Alternatives to Santoku
Compare Santoku alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Santoku in 2026. Compare features, ratings, user reviews, pricing, and more from Santoku competitors and alternatives in order to make an informed decision for your business.
-
1
Ubuntu
Ubuntu
Better security. More packages. Newer tools. All your open source, from cloud to edge. Secure your open source apps. Patch the full stack, from kernel to library and applications, for CVE compliance. Governments and auditors certify Ubuntu for FedRAMP, FISMA and HITECH. Rethink what’s possible with Linux and open source. Companies engage Canonical to drive down open source operating costs. Automate everything: multi-cloud operations, bare metal provisioning, edge clusters and IoT. Whether you’re a mobile app developer, an engineering manager, a music or video editor or a financial analyst with large-scale models to run — in fact, anyone in need of a powerful machine for your work — Ubuntu is the ideal platform. Ubuntu is used by thousands of development teams around the world because of its versatility, reliability, constantly updated features, and extensive developer libraries. -
2
Security Onion
Security Onion
Security Onion is a comprehensive open source platform for intrusion detection, network security monitoring, and log management. It provides a set of powerful tools to help security professionals detect and respond to potential threats across an organization's network. Security Onion integrates various technologies, including Suricata, Zeek, and Elastic Stack, to collect, analyze, and visualize security data in real-time. Security Onion’s intuitive user interface allows for easy management and analysis of network traffic, security alerts, and system logs. It also includes built-in tools for threat hunting, alert triage, and forensic analysis, helping users identify potential security incidents quickly. Security Onion is designed for scalability, making it suitable for environments of all sizes, from small businesses to large enterprises.Starting Price: Free -
3
Kali Linux
Kali
Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and Reverse Engineering. You can take any Linux and install pentesting tools on it, but you have to set the tools up manually and configure them. Kali is optimized to reduce the amount of work, so a professional can just sit down and go. A version of Kali is always close to you, no matter where you need it. Mobile devices, Docker, ARM, Amazon Web Services, Windows Subsystem for Linux, Virtual Machine, bare metal, and others are all available. With the use of metapackages, optimized for the specific tasks of a security professional, and a highly accessible and well documented ISO customization process, it's always easy to generate an optimized version of Kali for your specific needs. Whether you are a seasoned veteran or a novice, our documentation will have all the information you will need to know. -
4
Oracle Solaris
Oracle
We’ve been designing the OS for for more than two decades, always ensuring that we’ve engineered in features to meet the latest market trends while maintaining backward compatibility. Our Application Binary Guarantee gives you the ability to run your newest and legacy applications on modern infrastructure. Integrated lifecycle management technologies allow you to issue a single command to update your entire cloud installation—clear down to the firmware and including all virtualized environments. One large financial services company saw a 16x efficiency gain by managing its virtual machines (VMs) using Oracle Solaris, compared to a third-party open-source platform. New additions to the Oracle Solaris Observability tools allow you to troubleshoot system and application problems in real time, giving you real-time and historical insight and allowing for unprecedented power to diagnose and resolve issues quickly and easily. -
5
Alpine Linux
Alpine Linux
Alpine Linux is an independent, non-commercial, general purpose Linux distribution designed for power users who appreciate security, simplicity and resource efficiency. Alpine Linux is built around musl libc and busybox. This makes it smaller and more resource efficient than traditional GNU/Linux distributions. A container requires no more than 8 MB and a minimal installation to disk requires around 130 MB of storage. Not only do you get a fully-fledged Linux environment but a large selection of packages from the repository. Binary packages are thinned out and split, giving you even more control over what you install, which in turn keeps your environment as small and efficient as possible. Alpine Linux is a very simple distribution that will try to stay out of your way. It uses its own package manager called apk, the OpenRC init system, script driven set-ups and that’s it! This provides you with a simple, crystal-clear Linux environment without all the noise. -
6
PCLinuxOS
PCLinuxOS
PCLinuxOS is a free easy to use Linux-based Operating System for x86_64 desktops or laptops. PCLinuxOS is distributed as a LiveCD/DVD/USB ISO image, and can also be installed to your computer. The LiveCD/DVD/USB mode lets you try PCLInuxOS without making any changes to your computer. If you like it, you can install the operating system to your hard drive. Locally installed versions of PCLinuxOS utilize the Advanced Packaging Tool (or APT), a package management system (originally from the Debian distribution), together with Synaptic, a GUI frontend to APT for easy software installation. PCLinuxOS has over 12,000 rpm software packages available from our software repository. PCLinuxOS has a script called mylivecd, which allows the user to take a ‘snapshot’ of their current hard drive installation (all settings, applications, documents, etc.) and compress it into an ISO CD/DVD/USB image. -
