The goods you need now

  • Ethical Hacking
  • Free Open Source
  • GNU/Linux Distribution

Wireless Attack Tools

With no or insufficient security settings, networks can easily be defeated and user privacy compromised. There are several types of vulnerabilities.

Web Applications Tools

Web application analysis is a branch of Information Gathering that deals specifically with security of websites, apps, hosting and others services.

Vulnerability Analysis Tools

Vulnerability analysis is a process of defining, identifying and classifying the security holes in information technology systems.

Social Engineering Tools

Social engineering, refers to psychological manipulation of people into performing actions for the purpose of gathering system access.

Sniffing & Spoofing Tools

In the context of network security, a spoofing attack is a situation in which a person or a program successfully masquerades as another.

Reporting Tools

In the Cybersecurity, there is methodologies that have proven to be effective in determining the security vulnerabilities and reporting it.

Networking Analysis Tools

A network exploitation tool will can be used to identify if a remote host is vulnerable to a particular attack and can take the process to the next level.

Information Gathering Tools

The first phase in security assessment is focused on collecting as much information as possible about the target and it's the most critical step.

Hardwares Tools

Hardware hacking is an art designed to analyze and understand the operation of a hardware, with no other element than the hardware itself.

Exploitation Tools

Exploitation is the next step in a hacker's playbook after finding a vulnerability. And will be used to gaining access or user's whereabouts.

Digital Forensics Tools

Digital Forensics is a branch of forensic science encompassing the recovery and investigation of material found in digital devices in relation to crime.

Cracking Tools

Password cracking employs a number of techniques. The process can involve either comparing passwords against word list or use algorithms.

Welcome to BlackBuntu

For the Ubuntu Lovers with the aim to promote the culture of pentest and security IT environment.

Project Keys

BlackBuntu is born from the passion and spirit of 2 specialists. Let’s cut the bullshit, this distribution is a GNU/Linux distribution based on Ubuntu and designed with Pentest, Security and Development in mind for the best experience.


BlackBuntu Linux is an Ubuntu Linux-based penetration testing distribution for penetration testers and cybersecurity researchers and experts.

Tools Repository

Currently BlackBuntu repository contains 1880 tools that are constantly updated to the latest stable version to offer you the best user experience.


BlackBuntu is a complete all-in-one desktop environment for pentesting, analyzing, digital forensics, reverse engineering and much more.


Get involved with the Community, visit the blog, get in touch with the BlackBuntu Team or just take a look around and explore our universe.

What our Fun Factors

Pentest Tools


Online Courses

Coffee Cups


Designed to be fast, easy to use and provide a minimal yet complete desktop environment. BlackBuntu Linux it's also a software repositories that are constantly updated to the latest stable version of the most popular ethical hacking tools.

Become a Cybersecurity Professional


You can build your Cybersecurity or IT Career for FREE !!
Make yourself happy, join our 8.000 members and receive
our latest tutorials and online courses in your mailbox
I'm not interested !