Friday, December 6, 2024
HomeLinuxPentesting OS BlackArch Linux New Version 2019.06.01 Released with 2200 Hacking Tools

Pentesting OS BlackArch Linux New Version 2019.06.01 Released with 2200 Hacking Tools

Published on

SIEM as a Service

A Penetration Testing OS BlackArch Linux 2019.06.01 Released with new ISOs and OVA image and set of high-quality updates for Penetration testers.

BlackArch Linux is one of the Powerful Arch Linux-based penetration testing distribution which contains around 2200 Hacking tools.

BlackArch Linux one of the widely using Distributions by hackers, penetration testers, and security researchers for various security research purposes.

- Advertisement - SIEM as a Service

The release includes the new version of blackarch-installer (v1.1.1), kernel, and many other high-quality improvements.

BlackArch Linux contains more than 2200 Hacking tools for Various Purposes such as DDoS Attacks, Phishing attacks, Web and network-based attacks, WiFi Attacks.

BlackArch Linux helps to perform Pentesting in various Platform such as network pentesing, Mobile App Pentesting, Web application pentesting Etc.

Along with this new updates, BlackArch Linux added more than 150 new tools and it is a lightweight expansion to Arch Linux for penetration testers.

BlackArch Linux 2019-06-01 ChangeLog

  • added more than 150 new tools
  • added ‘jedi-vim’ plugin
  • updated vim plugins
  • included linux kernel 5.1.4
  • ISO file clean-ups and tweaks
  • updated blackarch-installer to v1.1.1
  • updated Xresources/Xdefaults + added support for rxvt-unicode
  • package QAs (runtime checks) were performed prior the ISO build
  • updated all blackarch tools and packages including config files
  • updated all system packages
  • updated all window manager menus (awesome, fluxbox, openbox)

BlackArch’s features

  • Support for x86_64, armv6h, armv7h and aarch64 architectures
  • Over 2200 tools (constantly increasing)
  • Modular package groups
  • A live ISO with multiple window managers, including dwm, fluxbox,
  • openbox, awesome, wmii, i3 and spectrwm.
  • An 64bit OVA image ready to use with Virtualbox, QEMU, and VMware
  • An optional installer with the ability to build from source.

You can download the new ISOs here: Download and you can follow the Instruction for installation: Installation Steps.

Also Recommended reviewing our Kali Linux Tutorials page which covers dozens of Kali Linux Tools.

Previous Release

Penetration Testing Distribution BlackArch Linux 2018.06.01 Released With Powerful New Hacking Tools

New BlackArch Penetration Testing Linux ISOs Released with More Hacking Tools

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

One Identity Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

One Identity named Hot Company: Privileged Access Management (PAM) in 12th Cyber Defense Magazine’s...

HCL DevOps Deploy / Launch Vulnerability Let Embed arbitrary HTML tags

Recently identified by security researchers, a new vulnerability in HCL DevOps Deploy and HCL...

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild

The Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings about several vulnerabilities being...

HackSynth : Autonomous Pentesting Framework For Simulating Cyberattacks

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Linux 6.13-rc1 Released: What’s New!

In a recent announcement, Linus Torvalds, the creator of Linux, officially released the first...

“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems

Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems.This...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...