7
Tizen
Tizen
Tizen is an open and flexible operating system built from the ground up to address the needs of all stakeholders of the mobile and connected device ecosystem, including device manufacturers, mobile operators, application developers and independent software vendors (ISVs). Tizen is developed by a community of developers, under open source governance, and is open to all members who wish to participate. Tizen operating system comes in multiple profiles to serve different industry requirements. The current Tizen profiles are Tizen IVI (in-vehicle infotainment), Tizen Mobile, Tizen TV, and Tizen Wearable. In addition to that, as of Tizen 3.0, all profiles are built on top of a common, shared infrastructure called Tizen Common. With Tizen, a device manufacturer can begin with one of these profiles and modify it to serve their own needs, or use Tizen Common base to develop a new profile to meet the memory, processing and power requirements of any device and quickly bring it to market. -
8
Belkasoft X
Belkasoft
Belkasoft X Forensic (Belkasoft Evidence Center X) is a flagship tool by Belkasoft for computer, mobile, drone, car, and cloud forensics. It can help you to acquire and analyze a wide range of mobile and computer devices, run various analytical tasks, perform case-wide searches, bookmark artifacts, and create reports. Belkasoft X Forensic acquires, examines, analyzes, and presents digital evidence from major sources—computers, mobile devices, RAM, cars, drones, and cloud services—in a forensically sound manner. If you need to share the case details with your colleagues, use a free-of-charge portable Evidence Reader. Belkasoft X Forensic works out of the box and can be easily integrated into customer workflows. The software interface is so user-friendly that you can start working with your cases right after the Belkasoft X Forensic deployment.Starting Price: $1500 -
9
D.A.R.T. is a powerful tool for collecting and analyzing data collected by mobile devices. High Tech Crime Institute is a global leader in Mobile Cell Phone Forensics, Mobile Forensics Software and Mobile Forensics Training and Education. HTCI has been uniquely qualified to provide expert Forensic Instruction, proactive Security Management and Computer Forensics platforms and classes to the military, police, emergency services and the general public since 2002. High Tech Crime Institute is a global leader in Mobile Cell Phone Forensics, Mobile Forensics Software and Mobile Forensics Training and Education. HTCI has been uniquely qualified to provide expert Forensic Instruction, proactive Security Management and Computer Forensics platforms and classes to the military, police, emergency services and the general public since 2002.Starting Price: $499 one-time payment
-
10
OpenFang
OpenFang
OpenFang is an open source Agent Operating System built in Rust that provides a unified runtime for building, deploying, and managing autonomous AI agents at production scale. It packages a batteries-included architecture into a single binary, enabling developers to run agents that operate continuously, build knowledge graphs, and report results to a centralized dashboard without constant user prompts. At the core of OpenFang are “Hands,” pre-built autonomous capability packages that execute on schedules and perform tasks such as lead generation, research, browser automation, and social management. It includes dozens of pre-built agents, native tools, and channel adapters that allow agents to function across platforms like Slack, WhatsApp, Discord, and Teams from a single environment. Security is built into the foundation through multiple defense layers such as WASM sandboxing, cryptographic signing, taint tracking, and tamper-evident audit trails.Starting Price: Free -
11
Grammatech Proteus
Grammatech
Proteus is an advanced software testing system for automatically finding and fixing vulnerabilities, with no false alarms, aimed at development groups, testing organizations, and cybersecurity teams. It discovers vulnerabilities that could be triggered by potentially malicious files or network inputs, including many common entries in the Common Weakness Enumeration (CWE). The tool supports Windows and Linux native binaries. By integrating and simplifying the use of state-of-the-art tools for binary analysis and transformation, Proteus lowers the costs and increases the efficiency and effectiveness of software testing, reverse engineering, and maintenance. Binary analysis, mutational fuzzing, and symbolic execution without the need for source code, and a professional-grade user interface for result aggregation and presentation. Advanced exploitability reporting and reasoning capability, and deployment in a virtualized environment or on a host system.Starting Price: Free -
12
Parrot OS
Parrot Security
