From Rexploit

Note

We published our Auditor security collection completely free under the GPL 2.0 license. Our development costs us money and effort too. If you like to support our project, please donate some US$ using the donate button on the left sideb. Thnx to all the people which allready sent us some donations. It is not very much what we have received until now, when i compare it against our hosting and development effort, so please continue to support us. The best projects are about to die without the required support from its users.


About

The Auditor security collection is a Live-System based on KNOPPIX. With no installation whatsoever, the analysis platform is started directly from the CD-Rom and is fully accessible within minutes. Independent of the hardware in use, the Auditor security collection offers a standardised working environment, so that the build-up of know-how and remote support is made easier. Even during the planning and development stages, our target was to achieve an excellent user-friendliness combined with an optimal toolset. Professional open-source programs offer you a complete toolset to analyse your safety, byte for byte. In order to become quickly proficient within the Auditor security collection, the menu structure is supported by recognised phases of a security check. (Foot-printing, analysis, scanning, wireless, brute-forcing, cracking). By this means, you instinctively find the right tool for the appropriate task. In addition to the approx. 300 tools, the Auditor security collection contains further background information regarding the standard configuration and passwords, as well as word lists from many different areas and languages with approx. 64 million entries. Current productivity tools such as web browser, editors and graphic tools allow you to create or edit texts and pictures for reports, directly within the Auditor security platform. Many tools were adapted, newly developed or converted from other system platforms, in order to make as many current auditing tools available as possible on one CD-ROM. Tools like Wellenreiter and Kismet were equipped with an automatic hardware identification, thus avoiding irritating and annoying configuration of the wireless cards.



Testimonials

Click here to read some testimonials.


Wishlist

The Auditor project requires testing of many types of hardware but that hardware costs money. You can contribute to the Auditor project by donating money or donating hardware. Click here to see the Wishlist of hardware we are requesting.


Changes

Click here to see the changes.


Development Log

Click here to see the current development log. You can see there what is going on in the development of the new version.


Downloads

Click here to see the list of download mirros.


CD-Content

Click here to see the list of tools on the cd. Updated for auditor-120305-01.


Tested devices

Click here to see the tested device list.


CD-Labels

Click here to see and download the free cd labels.


License note

Please note that the complete source codes we have written is published under the GPL license. Some tools on the CD got a slightly different license, but no comercial products are integrated. We use the kernel sources from kernel.org and debian packages. For manually compiled tools, we did take their source from the different homepages. Please get there the source for the specific packages.


Support

For getting support you can go to our [[our forum (http://forum.remote-exploit.org/)], our FAQ site or meet on the IRC on server irc.freenode.org in channel #remote-exploit.


You can help!

  • Developing: Of course we would be pleased if the user community would like to be actively engaged in further development. However, we maintain the right to decide which patches / programs or documents are packed onto the CD-ROM. This way, we can ensure a stable distribution.
  • Webmaster: We all do have a limited amount of time to spend on our projects, so we search for someone who is able to maintain the website and build some new parts. Please contact us if you got time, you dont have to be a kernel hacker to maintain a website :-)

Contact

In case you would like to be involved with us, kindly contact us using the address auditor<@>remote-exploit.org


Liability

The software and the collection are published by Max Moser with no liability. No guarantee or liability claims can be accepted, as Max Moser takes no responsibility or liability for the Auditor security collection or any part thereof.

Support us by making a donation using the button below. Please contact us using email. For other payment methods.