evidence collection workflow. 21.2 also expands social media artifact support and includes an enhanced workflow with a new summary view that allows users to cross-reference disparate artifact types, significantly improving evidence processing workflows. OpenText Security (formerly Guidance Software) created the category for digital investigation software with EnCase Forensic in 1998. EnCase has maintained its reputation as the gold standard in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. No other solution offers the same level of functionality, flexibility, and has the track record of court-acceptance as EnCase Forensic.
  • 10
    Trellix Malware Analysis
    Malware analysis is an important part of preventing and detecting future cyber attacks. Using malware analysis tools, cyber security experts can analyze the attack lifecycle and glean important forensic details to enhance their threat intelligence. Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts. Inform future prevention strategies by providing deeper insight into attacker tools and tactics. Stop the spread of attacks using auto-generated local attack profiles, instantly shared across the Trellix ecosystem. Load suspicious files or file sets through a simple interface.
  • 11
    Mageia

    Mageia

    Mageia

    Mageia is a GNU/Linux-based, Free Software operating system. It is a community project, supported by a nonprofit organization of elected contributors. Beyond just delivering a secure, stable and sustainable operating system, the goal is also to become and maintain a credible and recognized community in the free software world. Mageia is a Free Software operating system of the GNU/Linux family, which can be installed on computers either as the main operating system, or as an alternative system to one or several pre-installed systems (dual boot). It is a community project supported by the non-profit Mageia.Org organization of elected contributors. Mageia is developed by and for its community of users, and is suitable for all kinds of users, from first-time GNU/Linux users to advanced developers or system administrators. The software packages that are included in Mageia sit in three different repositories/media, depending on the type of license applied to each package.
  • 12
    GrapheneOS

    GrapheneOS

    GrapheneOS

    GrapheneOS is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project. It's focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model. GrapheneOS is a privacy and security focused mobile OS with Android app compatibility developed as a non-profit open source project. It's focused on the research and development of privacy and security technology including substantial improvements to sandboxing, exploit mitigations and the permission model. GrapheneOS also develops various apps and services with a focus on privacy and security. Vanadium is a hardened variant of the Chromium browser and WebView specifically built for GrapheneOS. GrapheneOS also includes our minimal security-focused PDF Viewer, our hardware-based Auditor app / attestation service providing local and remote verification of devices.
  • 13
    X-Ways Forensics
    X-Ways Forensics is an advanced work environment for computer forensic examiners and our flagship product. Runs under Windows XP/2003/Vista/2008/7/8/8.1/2012/10/2016, 32 Bit/64 Bit, standard/PE/FE. (Windows FE is described here, here and here.) Compared to its competitors, X-Ways Forensics is more efficient to use after a while, by far not as resource-hungry, often runs much faster, finds deleted files and search hits that the competitors will miss, offers many features that the others lack, as a German product is potentially more trustworthy, comes at a fraction of the cost, does not have any ridiculous hardware requirements, does not depend on setting up a complex database, etc.! X-Ways Forensics is fully portable and runs off a USB stick on any given Windows system without installation if you want. Downloads and installs within seconds (just a few MB in size, not GB). X-Ways Forensics is based on the WinHex hex and disk editor and part of an efficient workflow model.
    Starting Price: $18,589
  • 14
    Salix

    Salix

    Salix

    Salix is a GNU/Linux distribution based on Slackware that is simple, fast and easy to use, with stability being a primary goal. Salix is also fully backwards compatible with Slackware, so Slackware users can benefit from Salix repositories, which they can use as an "extra" quality source of software for their favorite distribution. Like a bonsai, Salix is small, light & the product of infinite care. Everything that is included in the iso is installed. That includes a complete desktop environment and a complete selection of applications that matches the respective environment, always following the "one application per task" rationale. Only the minimum essentials for a console system to start are included. A graphical environment is not provided. This is ideal if you are an experienced user and want to customize your installation for any specific purpose, such as a web server, file server etc.
    Starting Price: Free
  • 15
    Falcon Forensics