Parrot is a worldwide community of developers and security specialists that work together to build a shared framework of tools to make their job easier, standardized and more reliable and secure. Parrot OS, the flagship product of Parrot Security is a GNU/Linux distribution based on Debian and designed with Security and Privacy in mind. It includes a full portable laboratory for all kinds of cyber security operations, from pentesting to digital forensics and reverse engineering, but it also includes everything needed to develop your own software or keep your data secure. Always updated, frequently released with many hardening and sandboxing options available. Everything is under your complete control. Feel free to get the system, share with anyone, read the source code and change it as you want! this system is made to respect your freedom, and it ever will be. -
13
LLIMAGER
e-Forensics Inc
LLIMAGER was designed to address the need for a low-cost, no-frills “live” forensic imaging solution for Mac computers, capable of capturing the entirety of a synthesized disk, including volume unallocated space, as macOS sees the disk with its partitions mounted. The application was developed to be user-friendly and easy enough for entry level digital forensics examiners. The application leverages built-in Mac utilities, providing a versatile solution compatible with a wide range of macOS versions, both past and present. This ensures that the tool remains functional across diverse system configurations and updates. FEATURES INCLUDE: Powerful and Fast "Live" imaging, CLI based Application Supports Intel, Apple Silicon, T2 Chips, and APFS File Systems. Full Acquisition Log SHA-256 or MD5 Hashed DMG Images Choice of Encrypted /Decrypted DMGs for use in commercial forensics tools Unlimited Technical SupportStarting Price: $425 -
14
Passware Kit
Passware
Passware Kit Forensic is the complete encrypted electronic evidence discovery solution that reports and decrypts all password-protected items on a computer. The software recognizes 340+ file types and works in batch mode recovering passwords. Analyzes live memory images and hibernation files and extracts encryption keys for hard disks and passwords for Windows & Mac accounts. Passware Bootable Memory Imager acquires memory of Windows, Linux, and Mac computers. Resolved navigation issues after stopping the password recovery process. Instant decryption of the latest VeraCrypt versions via memory analysis. Accelerated password recovery with multiple computers, NVIDIA and AMD GPUs, and Rainbow Tables. In addition to all the key features of a Windows version, Passware Kit Forensic for Mac provides access to APFS disks from Mac computers with Apple T2 chip.Starting Price: $1,195 one-time payment -
15
Phonexia Voice Inspector
Phonexia
Perform fast and highly accurate language-independent forensic voice analysis using a speaker recognition solution explicitly designed for forensic experts and exclusively powered by state-of-the-art deep neural networks. Analyze the subject’s voice automatically with an advanced speaker identification tool, and support your forensic expert’s conclusion with accurate, unbiased voice analysis. Identify a speaker in the recordings of any language without the need to hire a language-specific linguist as Phonexia Voice Inspector can detect pronunciation differencies in any language. Present the results of your forensic voice analysis to a court in the most convenient way with an automatically generated report containing all the necessary details to validate the claim. Phonexia Voice Inspector is an out-of-the-box solution that provides police forces and forensic experts with a highly accurate speaker recognition tool to support effective criminal investigations and give evidence in court. -
16
Slackware
Slackware Linux
After a long development cycle (including many betas and release candidates to get everything just exactly perfect) we're pleased to announce the availability of the new stable release. You'll find updates throughout the system, with the latest development tools and recent versions of applications, window managers, desktop environments, and utilities. The Linux kernel is updated to version 4.4.14 (part of the 4.4.x kernel series that will be getting long-term support from the kernel developers). We've brought together the best of these and other modern components and worked our magic on them. If you've used Slackware before, you'll find the system feels like home. Want to give Slackware 14.2 a test drive without modifying your disk drive? Then check out Slackware Live Edition! This is a complete Slackware installation that can run from a CD, DVD, or USB stick. Build scripts for all kinds of additional software for Slackware 14.2 are also available. -
17
Sailfish OS
Jolla
Sailfish OS is a European alternative to dominating mobile operating systems, and the only mobile OS offering an exclusive licensing model for local implementations. On the market since 2013, and now already in its 4th generation, Sailfish OS offers a secure platform for trusted mobile solutions. With Sailfish OS you can also run Android™ apps with our dedicated App Support solution. Sailfish OS is a secure mobile operating system optimized to run on smartphones and tablets, and also easily adaptable to all kinds of embedded devices and use cases. The fourth generation, Sailfish 4, boasts a multitude of new enablers to support different ecosystem projects, be it private corporate solutions or public sector governmental deployments. Sailfish OS has a host of modern security functionalities developed specifically for corporate and governmental environments. In Sailfish 4 user data is fully encrypted and apps are protected by Firejail sandboxing.Starting Price: €29.90 one-time payment -
