|−|== Features == |+|
|−|Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development standards. All-new infrastructure has been put in place, all tools were reviewed and packaged, and we use Git for our VCS. |+|
| || |
|−|* More than 300 penetration testing tools: After reviewing every tool that was included in BackTrack, |+|
a of that work or
|−|we eliminated a great number of tools that either did not work or had other tools available that provided |+|
|−|similar functionality. |+|
| || |
|−|* Free and always will be: Kali Linux, like its predecessor, is completely free and always will be. You will |+|
|−|never, ever have to pay for Kali Linux. |+|
| || |
|−|* Open source Git tree: We are huge proponents of open source software and our development tree is |+|
is alltoand available and .
|−|available for all to see and all sources are available for those who wish to tweak and rebuild packages. |+|
| || |
|−|* FHS compliant: Kali has been developed to adhere to the Filesystem Hierarchy Standard, allowing all |+|
to , to .
|−|Linux users to easily locate binaries, support files, libraries, etc. |+|
| || |
|−|* Vast wireless device support: We have built Kali Linux to support as many wireless devices as we |+|
to , a of .
|−|possibly can, allowing it to run properly on a wide variety of hardware and making it compatible with |+|
|−|numerous USB and other wireless devices. |+|
| || |
|−|* Custom kernel patched for injection: As penetration testers, the development team often needs to |+|
for to the . of and.
|−|do wireless assessments so our kernel has the latest injection patches included. |+|
|−|Secure development environment: The Kali Linux team is made up of a small group of trusted |+|
|−|individuals who can only commit packages and interact with the repositories while using multiple secure |+|
| || |
|−|* GPG signed packages and repos: All Kali packages are signed by each individual developer when |+|
the the . -in to the .
|−|they are built and committed and the repositories subsequently sign the packages as well. |+|
|−|Multi- language: Although pentesting tools tend to be written in English, we have ensured that Kali has |+|
|−|true multilingual support, allowing more users to operate in their native language and locate the tools |+|
|−|they need for the job. |+|
| || |
|−|* Completely customizable: We completely understand that not everyone will agree with our design |+|
users to , .
|−|decisions so we have made it as easy as possible for our more adventurous users to customize Kali Linux |+|
|−|to their liking, all the way down to the kernel. |+|
| || |
|−|* ARMEL and ARMHF support: Since ARM-based systems are becoming more and more prevalent and |+|
|−|inexpensive, we knew that Kali’s ARM support would need to be as robust as we could manage, resulting |+|
|−|in working installations for both ARMEL and ARMHF systems. Kali Linux has ARM repositories integrated |+|
|−|with the mainline distribution so tools for ARM will be updated in conjunction with the rest of the |+|
| || |
|−|* Kali is currently available for the following ARM devices: |+|
|−|** rk3306 mk/ss808 |+|
|−|** Raspberry Pi |+|
|−|** ODROID U2/X2 |+|
|−|** Samsung Chromebook |+|
| || |
|−|* Kali is specifically tailored to penetration testing and therefore, all documentation on this site assumes prior |+|
|−|knowledge of the Linux operating system. |+|
Latest revision as of 10:21, 8 June 2014
Belkasoft is a computer and mobile phone forensic software manufacturer since 2002. The company develops a range of forensic products aimed at law enforcement officials, investigators and experts in IT security and intelligence. The company delivers solutions that work right out of the box, without requiring a steep learning curve or any specific skills to operate
The company’s flagship product is Belkasoft Evidence Center, an all-in-one solution for searching, analysing, managing and sharing digital evidence discovered on suspects’ hard drives and RAM. Supported types of evidence include information found in instant messenger logs, internet browser histories, mailboxes of popular email clients, social network remnants, peer-to-peer data, multi-player game chats, office documents, pictures, videos, encrypted files, mobile backups and system files. Belkasoft Evidence Center is available in four major editions: Chat Analyzer, Chat & Social Analyzer, Professional, and Ultimate. The fifth Enterprise edition brings in centralized evidence processing with server-based operation and user-level permission management. A Portable edition requiring no installation and running off a USB pen drive is also available.
Belkasoft Forgery Detection offers the ability to discover digital pictures that were altered, modified or otherwise manipulated. The tool applies a range of image analysis algorithms and a decisive neural network to produce a single numeric estimate of images’ authenticity.
In addition to commercial products, Belkasoft offers a range of free forensic tools.
Belkasoft Facebook Profile Saver captures information publicly available in Facebook profiles. This small utility is designed for computer forensic and security specialists who need to automate the downloading of Facebook pages to their local computers. A local copy of public Facebook pages may be required for performing investigations and/or presented as court evidence.
Belkasoft Live RAM Capturer is a tiny free forensic tool to reliably extract the entire content of the computer's volatile memory - even if protected by an active anti-debugging or anti-dumping system. Separate 32-bit and 64-bit builds are available in order to minimize the tool's footprint as much as possible. Memory dumps captured with Belkasoft Live RAM Capturer can be analyzed with any forensic tool including Live RAM Analysis in Belkasoft Evidence Center.
Belkasoft Evidence Reader enables Evidence Center users to share evidence collected with the main suite. Users of Evidence Reader can access evidence collected during an investigation from any computer, even if Belkasoft Evidence Center is not installed on that PC.
Belkasoft customers include government and private organizations in more than 60 countries, including the FBI, US Army, DHS, police departments in Germany, Norway, Australia and New Zealand, PricewaterhouseCoopers, and Ernst & Young.
Belkasoft D-U-N-S number is 683524694.
Belkasoft NATO Commercial and Government Entity (NCAGE, also CAGE) code is SKF09.
Belkasoft is also registered within Central Contractor Registration (CCR), ORCA and WAWF.
Belkasoft is a registered trademark.