    Falcon Forensics

    CrowdStrike

    Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident.
  • 16
    Belkasoft Remote Acquisition
    Belkasoft Remote Acquisition (Belkasoft R) is a new digital forensic and incident response tool developed specifically for remote extraction of hard and removable drives, RAM, connected mobile devices, and even specific types of data. Belkasoft R will be useful in cases when an incident response analyst or a digital forensic investigator needs to gather evidence quickly and the devices in question are situated in geographically distributed locations. With Belkasoft R, there is no longer need to interrupt an employees' daily routine or draw excessive attention to your investigation. Belkasoft R saves your time and money doing a forensically sound remote acquisitions: no more excessive costs and extra time for travels. No more geographical challenges and expensive trips. No need in having trained specialists in all locations of your organization’s offices.
  • 17
    4n6 Outlook Forensics Wizard
    4n6 Outlook Forensics Wizard is the most reliable, fast and easy-to-use software to open and analyze Outlook email data files. Forensics Investigator is this application developed specifically to collect evidence from Outlook data files. This advanced Outlook Forensics Software provides detailed preview of Outlook data files in various modes. You can easily use this software without facing any type of problem. The app also offers several premium benefits: 1. Allows to open, view, and analyze unlimited Outlook Data Files. 2. No need to install Outlook application to analyze email data. 3. Outlook Forensics Wizard is complete free from any type of risk. 4. Supports all the versions of Outlook including Outlook 2019. 5. Analyze Outlook email data in multiple modes to deeply analyze.
    Starting Price: $49
  • 18
    LLIMAGER

    LLIMAGER

    e-Forensics Inc

    LLIMAGER was designed to address the need for a low-cost, no-frills “live” forensic imaging solution for Mac computers, capable of capturing the entirety of a synthesized disk, including volume unallocated space, as macOS sees the disk with its partitions mounted. The application was developed to be user-friendly and easy enough for entry level digital forensics examiners. The application leverages built-in Mac utilities, providing a versatile solution compatible with a wide range of macOS versions, both past and present. This ensures that the tool remains functional across diverse system configurations and updates. FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical Support
    Starting Price: $425
  • 19
    AD Enterprise

    AD Enterprise

    AccessData

    Today’s digital forensics teams face many challenges in a world filled with an overwhelming amount of data. From multiple office locations, to massive employee pools and remote workers, AD Enterprise provides deep visibility into live data directly at the endpoint, helping you conduct faster, more targeted enterprise-wide post-breach, HR and compliance investigations in a single, robust solution. With AD Enterprise, you can respond quickly, remotely and covertly while maintaining chain of custody, and facilitate focused forensic investigations and post-breach analysis, without interruption to business operations. Preview live data at the endpoint, then filter on any attributes and choose to retrieve only the data that matters to your investigation, saving time and cost. Perform collections from endpoints in multiple locations by deploying our remote Enterprise Agent to a broad range of operating systems, including Windows, Mac, Linux and more.
  • 20
    Cognitech FiA 64
    FiA is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the evidence and detect possible traces of tampering or other types of inconsistencies. FiA is used to systematically detect forged/doctored file based digital image evidence is able to authenticate and uncover where tampering and modification has taken place in a doctored image. This solution allows the expert to prepare everything needed for official court ready reports and all results are based on a forensic scientific methodology. FiA is a proven solution based on years of research. More research is being conducted to further extend software authentication capabilities to video authentication. FiA was developed for Law Enforcement Agencies only. In addition it is not effective to purchase this technology without the associated comprehensive training course.
  • 21
    OSForensics

    OSForensics

    PassMark Software

    Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.
    Starting Price: $799 per user per year
  • 22
    Trellix Endpoint Forensics
    Apply state of the art, signatureless detection and protection against the most advanced threats, including zero-days. Combine heuristics, code analysis, statistical analysis, emulation, and machine learning in one advanced sandboxing solution. Enhance detection efficacy with frontline intelligence derived on the frontlines of the world’s biggest breaches. Gain high-fidelity alerts that trigger for when it matters most, saving time and resources. Enhance threat awareness with context created by Trellix's leading security practitioners. Improve analyst efficiency by reducing alert volume and fatigue. Choose from a complete set of deployment scenarios, including in-line and out of band, on-premise, hybrid, public and private cloud, and virtual offerings. Consolidate network security technology stack with a built-in Intrusion Prevention System (IPS) and Dynamic Threat Intelligence.
  • 23
    Gentoo