18
CodeSentry
CodeSecure
CodeSentry is a Binary Composition Analysis (BCA) tool designed to provide detailed insights into the components of binaries, including open-source software, firmware, and containers. It helps identify vulnerabilities within these components by generating Software Bill of Materials (SBOMs) in formats like SPDX and CycloneDX. By mapping components to a comprehensive vulnerability database, CodeSentry enables organizations to mitigate risks and improve software security. It is effective for both pre-production analysis and post-production monitoring, allowing teams to track vulnerabilities throughout the software lifecycle. The tool is flexible in deployment, supporting SaaS and on-premise configurations. -
19
Havoc-OS
Havoc-OS
Havoc-OS is an after-market firmware based on Android Open Source Project, inspired by Google Pixel with a refined Material Design UI. We offer a smooth and stable experience for your device with a selected set of amazing features that provide an exceptional user experience. Our ROM is available for over 150+ Devices across 20+ OEMs. Generic System Images (GSI) are available so you can try out our ROM even if your device isn't currently supported. Our device roster keeps growing with support for more devices added every month.Starting Price: Free -
20
CopperheadOS
Copperhead
CopperheadOS is a Secure Android built for encrypted and secure phones by a privacy focused company. Available as security-centric and privacy focused Google-free Android for the latest Pixel devices. Develop or include a secure phone in your businesses mobile security program. CopperheadOS integrates with the latest and greatest mobile security solutions. Mobile devices are easy targets for hackers so we developed the most secure android, CopperheadOS, to protect against a variety of attack vectors. Copperhead's technical documentation is available for review. Security-centric, non- technical user experience. No Google or any tracking analytics. Sandboxing and application isolation. Integrates with the latest mobile device management and intrusion detection system mobility software. -
21
BeyondTrust Password Safe
BeyondTrust
Discover, manage, audit, and monitor privileged accounts of all types. Scan, identify and profile all assets and applications with auto-onboarding of privileged accounts. Store, manage and rotate privileged account passwords, eliminating embedded credentials and ensuring password strength. Log and monitor all privileged credential activity and sessions for compliance and forensic review. Use Password Safe to get finely-tuned and automatic password management and privilege approval controls, detailed session management (including real-time monitoring), and all the audit trail information and forensics needed to meet compliance requirements. Automatically discover and onboard accounts. Store, manage and rotate privileged passwords, eliminating embedded credentials in scripts and code. Log and monitor all privileged credential activity and sessions for compliance and forensic review. -
22
ADF Cloud Platform
ADF Solutions
ADF Solutions is the leading provider of digital forensic and media exploitation tools. These tools are used for processing and analyzing Android/iOS smartphones, mobile devices, computers, external drives, drive images, and other media storage (USB flash drives, memory cards, etc.) ADF triage software is all about speed, scalability, ease-of-use, and relevant results. The tools have a proven track record in reducing forensic backlogs, streamlining digital investigations and rapid access to digital evidence and intelligence. Our customers include federal, state and local law enforcement agencies, military and defense agencies, Office of Inspector General offices, Attorneys General, prosecutors, and other investigative professionals worldwide.Starting Price: $35000 -
23
Void Linux
Void Linux
Void is a general purpose operating system, based on the monolithic Linux kernel. Its package system allows you to quickly install, update and remove software; software is provided in binary packages or can be built directly from sources with the help of the XBPS source packages collection. It is available for a variety of platforms. Software packages can be built natively or cross compiled through the XBPS source packages collection. Unlike trillions of other existing distros, Void is not a modification of an existing distribution. Void's package manager and build system have been written from scratch. Void Linux supports both the musl and GNU libc implementations, patching incompatible software when necessary and working with upstream developers to improve the correctness and portability of their projects. -
24
ClearOS Mobile
ClearCenter
ClearOS Mobile puts individuals in control over their digital identity, privacy, and security while providing access to the Android applications they need. ClearOS Mobile will eventually run on many cell phone hardware manufacturers, cellular carriers, providers and operators. -
25
Apple tvOS
Apple
