I present to you ArchStrike the successor of ArchAssault

ArchStrike is the new name for the old ArchAssault, a distribution based on ArchLinux but modified for penetration and security

ArchStrike is the new name for the old ArchAssault, a distribution based on ArchLinux but modified for penetration and security

The famous operating system of ethical hacking ArchAssault It has undergone a facelift, since from now on it will be known as ArchStrike.

ArchStrike is a modified version of the Arch Linux operating system, a distribution that has been modified to include penetration and security tools, in order to verify the security of networks and computer equipment and carry out ethical hacking.

The ArchStrike operating system featuredto offer more than 1400 penetration and security tools, among which we have some very famous like aircrack-ng, dumpzilla or nmap among many others. You have the list of all the tools offered by clicking this link.

Under this new name, ArchStrike promises to be even better than ArchAssault was, offering among other things more security, since this distribution is also intended to fight against people who threaten internet anonymity and freedom of expression, something that groups like Anonymous do.

With this distribution you will be able to do everything, from checking if your Wi-Fi key is secure, to checking if your web server is well protected against attacks, going through other functions such as browsing anonymously through the Internet.

This distribution competes directly with Kali Linux, which today is the reigning distribution on the subject of penetration and security (as was its predecessor Backtrack). Can ArchStrike take the crown from Kali Linux as the king of Linux security?

In order to use ArchStrike, You must have ArchLinux installed and add the tools that I have told you about in the link abovea, being able to install only the packages that you really need. If you don't know Arch Linux, read this article to know a little more about this operating system and to download and install it on your computer.

The content of the article adheres to our principles of editorial ethics. To report an error click here.

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *



  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.