    Gentoo

    Gentoo Foundation

    Gentoo is a free operating system based on Linux that can be automatically optimized and customized for just about any application or need. Extreme configurability, performance, and a top-notch user and developer community are all hallmarks of the Gentoo experience. Thanks to a technology called Portage, Gentoo can become an ideal secure server, development workstation, professional desktop, gaming system, embedded solution, or something else, whatever you need it to be. Because of its near-unlimited adaptability, we call Gentoo a metadistribution. Of course, Gentoo is more than just software. It is also a community around the distribution. Gentoo benefits from around 250 developers and thousands of users, many of which are experts in their fields. The distribution project provides the means for the users to enjoy Gentoo: documentation, infrastructure, release engineering, software porting, quality assurance, security followup, hardening, and more.
  • 24
    Cognitech Video Investigator
    Part of the Tri-Suite64 software package, Video Investigator® 64 is designed to process video files and still images alike, including enhancing CCTV footage. There are a variety of methods that can be used in either scenario, which is what makes Video Investigator® 64 such a powerful video and image enhancement software package. No other software will offer the vast array of filters and features to enhance video and images like Video Investigator offers its users. Get everything other image enhancement software, video deblurring software, and video resolution enhancement software has all in one package and one software with even more features. Video Investigator is the best forensic video enhancement software available. To enhance CCTV footage it is important to be able to select and play the frame sequences that may or may not be connected on a time-line. The Movie Controller provides advanced video playback with audio support allowing the end-user to adjust which frames of video.
  • 25
    Amazon Linux 2
    Run all your cloud and enterprise applications in a security-focused and high-performance Linux environment. Amazon Linux 2 is a Linux operating system from Amazon Web Services (AWS). It provides a security-focused, stable, and high-performance execution environment to develop and run cloud applications. Amazon Linux 2 is provided at no additional charge. AWS provides ongoing security and maintenance updates for Amazon Linux 2. Amazon Linux 2 includes support for the latest Amazon EC2 instance capabilities and is tuned for enhanced performance. It includes packages that help ease integration with other AWS Services. Amazon Linux 2 offers long-term support. Developers, IT administrators, and ISVs get the predictability and stability of a Long Term Support (LTS) release, but without compromising access to the latest versions of popular software packages.
  • 26
    Sargent LinUX

    Sargent LinUX

    HackSolution

    Sargent LinUX is a Wireless security auditing and attack Pentest operating system based on Debian. The OS is able to crack and recover WEP/WPA/WPS keys and also run other network based attacks on wireless or ethernet based networks.
  • 27
    Mbed OS
    Arm Mbed OS is a free, open-source IoT operating system that includes all the necessary features to develop IoT products. The OS includes everything you need to develop smart, connected products on Arm Cortex-M based hardware, including machine learning capabilities, security, connectivity stacks, an RTOS kernel and drivers for sensors and I/O devices. Arm Mbed OS is designed for the Internet of Things. It is integrated with connectivity, machine learning, networking, and security stacks and is supported with software libraries, development hardware, tutorials and examples. From hardware to the cloud, Mbed OS supports more than 70 silicon, module, cloud, and OEM partners, optimizing your developer choice. By using the Mbed OS API, your application code can remain clean, portable, and simple, while taking advantage of security, communications and machine learning. The integrated solution reduces development cost, time, and risk.
  • 28
    SparkyLinux

    SparkyLinux

    SparkyLinux

    SparkyLinux is a GNU/Linux distribution created on the top of Debian GNU/Linux operating system. Sparky is fast, lightweight and fully customizable OS which offers a few versions for different users and different tasks, such as fully featured OS with a lightweight desktop environment, which works out of the box and contain a selection of pre installed common use software for home users. MinimalGUI with Openbox window manager preinstalled only with basic software installed for users whose want to configure their OS/desktop as they want, on the top of Debian, plus any desktop environment or window manager they like. MinimalCLI with no X server, for advanced users whose want to build and configure their desktops in own way. Sparky supports about 20 desktop environments and window managers giving you freedom of choice, having in mind that your computer is made for working, having fun, entertainment, keeping in touch with friends, and many, many other things.
  • 29
    PureOS