Your tvOS apps can deliver amazing experiences with stunning picture quality through 4K resolution, Dolby Vision, and HDR10 — and immersive sound through Dolby Atmos. And with Picture in Picture, multiuser, and game controller support, you can create even more engaging gaming and interactive experiences. We’ve reimagined the TV experience with tvOS — an innovative TV platform that redefines what can be done in the living room. Apple TV features a built-in App Store, making it more entertaining than ever. Now you can deliver incredible and immersive apps and games on the big screen. Leverage many of the same frameworks, technologies, and concepts that are similar to iOS. Frameworks and technologies, such as Metal, UIKit, CloudKit, and Game Center, let you create rich games and apps that look amazing on Apple TV. TVMLKit templates using XML and JavaScript are available as a framework for tvOS apps and let you use predefined layouts and JavaScript APIs to quickly create beautiful apps. -
26
BlackArch Linux
BlackArch Linux
BlackArch Linux is an Arch Linux-based penetration testing distribution for penetration testers and security researchers. You can install tools individually or in groups. BlackArch Linux is compatible with existing Arch installs. The BlackArch Full ISO contains multiple window managers. The BlackArch Slim ISO features XFCE Desktop Enviroment. The full ISO contains a complete, functional BlackArch Linux system with all the available tools in the repo at build time. The slim ISO contains a functional BlackArch Linux system with a selected set of common/well-known tools and system utilities for pentesting. The netinstall ISO is a lightweight image for bootstrapping machines with a minimal set of packages. BlackArch Linux is compatible with existing/normal Arch installations. It acts as an unofficial user repository. You can install BlackArch Linux using the Slim medium which features GUI installer. -
27
Secure My Files
SecuSimple
Secure My Files Mini, or SMF is a JavaScript library for securing documents using end-to-end encryption in the browser. SMF is using symmetric encryption algorithms (AES with a 256-bit cypher) to encrypt and decrypt files. As an application Secure My Files can be used as an application. You can deploy the sources available here on your own server. Everything is static, so any web server will do. As a library It's simple to use SMF as a library. You first need to include the JavaScript script into the page. You can encrypt or decrypt a file, providing a password. Source code is available on Github for everyone to inspect. Anyone can detect issues and contribute, improving security. We and our servers are based in Europe. Build and host your own flavor of Secure My Files. Reuse as a library in your own application.Starting Price: $14.99 one-time payment -
28
Black Duck's Mobile Application Security Testing (MAST) service offers on-demand assessments designed to address the unique security risks of mobile applications. It enables detailed analysis of client-side code, server-side code, and third-party libraries, identifying vulnerabilities even without requiring access to source code. Combining proprietary static and dynamic analysis tools, MAST provides two levels of testing depth: Standard, which integrates automated and manual analysis to detect vulnerabilities in application binaries, and Comprehensive, which adds extended manual testing to uncover issues in both mobile application binaries and their server-side functionalities. This flexible and thorough approach helps organizations reduce the risk of breaches and ensure the security of their mobile application ecosystems.
-
29
Falcon Forensics
CrowdStrike
Falcon Forensics offers comprehensive data collection while performing triage analysis during an investigation. Forensic security often entails lengthy searches with numerous tools. Simplify your collection and analysis to one solution to speed triage. Incident responders can respond faster to investigations, conduct compromise assessments along with threat hunting and monitoring with Falcon Forensics. Pre-built dashboards, easy search, and view data capabilities empower analysts to search vast amounts of data, including historical artifacts, quickly. Falcon Forensics automates data collection and provides detailed information around an incident. Responders can tap into full threat context without lengthy queries or full disk image collections. Provides incident responders a single solution to analyze large quantities of data both historically and in real-time to uncover vital information to triage an incident. -
30
LineageOS
Lineage
LineageOS extends the functionality and lifespan of mobile devices from more than 20 different manufacturers thanks to our open-source community of contributors from all around the world. Your data, your rules. With powerful tools such as Privacy Guard, you are in control of what your apps can do whenever you want. We take security very seriously, that’s why we deliver security updates every month to all our supported devices. And to make your device more secure, lock everything behind an enhanced lock screen. Our open-source apps are here to help you get through the day. Android developers will turn any device into the perfect device for apps development thanks to enhanced tools and exclusive APIs. LineageOS, an open-source Android distribution, is available for several devices, with more being continuously added thanks to the biggest, yet ever growing, Android open-source community. -
