Bugtraq-I Distribution for Pentesting & Forensics

Bugtraq system offers the most comprehensive distribution, optimal, stable and automatic security to date. Bugtraq is a distribution based on the 2.6.38 kernel has a wide range of penetration and forensic tools. Bugtraq can be installed from a Live DVD or USB drive, the distribution is customized to the last package, configured and updated the kernel. The kernel has been patched for better performance to recognize a variety of hardware, including wireless injection patches pentesting that other distributions do not recognize.

Some of the special features that you can appreciate are:

  • Administrative improvements of the system for better management of services.
  • Expanded the range of recognition for injection wireless drivers.
  • Patching the kernel 2.6.38 to recognize 4 gigs of RAM in 32-bit.
  • Tools perfectly configured, automated installation scripts and tools like Nessus,
    OpenVAS, Greenbone, Nod32, Hashcat, Avira, BitDefender, ClamAV, Avast,
    AVG, etc…
  • Unique Scripts from Bugtraq-Team (SVN updates tools, delete tracks,
    backdoors, Spyder-sql, etc.)
  • Stability and performance optimized: Enhanced performance flash and java and
    start purging unnecessary services. So that the user can use only the services you
    really want.
  • It has incorporated the creation of the user in the installation, which is created
    with all system configurations.
  • We are the distribution and Forensic Pentesting with more tools built and
    functional, well organized menu without repetition of the same to avoid
    overwhelming the user.


Wireless chipsets:

libertas_cs (Libertas)
ub8xxx (Libertas)
rt2400pci (rt2x00)
rt2500pci (rt2x00)
rt2500usb (rt2x00)
rt61pci (rt2x00)
rt73usb (rt2x00)
rtl8180 (Realtek)
rtl8187 (Realtek)

Bluetooth drivers:


Kindly click on an image to see the full and the clear view

For download it and more additional information, visit :

Languages available in Spanish and English

Note: If you want to learn more about Linux and Windows based Penetration testing, you might want to subscribe our RSS feed and Email Subscription  or become our Facebook fan! You will get all the latest updates at both the places.
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Top 5 Techniques Hackers Use to hack Social Media Accounts

These days, Social Media have become a significant need in our everyday life. It encourages us to associate and connect with anyone over the...

5 Top Programming Languages for Hacking

We live in the 21st century, which is very fast-changing. This is a century of competition for information and computing resources. Every year the...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

Preventing SQL Injection in PHP Applications

SQL injection is one of the most common cybersecurity threats and as the name suggests, it is a form of injection attack. Injection attacks, on...