    PureOS

    PureOS

    A user friendly, secure and freedom respecting OS for your daily usage. With PureOS, you are the only one in control of your digital life. We've created a new, more stable version of PureOS, with the same great privacy protecting features and software but with a more solid foundation. Greater stability through following a stable upstream. New security and update software channels. New tooling for managing older versions of TPM chips. Changes to make the Librem Key work out of the box. Lots of bug fixes and the healing of paper cuts. Whether you are a technology enthusiast, someone looking to protect the digital life of your family, or an enterprise IT/security department, you can use PureOS freely for any purpose, study and share its source code, and adapt it to your needs. PureOS is a fully auditable operating system, you don’t have to trust our word that it respects and protects you, it is independently verifiable by security experts and software developers around the world.
  • 30
    NetBSD

    NetBSD

    NetBSD

    NetBSD is a free, fast, secure, and highly portable Unix-like Open Source operating system. It is available for a wide range of platforms, from large-scale servers and powerful desktop systems to handheld and embedded devices. NetBSD was originally released in 1993. Over time, its code has found its way into many surprising environments, on the basis of a long history of quality, cleanliness, and stability. The NetBSD code was originally derived from 4.4BSD Lite2 from the University of California, Berkeley. NetBSD is an entirely free and open-source UNIX-like operating system developed by an international community. It isn't a "distribution" or variant but has evolved over several decades to be a complete and unique operating system in the BSD family. NetBSD users enjoy a simple, well-documented, and fully integrated UNIX-like system that feels minimal, and in many ways traditional, while including many modern and interesting features, and support for recent hardware.
    Starting Price: Free
  • 31
    Slackware

    Slackware

    Slackware Linux

    After a long development cycle (including many betas and release candidates to get everything just exactly perfect) we're pleased to announce the availability of the new stable release. You'll find updates throughout the system, with the latest development tools and recent versions of applications, window managers, desktop environments, and utilities. The Linux kernel is updated to version 4.4.14 (part of the 4.4.x kernel series that will be getting long-term support from the kernel developers). We've brought together the best of these and other modern components and worked our magic on them. If you've used Slackware before, you'll find the system feels like home. Want to give Slackware 14.2 a test drive without modifying your disk drive? Then check out Slackware Live Edition! This is a complete Slackware installation that can run from a CD, DVD, or USB stick. Build scripts for all kinds of additional software for Slackware 14.2 are also available.
  • 32
    DragonFly BSD

    DragonFly BSD

    DragonFly BSD

    DragonFly version 6.2.2 is released. The 6.2 series has hardware support for type-2 hypervisors with NVMM, an amdgpu driver, the experimental ability to remote-mount HAMMER2 volumes, and many other changes. DragonFly belongs to the same class of operating systems as other BSD-derived systems and Linux. It is based on the same UNIX ideals and APIs and shares ancestor code with other BSD operating systems. DragonFly provides an opportunity for the BSD base to grow in an entirely different direction from the one taken in the FreeBSD, NetBSD, and OpenBSD series. DragonFly includes many useful features that differentiate it from other operating systems in the same class. The most prominent one is HAMMER, our modern high-performance filesystem with built-in mirroring and historic access functionality. Virtual kernels provide the ability to run a full-blown kernel as a user process for the purpose of managing resources or for accelerated kernel development and debugging.
    Starting Price: Free
  • 33
    Neptune OS

    Neptune OS

    Neptune

    Neptune is a GNU/Linux Distribution for desktops based fully upon Debian Stable ('Buster'), except for a newer kernel and some drivers. It ships with a modern KDE Plasma Desktop with its main view on a good looking multimedia system which allows for getting work done. It also is a system which is flexible and very useful on usb sticks. Therefore we developed easy to use applications like USB Installer as well as a Persistent Creator that allows you to store changes to your system on your live usb stick. The Debian repository is the major base for getting updates and new software. Furthermore Neptune ships with its own software repository to update our own applications. Neptune tries to get the BeOS message of a fully supported multimedia OS to a next generation of users. Neptunes focuses on providing an elegant out of the box experience for the users. Therefore we ship a nice and simple overall look and feel as well as a whole bunch of multimedia tools, like codecs, flash player, etc.
  • 34
    Arch Linux

