Top 15 Dracos Linux Alternative and Similar Softwares | Dec 2024

Dracos Linux is purposed as an educational, especially to recognize the operation system of Linux and we respect ethical hacking.

1. ninux

ninux Ninux is an Italian wireless network community with the goal of creating and expanding a free, open and experimental computer network. It uses the OLSR (Optimized Link State Routing) Protocol, an IP routing protocol optimized for mobile ad hoc networks.......

2. Pyrit

Pyrit Pyrit allows to create massive databases, pre-computing part of the IEEE 802.11 WPA/WPA2-PSK authentication phase in a space-time-tradeoff. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock, it is currently by far the most powerful attack against one of the world’s most......

3. Kon-Boot

Kon-Boot Kon-Boot is an prototype piece of software which allows to change contents of a linux kernel (and now Windows kernel also!!!) on the fly (while booting). In the current compilation state it allows to log into a linux system as 'root' user without typing the correct password or to elevate......

4. EssayTyper

EssayTyper EssayTyper types your essay in minutes! Just enter a topic, click the pencil icon and start typing, the app automatically pulls content and adds it as you type.......

5. Growth-Hackers.club

Growth-Hackers.club The Global Growth Hackers club invites global Growth Hackers to exchange Information thru Blogs, Vlogs, Best Practices with likewise Growth Hackers. You can share any content on the Platform and share it to any Social Platform. The Platform is about Social Collaboration.Submit & Join the ConversationThe first interactive and scalable......

6. Armitage

Armitage Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don't use Metasploit every day. If you want to learn Metasploit......

7. BlackBuntu

BlackBuntu Blackbuntu is distribution for penetration testing which was specially designed for security training students and practitioners of information security.Blackbuntu is Ubuntu base distro for Penetration Testing with GNOME Desktop Environment. It's currently being built using the Ubuntu 10.10.......

8. btscanner

btscanner btscanner is a tool designed specifically to extract as much information as possible from a Bluetooth device without the requirement to pair. A detailed information screen extracts HCI and SDP information, and maintains an open connection to monitor the RSSI and link quality. btscanner is based on the BlueZ Bluetooth......

9. LiveDump

LiveDump LiveDump is a simple memory dumper which will either dump a region of memory once to a file or constantly dump it every X many milliseconds.......

10. GEEKtyper

GEEKtyper "Hack" like a programmer in movies and games! GeekTyper was inspired by the various media where hacking is usually portrayed incorrectly. Simply randomly mash your keyboard and code will display on your screen. Press TAB to display hotkeys that activate various effects......

11. BeEF

BeEF BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser.......

12. Core Impact Pro

Core Impact Pro Core Impact Pro is the most comprehensive software solution assessing and testing security vulnerabilities throughout your organization. Core Impact Pro tests across a broad spectrum of risk areas including: - endpoint systems - passwords & identities- mobile devices- wireless networks- web applications & web services- network systems......

13. Grabber Web Application Scanner

Grabber Web Application Scanner Grabber is a web application scanner. Basically it detects some kind of vulnerabilities in your website.Grabber is simple, not fast, but portable and really adaptable. This software is designed to scan small websites such as personal sites, forums etc. It is a very small application: it would take too much......

14. Social-Engineer Toolkit

Social-Engineer Toolkit The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration......

15. recALL

recALL recALL is free and portable multifunctional password recovery and auditing solution for Windows - instantly finds and recovers passwords from more than 200 popular applications (FTP, E-mail clients, Instant Messengers, Browsers) and recovering licenses from over 2800 programs.......