31
NethServer
NethServer
Analyzes all web traffic and blocks selected websites via HTTP and even HTTPS using Squid proxy. Integrated with ClamAV antivirus and site blacklists. Multi-domain web server with ready LAMP stack. Virtual hosting allows to host multiple domain names on a single server. Based on NextCloud provides universal access to your files via the web, your computer or your mobile devices, wherever you are. Provide a private Slack-alternative with Mattermost. Open source messaging platform that enables secure team collaboration. Modern and powerful web interface based on Cockpit that simplifies common administration tasks, very easy and fast installation. Based on CentOS/RHEL, a widespread and popular server distribution, trusted by routine security updates, and rock solid stability.Starting Price: €48 per year -
32
Sabayon Linux
Sabayon
Sabayon is a beginner-friendly Gentoo-based open-source Linux distribution. We aim to deliver the best "out of the box" user experience by providing the latest open source technologies in an elegant format. In Sabayon everything should just work. We offer a bleeding edge operating system that is both stable and reliable. Fast and optimized for your hardware! It’s up to you whether you turn a fresh Sabayon installation into a geeky Gentoo ~arch system or simply enjoy the power of our binary package manager. From testing to Community Repositories. Install just once, you can upgrade everytime you wish to the latest release. Just start it, everything should be already in place. Daily and Monthly images available. Multiple Desktop Environment, KDE, Gnome, Mate, and XFCE. Build your own Sabayon spin easily! It can even be built with Docker! Support for Raspberry Pi 2⁄3, Odroid X2, U2/3 C2 and more. -
33
SalvationDATA
SalvationDATA Technology
Digital Forensic Lab Solution from SalvationDATA is the most advanced Lab Solution for numerous industries including Law-Enforcement, IT & Finance Enterprises, and other companies that need Intelligent Work Cooperation. Specifically, with the advanced supporting software like Video Forensics, Mobile Forensics, Data Recovery and Database Forensics, and advanced solid hardware equipment like Intelligent Data Center and Intelligent Forensic Workstation, it’s been applied world-wide among Digital Forensics, eDiscovery, DFIR for law enforcement and intelligence organizations. With the assistance of professional and advanced digital forensic lab solutions, your organization’s circumstances get upgraded effectively and efficiently. -
34
OxygenOS
OnePlus
OxygenOS glides like silk with next-gen core stability and enhanced reliability. System-level performance is sublimely smooth with HyperBoost and AI System Booster, elevating mobile gaming while ensuring smooth app opening. OxygenOS pays homage to its popular and innovative Always-on Display feature. Evolving the seamless experience further, OxygenOS 13 transforms your standard display information with dynamic information powered by intelligent personalization. Co-developed with Spotify, your song list is intelligently displayed, providing easy control over your favorite tracks. This versatile AOD is music to your ears. We elevated the classic and unique portrait experience with support for enhanced tools, including multiple brushes, line colors, and improved image handling. With an updated UI and significantly faster image conversion, creating compelling and unique wallpapers has never been easier. -
35
NomadBSD
NomadBSD
NomadBSD is a persistent live system for USB flash drives, based on FreeBSD®. Together with automatic hardware detection and setup, it is configured to be used as a desktop system that works out of the box, but can also be used for data recovery, for educational purposes, or to test FreeBSD®'s hardware compatibility. The images for 64-bit and 32-bit computers fit on a 5GB USB flash drive. A system with a 1.2GHz CPU and 1G of RAM should be able to run NomadBSD decently. Booting is possible via BIOS and UEFI. We've decided to change the versioning scheme to the following form: FFfX-YYYYMMDD, where FF is the major two-digit FreeBSD version, f is the minor version, and X stands for ALPHA (A), BETA (B), RC, or RELEASE (R). Followed by a date. The new scheme allows us to provide images with different version of FreeBSD.Starting Price: Free -
36
Scalable visibility and security analytics across your business. Outsmart emerging threats in your digital business with industry-leading machine learning and behavioral modeling provided by Secure Network Analytics (formerly Stealthwatch). Know who is on the network and what they are doing using telemetry from your network infrastructure. Detect advanced threats and respond to them quickly. Protect critical data with smarter network segmentation. And do it all with an agentless solution that grows with your business. Detect attacks across the dynamic network with high-fidelity alerts enriched with context such as user, device, location, timestamp, and application. Analyze encrypted traffic for threats and compliance, without decryption. Quickly detect unknown malware, insider threats like data exfiltration, policy violations, and other sophisticated attacks using advanced analytics. Store telemetry data for long periods for forensic analysis.