    Arch Linux

    Arch Linux

    Arch Linux is an independently developed, x86-64 general-purpose GNU/Linux distribution that strives to provide the latest stable versions of most software by following a rolling-release model. The default installation is a minimal base system, configured by the user to only add what is purposely required. Arch Linux defines simplicity as without unnecessary additions or modifications. It ships software as released by the original developers (upstream) with minimal distribution-specific (downstream) changes, patches not accepted by upstream are avoided, and Arch's downstream patches consist almost entirely of backported bug fixes that are obsoleted by the project's next release. Arch ships the configuration files provided by upstream with changes limited to distribution-specific issues like adjusting the system file paths. It does not add automation features such as enabling a service simply because the package was installed.
  • 35
    Puppy Linux

    Puppy Linux

    Puppy Linux

    Puppy Linux is a unique family of Linux distributions meant for the home-user computers. Ready to use, all tools for common daily computing usage already included. Ease of use, grandpa-friendly certified. Relatively small size, 300 MB or less. Fast and versatile. Customizable within minutes, remasters. Different flavours, optimized to support older computers, newer computers. Variety, hundreds of derivatives (“puplets”), one of which will surely meet your needs. Puppy Linux is not a single Linux distribution like Debian. Puppy Linux is also not a Linux distribution with multiple flavours, like Ubuntu (with its variants of Ubuntu, Kubuntu, Xubuntu, etc) though it also comes in flavours. Puppy Linux is a collection of multiple Linux distributions, built on the same shared principles, built using the same set of tools, built on top of a unique set of puppy specific applications and configurations and generally speaking provide consistent behaviours and features.
  • 36
    eLxr

    eLxr

    eLxr

    Enterprise-Grade Linux for Edge-to-Cloud Deployments. Open-Source Collaborative Project, Debian-based Linux distribution tailored for edge to cloud use cases. Ensure consistent performance and stability, whether on device, on-prem, or in the cloud. eLxr provides a secure and stable distribution, with its foundation in opensource community innovation with predictable release and update cadence, fit for long lifecycles and long-term deployments. Cater to applications with stringent timing requirements, using preempt-rt kernel configurations to prioritize low-latency responses, ensuring that tasks are executed within precise time boundaries. Achieve better determinism and predictability compared to a standard Linux kernel. eLxr relies on a smaller footprint for better performance, optimized workloads, and smaller attack surface for resource usage efficiency. It provides all required features and attributes, considering best usage of system resources.
    Starting Price: Free
  • 37
    Pica8 PICOS
    The one-of-a-kind PICOS open NOS with tightly coupled control planes gives network operators surgical, non-disruptive control of their enterprise applications, deep and dynamic traffic monitoring, and even attack mitigation, all in real time. There’s no better way to implement zero-trust networking and software-defined perimeters than PICOS. Our flagship open network operating system installs on 1G- to 100G-interface open switches from a broad array of Tier 1 manufacturers. This fully featured license offers the most comprehensive support for enterprise features on the market. It includes the Debian Linux distribution, with an unmodified kernel for maximum DevOps programmability. Enterprise Edition also includes AmpCon, an Ansible-based automation framework that couples Zero-Touch Provisioning (ZTP) with the Open Network Install Environment (ONIE) to simplify installation and operation of open network switches across the enterprise.
  • 38
    Slax

    Slax

    Slax

    Slax is a modern, portable, small and fast Linux operating system with modular approach and outstanding design. It runs directly from your USB flash drive without installing, so you can carry it everywhere you go in your pocket. Despite its small size, Slax provides nice graphical user interface and wise selection of pre-installed programs, such as a Web browser, Terminal, and more. Slax is now based on Debian, which gives you the ability to benefit from its entire ecosystem. Tens of thousands of prebuilt packages with applications, all within reach thanks to apt command. Major milestones for next Slax versions are tracked and funded through Patreon website and you can accelerate their development with a financial contribution. I am updating Slax regularly on my own to keep it up to date, but some features requested by users are implemented only after they are backed by sufficient amount of patrons.
    Starting Price: $29.95 one-time payment
  • 39
    Altima Linux
    Open Source Operating system tweaked and customised the way we like it with a selection of the best open source software applications. A worthy replacement for Windows and MacOS. Based on rock solid Debian Linux. This is a desktop computing environment with all of the free software required for general computing work. Other specialist applications are provided as installation guides. Downloads for free and install on many old computers and bring them back to life. What you thought was an antiquated machine most likely is just suffering from bloat. Major applications included are Libre Office, PhotoShack, InkScape, Sublime Text, QEMU, Nginx, Audacity, VLC Media Player, Epiphany, Remmina. Suggested additional free downloads; VirtualBox. WINE. The best part of Altima Linux is the clever combination of Windows and Mac look and feel so that users, new and experienced will enjoy a clean easy to follow and learn desktop environment. We hope that you enjoy testing and using Altima Linux.
  • 40
    CopperheadOS

