CYBER FORENSICS
CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry.
CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. It offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications.

CYBER FORENSICS
CSI Linux was developed by Computer Forensics, Incident Response, and Competitive Intelligence professionals to meet the current needs of the government agencies and the industry.
CSI Linux is a multi-purpose, all inclusive, Operating System focused on online investigations of social media, domain recon, dark web, malware analysis, and more. IT offers investigators the ability to do their job using a software package that is centrally managed and updatable without having to go out of your way doing the daunting task of updating individual applications.
THE NEXT FRONTIER IN CYBER FORENSICS
ONLINE INVESTIGATIONS
The first challenge that we focus on is the ability to minimize the time and effort it usually takes for reconnaissance and Open Source Intelligence (OSINT) analysis. There is a plethora of information on the Internet and a LOT of it is useful during investigations. Tracking a suspect? Want to know what a future hacker will know about you? Need to link user accounts to prove collusion? These are some of the many challenges many of us face every day. We are making this easier and, in many cases, cheaper than ever before. CSI Linux ties together Social Media accounts, Website Info, Domain Recon, OSINT, and more.
INCIDENT RESPONSE
The second challenge the organisations are facing is the cyber crime case. If a hacker or even an Advanced Persistent Threat (APT) is inside, how do you catch them? What do you do once you identify the threat? Welcome to the world of incident response and network forensics. With a combination or state of the art technology and good old-fashioned investigative know-how, we are working on a low budget solution for making your cyber triage and emergency response easier and more streamlined. This capability includes: Intrusion Detection/Prevention, Log Monitoring, Network Analysis, Reporting, and more.
MALWARE ANALYSIS
The third challenge is malware analysis. You may never need this, but if you come across an application or process that seems malicious and none of your security solutions are catching the activity, we have you covered with solutions including radare2 and the NSA released tool Ghidra. CSI Linux gives the possibility to perform both Static and Dynamic Malware Reverse Engineering.
WANT TO TRY IT?
The download has been packaged in a VirtualBox appliance. You must download and install VirtualBox first, install the VirtualBox Extension Pack, then run the downloaded OVA file. This will take a few minutes to build. The current appliance comes with both CSI Linux and Whonix Gateway.
OPEN SOURCE FEATURES
Bleachbit
GoBuster
Guymager
HTTrack
(x)Hydra
Ghidra
Keepass
LibreOffice
Locator
Maltego CE
CherryTree
Metagoofil
NMap
OphCrack
OSINTFramework
CS-QuickTunnel
OSINT-Search
Radare2
Recon-NG
RecordMyDesktop
EyeWitness
Skiptrace
StegoSuite
Sublist3r
theHarvester
GIMP
Tor Browser
Whonix Gateway
* Bleachbit
* CherryTree
* CS-QuickTunnel
* EyeWitness
* Ghidra
* GIMP
* GoBuster
* Guymager
* HTTrack
* (x)Hydra
* Keepass
* LibreOffice
* Locator
* Maltego CE
* Metagoofil
* NMap
* OphCrack
* OSINTFramework
* OSINT-Search
* Radare2
* Recon-NG
* RecordMyDesktop
* Skiptrace
* StegoSuite
* Sublist3r
* theHarvester
* Tor Browser
* Whonix Gateway
CONTACT US
FOR MORE INFORMATION