-
37
Ubuntu Server
Ubuntu
Ubuntu Server brings economic and technical scalability to your datacentre, public or private. Whether you want to deploy an OpenStack cloud, a Kubernetes cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available. It doesn’t matter whether you want to deploy a NoSQL database, web farm or cloud. Certified by leading hardware OEMs and with comprehensive deployment tools, so you can get the most from your infrastructure. Our regular release cycle means access to the latest and most performant open source. A lean initial installation and integrated deployment and application modelling technologies make Ubuntu Server a great solution for simple deployment and management at scale. -
38
OSForensics
PassMark Software
Extract forensic data from computers, quicker and easier than ever. Uncover everything hidden inside a PC. Discover relevant data faster through high performance file searching and indexing. Extract passwords, decrypt files and recover deleted files quickly and automatically from Windows, Mac and Linux file systems. Identify evidence and suspicious activity through our hash matching and drive signature analysis features. Identify and analyze all files and even automatically create a timeline of all user activity. 360° Case Management Solution. Manage your entire digital investigation with OSF’s new reporting features. Build custom reports, add narratives and even attach your other tools’ reports to the OSF report. Volatility Workbench is a graphical user interface (GUI) for the Volatility tool. OSForensics courses offered to suit a diverse range of users and skill sets. Write an image concurrently to multiple USB Flash Drives.Starting Price: $799 per user per year -
39
Omnipeek
LiveAction
Omnipeek is a network protocol analyzer from LiveAction designed to deliver deep packet analysis and rapid troubleshooting on Windows systems. It captures and analyzes packet data in real time to help identify network, application, and security issues. Omnipeek provides intuitive visualizations that make complex network data easy to understand and act on. The platform records exactly what happened on the network, enabling detailed forensic analysis after incidents occur. Built-in expert analysis automatically detects hundreds of common network problems and triggers alerts when policies are violated. Omnipeek supports voice, video, wireless, and high-speed networks, including multi-gigabit environments. It is designed to significantly reduce mean time to resolution for even the most complex network issues. -
40
Mobian
Mobian
Mobian aims to integrate the standard Debian distribution with the Phone Shell (phosh) project in a package that works on certain mobile phones, such as the Pinephone. Over time, the idea is to minimize the Mobian specific pieces by “upstreaming” customization to the original projects. Mobian comes with Phosh, the Phone Shell by Purism. It is based on well known modern Gnome technology like GTK, GSettings and DBus running on a wlroots based wayland compositor called phoc. Mobian aims to integrate the standard Debian distribution with Phone-specific projects and modifications in a distribution that works on certain mobile phones and tablets, such as the Pinephone, the Pinetab and the Librem 5. The idea is to minimize the Mobian specific pieces by “upstreaming” changes to the original projects as much as possible. To achieve this, we tread a delicate balance between carrying customized patches and packages that are required to make Mobian run well on its supported devices. -
41
Oracle Linux
Oracle
An open and complete operating environment, Oracle Linux delivers virtualization, management, and cloud native computing tools, along with the operating system, in a single support offering. Oracle Linux is 100% application binary compatible with Red Hat Enterprise Linux. Search the catalog to find information about independent software vendors (ISVs) who have certified their applications to run on Oracle Linux and Virtualization. Applications certified on Oracle Linux run wherever Linux runs—on-premises, in Oracle Cloud Infrastructure, and in other clouds. Join us in this Oracle Tux Tech Talk webinar on July 28 and learn how to benchmark for performance, discover the benefits of the UEK, and understand which workloads see improvement from UEK. -
42
Ubuntu Touch
Ubuntu Touch
Ubuntu Touch is made and maintained by the UBports Community. A group of volunteers and passionate people across the world. With Ubuntu Touch we offer a truly unique mobile experience - an alternative to the current most popular operating systems on the market. We believe that everyone is free to use, study, share and improve all software created by the foundation without restrictions. Whenever possible, everything is distributed under free and open source licenses endorsed by the Free Software Foundation, the Open Source Initiative. Ubuntu Touch is a mobile version of the Ubuntu operating system for mobile devices. However, unlike other 'flavors' of Ubuntu, it is more accurately an extract of parts of Ubuntu. It is adapted to run naturally in a mobile, touch-screen environment but is also capable of functioning as a desktop computer while in "desktop mode". This aforementioned converging of environments from device to device is where the term "Convergence" originates. -
43
ClaimEOT
ClaimEOT
ClaimEOT is a web-based software designed to perform forensic delay analysis, helping users accurately track project delays and determine eligible extensions of time (EOT) and compensable delays. The application utilizes a single as-built program to analyze project timelines from start to finish, identifying critical delays, concurrent delays, and excusable delays. It provides detailed insights into the project’s status and calculates compensable delays, enabling contractors, consultants, and legal professionals to make informed decisions. ClaimEOT is ideal for contractors, subcontractors, claims consultants, clients, and legal professionals needing an efficient way to assess delay claims. ClaimEOT’s Features ClaimEOT automatically performs Forensic Delay Analysis, and: ⦁ Instantly identifies Critically Delayed Activities and concurrency; ⦁ Provides daily insight into Project Delay; ⦁ Identifies Dynamic Critical Path; ⦁ Automatically drafts Notice of Delay Events;Starting Price: $5 -