    CopperheadOS

    Copperhead

    CopperheadOS is a Secure Android built for encrypted and secure phones by a privacy focused company. Available as security-centric and privacy focused Google-free Android for the latest Pixel devices. Develop or include a secure phone in your businesses mobile security program. CopperheadOS integrates with the latest and greatest mobile security solutions. Mobile devices are easy targets for hackers so we developed the most secure android, CopperheadOS, to protect against a variety of attack vectors. Copperhead's technical documentation is available for review. Security-centric, non- technical user experience. No Google or any tracking analytics. Sandboxing and application isolation. Integrates with the latest mobile device management and intrusion detection system mobility software.
  • 41
    SONiC

    SONiC

    NVIDIA Networking

    NVIDIA offers pure SONiC, a community-developed, open-source, Linux-based network operating system that has been hardened in the data centers of some of the largest cloud service providers. Pure SONiC through NVIDIA removes distribution limitations and lets enterprises take full advantage of the benefits of open networking—as well as the NVIDIA expertise, experience, training, documentation, professional services, and support that best guarantee success. NVIDIA provides support for Free Range Routing (FRR), SONiC, Switch Abstraction Interface (SAI), systems, and application-specific integrated circuits (ASIC)—all in one place. Unlike a distribution, SONiC doesn’t require reliance upon a single vendor for roadmap additions, bug fixes, or security patches. With SONiC, you can achieve unified management with existing management tools across the data center.
  • 42
    openSUSE Leap
    A brand new way of building openSUSE and a new type of a hybrid Linux distribution. Leap uses source from SUSE Linux Enterprise (SLE), which gives Leap a level of stability unmatched by other Linux distributions, and combines that with community developments to give users, developers and sysadmins the best stable Linux experience available. If you’re already running openSUSE you can upgrade by booting from the DVD/USB and choosing upgrade, or carry out an ‘Online Upgrade’ in a few commands. Leap is a classic stable distribution approach, one release each year and in between security and bugfixes. This makes Leap very attractive as server operating system, but as well for Desktops since it requires little maintenance effort. openSUSE Leap is compatible with SUSE Linux Enterprise; this gives Leap a level of stability unmatched by other Linux distributions and provides users the ability to migrate to an enterprise offering.
  • 43
    Guix

    Guix

    Guix

    Guix is an advanced distribution of the GNU operating system developed by the GNU Project—which respects the freedom of computer users. Guix supports transactional upgrades and roll-backs, unprivileged package management, and more. When used as a standalone distribution, Guix supports declarative system configuration for transparent and reproducible operating systems. It provides Guile Scheme APIs, including high-level embedded domain-specific languages (EDSLs) to define packages and whole-system configurations. Guix comes with thousands of packages which include applications, system tools, documentation, fonts, and other digital goods readily available for installing with the GNU Guix package manager.
    Starting Price: Free
  • 44
    openSUSE Tumbleweed

