Search the DistroWatch database for distributions using a particular package. If you are looking for a distribution with the latest kernel, select "linux" from the drop-down box below and type the version number into the text box next to it. Please note that the best way to obtain the GNOME version is by searching for "nautilus", while KDE is represented by the "kdelibs" package. Apache 2.x is listed as "httpd". As for versioning, try to be as close to official version numbers as possible: as an example, for libgnome you should type 2.8.0 (not 2.8) and for kdelibs 4.7.4 (not 4.7). Have fun and let us know how we can improve the search engine!
|Search by Distribution Criteria (Simple Search Form)
This section allows you to search for a particular distribution based on certain criteria. Just select the criteria from the drop-down and check boxes below and hit the refresh button to get a list of known distributions that match your choice.
The following distributions match your criteria (sorted by popularity):
1. Kali Linux (13)
Kali Linux (formerly known as BackTrack) is a Debian-based distribution with a collection of security and forensics tools. It features timely security updates, support for the ARM architecture, a choice of four popular desktop environments, and seamless upgrades to newer versions.
2. Tails (25)
The Amnesic Incognito Live System (Tails) is a Debian-based live CD/USB with the goal of providing complete Internet anonymity for the user. The product ships with several Internet applications, including web browser, IRC client, mail client and instant messenger, all pre-configured with security in mind and with all traffic anonymised. To achieve this, Incognito uses the Tor network to make Internet traffic very hard to trace.
3. Alpine Linux (63)
Alpine Linux is a community developed operating system designed for x86 routers, firewalls, VPNs, VoIP boxes and servers. It was designed with security in mind; it has proactive security features like PaX and SSP that prevent security holes in the software to be exploited. The C library used is musl and the base tools are all in BusyBox. Those are normally found in embedded systems and are smaller than the tools found in GNU/Linux systems.
4. ClearOS (65)
ClearOS Enterprise is a server, network, and gateway platform designed for small businesses and distributed enterprise environments. ClearOS Enterprise is based upon ClearOS Core which is a rebuild of Red Hat Enterprise Linux. The distribution is flexible and includes an extensive list of features and integrated services which can be configured through a web-based interface. Some of the tools found in ClearOS Enterprise include anti-virus, anti-spam, VPN, content filtering, bandwidth manager, file services, SMTP services, print services, SSL certification, and web services. ClearOS includes a marketplace which simplifies the installation of software including 3rd party modules. The distribution is provided as a free download, inclusive of basic OS updates with free registration.
5. OpenBSD (78)
The OpenBSD project produces a FREE, multi-platform 4.4BSD-based UNIX-like operating system. Our efforts emphasize portability, standardization, correctness, proactive security and integrated cryptography. OpenBSD supports binary emulation of most programs from SVR4 (Solaris), FreeBSD, Linux, BSD/OS, SunOS and HP-UX. OpenBSD is freely available from our FTP sites, and also available in an inexpensive 3-CD set.
6. BackBox Linux (84)
BackBox Linux is an Ubuntu-based distribution developed to perform penetration tests and security assessments. It is designed to be fast and easy to use. It provides a minimal yet complete desktop environment, thanks to its own software repositories, which are always updated to the latest stable versions of the most often used and best-known ethical hacking tools.
7. Zentyal (90)
Zentyal (formerly eBox Platform) is a unified network server that offers easy and efficient computer network administration for small and medium-size businesses. It can act as a gateway, an infrastructure manager, a unified threat manager, an office server, a unified communication server or a combination of them. These functionalities are tightly integrated, automating most tasks, avoiding mistakes and saving time for system administrators. Zentyal is released under the GNU General Public License (GPL) and runs on top of Ubuntu.
8. Wifislax (99)
Wifislax is a Slackware-based live CD containing a variety of security and forensics tools. The distribution's main claim to fame is the integration of various unofficial network drivers into the Linux kernel, thus providing out-of-the-box support for a large number of wired and wireless network cards.
9. Lightweight Portable Security (112)
Lightweight Portable Security (LPS) is a Linux-based live CD with a goal of allowing users to work on a computer without the risk of exposing their credentials and private data to malware, key loggers and other Internet-era ills. It includes a minimal set of applications and utilities, such as the Firefox web browser or an encryption wizard for encrypting and decrypting personal files. The live CD is a product produced by the United States of America's Department of Defence and is part of that organization's Software Protection Initiative.
10. Qubes OS (117)
Qubes OS is a security-oriented, Fedora-based desktop Linux distribution whose main concept is "security by isolation" by using domains implemented as lightweight Xen virtual machines. It attempts to combine two contradictory goals: how to make the isolation between domains as strong as possible, mainly due to clever architecture that minimises the amount of trusted code, and how to make this isolation as seamless and easy as possible.
11. Liberté Linux (186)
Liberté Linux is a secure, reliable, lightweight and easy-to-use Gentoo-based live medium with the primary purpose of enabling anyone to communicate safely and covertly in hostile environments.
12. REMnux (202)
13. Pentoo (207)
Pentoo is a Gentoo-based Linux live CD with a selection of applications and tools designed to perform penetration testing.
14. MirOS BSD (208)
MirOS is an operating system based on OpenBSD and synchronised with the ongoing development of its parent. The most important differences between OpenBSD and MirOS include a completely rewritten bootloader and boot manager, a slim base system without NIS, Kerberos, BIND and i18n, binary security updates for stable releases, and current versions of the GNU developer toolchain.
15. Network Security Toolkit (241)
Network Security Toolkit (NST) is a bootable live CD based on Fedora Core. The toolkit was designed to provide easy access to best-of-breed open source network security applications and should run on most x86 platforms. The main intent of developing this toolkit was to provide the network security administrator with a comprehensive set of open source network security tools. What we find rather fascinating with NST is that we can transform most x86 systems (Pentium II and above) into a system designed for network traffic analysis, intrusion detection, network packet generation, wireless network monitoring, a virtual system service server, or a sophisticated network/host scanner.
16. BlackArch Linux (251)
BlackArch Linux is an Arch Linux-based distribution designed for penetration testers and security researchers. It is supplied as a live DVD image that comes with several lightweight window managers, including Fluxbox, Openbox, Awesome and spectrwm. It ships with over a thousand specialist tools for penetration testing and forensic analysis.
17. NetSecL OS (255)
NetSecL is a security-focused distribution and live DVD based on openSUSE (starting from version 3.0, previous versions were based on Slackware Linux). To improve the security aspect of the distribution, servers have been removed, incoming ports closed and services turned off. Additionally, several penetration tools have been included.
18. Openwall GNU/*/Linux (266)
Openwall GNU/*/Linux (or Owl for short) is a small security-enhanced Linux distribution for servers, appliances, and virtual appliances. Owl live CDs with remote SSH access are also good for recovering or installing systems (whether with Owl or not). Another secondary use is for operating systems and/or computer security courses, which benefit from the simple structure of Owl and from the inclusion of the complete build environment.
|Search by Distribution Criteria (Advanced Search Form)
The advanced search form allows you to fine tune your search criteria by including multiple items in your search. Once completed, it will also allow you to display the result either as a list of all matching distributions with their descriptions, or in a sorted tabular format.