44
OS108
OS108
OS108 is a fast, open, and secure desktop operating system built on top of NetBSD. 1 and 0 being binary bits when represented as 8 bits forms a byte also the distance of Earth from the Sun is about 108 times the diameter of the Sun. hence the name. We are always in need of contributors who want to join the project. If you’re not a developer you can still help in the form of how-to guides and other user-centric documentation and support forums.Starting Price: Free -
45
BugProve
BugProve
Founded by former security researchers, BugProve offers an automated firmware analysis platform. - Swift Results: Upload firmware, and get a security report in 5 mins. - Supply Chain Risk Management: Identify components and vulnerabilities with optional CVE monitoring for compliance. - Zero-day Engine: Detect memory corruption vulnerabilities before exploits happen. - All-in-One Hub: Easily access reevaluations, comparisons, and updates in a user-friendly format. - Effortless Sharing: Share findings via live links or export as PDFs for simple reporting. - Accelerated Testing: Save weeks in pentesting, focus on in-depth discoveries, and launch more secure products. - No Source Code Needed: Run checks directly on firmware, including static/dynamic analysis, multi-binary taint analysis, and more. Skeptical? Sign up with our Free Plan and check it yourself, no commitment required.Starting Price: $700/month -
46
THOR
Nextron Systems
THOR is the most sophisticated and flexible compromise assessment tool on the market. Incident response engagements often begin with a group of compromised systems and an even bigger group of systems that are possibly affected. The manual analysis of many forensic images can be challenging. THOR speeds up your forensic analysis with more than 12,000 handcrafted YARA signatures, 400 Sigma rules, numerous anomaly detection rules and thousands of IOCs. THOR is the perfect tool to highlight suspicious elements, reduce the workload and speed up forensic analysis in moments in which getting quick results is crucial. THOR focuses on everything the Antivirus misses. With its huge signature set of thousands of YARA and Sigma rules, IOCs, rootkit and anomaly checks, THOR covers all kinds of threats. THOR does not only detect the backdoors and tools attackers use but also outputs, temporary files, system configuration changes and other traces of malicious activity. -
47
Kubuntu
Kubuntu
Quickly find that important document, photo, or video. Split View, Editable Location, a built-in Terminal and many other useful features. Dolphin makes connecting your USB flash drives, SD cards, and your phone super easy! Images are an important part of modern life. Kubuntu has applications that make it easy to browse, share, and enhance your photos. Open PDF, Dejavu, PS, DVI, and more, annotate documents and fill in forms and even read eBooks with Okular, the universal document viewer. untu comes built-in with a music and a movie player that are simple to use. Simply select a song or a movie and Kubuntu will take care of the rest. Kubuntu plays most music and video formats out the box; restricted formats such as MP3 are installed with two clicks when needed, usually during the installation process. -
48
Universal Analysis Software (UAS) provides a platform for analyzing and managing forensic genomic data, simplifying complex bioinformatics. The UAS is an all-inclusive solution, containing analysis modules supporting all current ForenSeq workflows including ForenSeq MainstAY, ForenSeq Kintelligence, ForenSeq DNA Signature Prep, ForenSeq mtDNA Whole Genome, and ForenSeq mtDNA Control Region. UAS rapidly generates FASTQ files, performs alignment, and calls forensically relevant variants from NGS data. Extensive testing backs highly reliable variant calls to deliver accurate results in a user-friendly package with no per-seat licenses. Designed specifically for forensic analysts, UAS streamlines handling of base-by-base sequence information and contains a range of features to enable everything from efficient review of everyday STR profiles to detailed analysis of the most challenging samples.
-
49
HP-UX
Hewlett Packard Enterprise
Highly integrated UNIX operating system and tools that deliver the highest availability, reliability, and security on mission-critical HPE Integrity servers. Streamline your operations using a highly integrated UNIX operating system with tools that delivers the highest reliability, availability, and security on mission-critical HPE Integrity servers. HP-UX gives you a dynamic, secure, and unified environment and comes pre-integrated on mission-critical HPE Integrity servers. Meet your specific UNIX mission-critical requirements. HP-UX offers four operating environments tailored to specific needs. Holistic server security and system management that includes HPE Systems Insight Manager functionality with power management, health check, and deployment tools. It also provides full performance analysis tools for kernel processes and applications. Protect your business’s most critical applications and services to keep your business on target. -
50
Pavilion HyperOS
Pavilion
Powering the most performant, dense, scalable, and flexible storage platform in the universe. Pavilion HyperParallel File System™ provides the ability to scale across an unlimited number of Pavilion HyperParallel Flash Arrays™, providing 1.2 TB/s read, and 900 GB/s write bandwidth with 200M IOPS at 25µs latency per rack. Uniquely capable of providing independent, linear scalability of both capacity and performance, the Pavilion HyperOS 3 now provides global namespace support for both NFS and S3, enabling unlimited, linear scale across an unlimited number of Pavilion HyperParallel Flash Array systems. Take advantage of the power of the Pavilion HyperParallel Flash Array to enjoy unrivaled levels of performance and availability. The Pavilion HyperOS includes patent-pending technology to ensure that your data is always available, with performant access that legacy arrays cannot match.