    openSUSE Tumbleweed

    openSUSE Project

    You install it once and enjoy it forever. No longer do you have to worry every six months about massive system upgrades that risk bricking your system. You get frequent updates that not only address vulnerabilities or squash bugs, but reflect latest features and developments, such as fresh kernels, fresh drivers and recent desktop environment versions. Updates are thoroughly tested against industry-grade quality standards, taking advantage of a build service other Linux distributions envy us. Not only is each new version of a package individually tested, but different clusters of versions are are tested against each other, making sure your system is internally consistent. With a single command you can update thousands of packages, rollback to last week’s snapshot, fast-forward again, and even preview upcoming releases.
  • 45
    SUSE Linux Enterprise Desktop
    Designed for mixed environments and includes a complete suite of required business applications to support employees’ productivity. SLE Desktop shares the core of SUSE Linux Enterprise Server and is equipped with enhanced security providing unparalleled protection of valuable enterprise data. A flexible and highly secure desktop operating system suitable for environments where reliability, ease of maintenance and updates are key. Includes dozens of leading applications, including web browser, email client, collaboration tools – all required to enable employees’ productivity. Security features, such as application security system, integrated VPN and antivirus tools, deliver bullet-proof security and protection against virus and malware attacks. Comes with enterprise-grade support and maintenance services from SUSE. Provides users a high degree of customization to meet their business requirements.
  • 46
    Windows Vista

    Windows Vista

    Microsoft

    Windows Vista is a major release of the Windows NT operating system developed by Microsoft as the direct successor to Windows XP. It was released to manufacturing on November 8, 2006, and was generally available for retail sale on January 30, 2007. Vista was an incremental update to Windows XP, introducing new features and graphical user interface changes, as well as updated security features. One of the most significant changes in Vista was the introduction of a new graphical user interface (GUI) called Aero. Aero uses a transparent glass-like effect for windows and dialog boxes, and also includes new animations and visual effects. Vista also introduced a new security model that uses User Account Control (UAC) to help protect users from malware and other security threats. Vista was initially met with mixed reviews, with some critics praising the new features and security improvements, while others criticized the performance and compatibility issues.
  • 47
    SalvationDATA

    SalvationDATA

    SalvationDATA Technology

    Digital Forensic Lab Solution from SalvationDATA is the most advanced Lab Solution for numerous industries including Law-Enforcement, IT & Finance Enterprises, and other companies that need Intelligent Work Cooperation. Specifically, with the advanced supporting software like Video Forensics, Mobile Forensics, Data Recovery and Database Forensics, and advanced solid hardware equipment like Intelligent Data Center and Intelligent Forensic Workstation, it’s been applied world-wide among Digital Forensics, eDiscovery, DFIR for law enforcement and intelligence organizations. With the assistance of professional and advanced digital forensic lab solutions, your organization’s circumstances get upgraded effectively and efficiently.
  • 48
    Cyber Triage

    Cyber Triage

    Sleuth Kit Labs

    Fast & Affordable Forensics for Incident Response. Automated incident response software for fast, comprehensive, and easy intrusion investigations. An alert is generated from IDS or SIEM. An endpoint investigation is started from SOAR manually. Cyber Triage is deployed to the endpoint to collect data. Analyst uses Cyber Triage data to find evidence and make decisions. Manual incident response is slow, leaving the entire organization at the intruder’s mercy. By automating every phase of the endpoint forensics process, Cyber Triage ensures state-of-the-art remediation speed. Cyber threats are constantly evolving, and manual incident response can be inconsistent and incomplete. Always operating on the latest threat intelligence, Cyber Triage scours every relevant corner of a compromised endpoint. Forensic tools are often confusing, with features not needed for intrusions. Cyber Triage’s intuitive interface allows even junior staff to analyze data and assemble reports.
    Starting Price: $2,500
  • 49
    Binalyze AIR
    Binalyze AIR is a market-leading Digital Forensics and Incident Response platform that allows enterprise and MSSP security operations teams to collect full forensic evidence at speed and scale. Our incident response investigation capabilities such as triage, timeline and remote shell help to close down DFIR investigations in record time.
  • 50
    Fedora CoreOS

    Fedora CoreOS

    Fedora Project

    Fedora CoreOS is an automatically-updating, minimal operating system for running containerized workloads securely and at scale. It is currently available on multiple platforms, with more coming soon. There are three Fedora CoreOS (FCOS) update streams available: stable, testing, and next. In general, you will want to use stable, but it is recommended to run some machines on testing and next as well and provide feedback. For automating Fedora CoreOS installations, it is expected that you will interact with stream metadata. While Fedora CoreOS does automatic in-place updates, it is generally a good practice to start provisioning new machines from the latest images. Fedora CoreOS does not have a separate install disk. Instead, every instance starts from a generic disk image which is customized on first boot via Ignition. Everything included is open source and free software, not only is it available at no cost to you, but you can share, remix, and modify.