Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

Linux News Today: Parrot Security OS 3.0 Ethical Hacking Distro Is Out, Now Ready for Raspberry Pi

Posted on June 21, 2016

Parrot Security OS developer Frozenbox Network was extremely proud to announce the release of the final Parrot Security OS 3.0 “Lithium” computer operating system.

Parrot Security OS is a cloud-friendly distribution based on the latest Debian GNU/Linux technologies. It has been designed to act as a penetration testing OS that can be used by security professional in various ethical hacking, computer forensic, cloud pentesting, cryptography, reverse engineering, privacy, and anonymity operations.

The latest version, Parrot Security OS 3.0, which the project’s development team dubbed Lithium, ships with up-to-date packages, security patches, and core components from the Debian “Jessie” stable software repositories, but it comes with a huge collection of penetration testing, security auditing, and computer forensic utilities.

Best of all, Parrot Security OS 3.0 “Lithium” offers users no less than six editions, each one featuring more or less ethical hacking tools, or a different desktop environment. For example, the Parrot Security OS 3.0 Libre edition will ship only with GNU/Linux-libre software and corresponding kernel.

Parrot Security OS 3.0 ARM and IoT images out now

Other possible flavors of the Parrot Security OS 3.0 operating system are Cloud Edition, Full Edition, and Lite Edition, as well as Parrot Studio and Parrot LXDE (ships with the LXDE (Lightweight X11 Desktop Environment) desktop). However, the Studio, LXDE, and Libre editions haven’t yet been released.

To our surprise, the Parrot Security OS devs have prepared a bunch of binary images to help you deploy the ethical hacking/penetration testing operating system on various embedded and IoT devices, including the well-known Raspberry Pi. You’ll find 32-bit, 64-bit, and ARMhf generic rootfs images.

Without any further ado, we invite you to download the final Parrot Security OS 3.0 release right now via our website. It ships with a hardened Linux 4.5 kernel, as well as hundreds of tools for tasks like cryptography, vulnerability assessment, system exploitation, information gathering, Web Apps and Database analysis, privacy, password attacks, or maintaining access.

We almost forgot to tell you that the default desktop environment for the Full Edition, which probably anyone will download, is the lightweight and highly customizable MATE. Make sure that you also check out the screenshot gallery below to see Parrot Security OS 3.0 in action. More editions should be available soon from the project’s homepage.

MATE desktop

MATE desktop

Running various pentesting tools

Running various pentesting tools

Via Softpedia

Terbaru

  • Survei Parpol Terbaru: Gerindra Unggul, PDIP Ketiga, PKB 5%
  • PKB Resmi Jalin Kerjasama dengan Institut Teknologi & Sains NU Kalimantan
  • Inilah Urutan Terbaru Pangkat TNI Angkatan Darat! (Update 2026)
  • Inilah Panduan Lengkap Operator Sekolah Mengelola SPTJM e-Ijazah dan Menghindari Kesalahan Fatal Data Kelulusan
  • Inilah Syarat dan Penilaian Seleksi Siswa Unggul ITB Jalur UTBK
  • Download Video Viral Guru Bahasa Inggris? Awas Berisi Virus!
  • PKB Minta Kasus C4bul Pendiri Ponpes Pati Tidak Ada Ampunan & Tuntutan Maksimal
  • Inilah Kronologi Video Viral Preman vs Sopir Di Sumedang
  • Ini Alasan UKP Pariwisata Disindir Konten Kreator Drone Gunung Rinjani
  • Inilah Kronologi Viral Video Dugaan Asusila Pegawai Disdik Pasuruan di Mobil Dinas
  • Polisi Polda Sumut Resmi Dipecat: Dari Video Viral Sampai Sidang Etik Ini Kronologinya
  • ASUS ExpertBook Ultra: Produk Flagship yang Cerminkan Kepemimpinan ASUS di Pasar Global
  • Inilah Tahapan dan Syarat Pendaftaran Beasiswa Garuda 2026 Gelombang II (25 Mei – 25 Juni 2026)
  • Ini Maksud Soal Tugas Guru Non-ASN Berakhir 2027!
  • Apa Itu Siscamling? Inilah Cara Mengaktifkan Paket Anti Spam Telkomsel
  • Sah, Nilai TKA Jadi Salah Satu Komponen Seleksi Siswa SPMB Secara Nasional 2026
  • Inilah 3 Lagi Pinjol Ilegal Menurut OJK Tahun 2026
  • Cara Login Proktor Browser OSN Mode Online, Uji Coba OSN Semua Jenjang Terbaru
  • Inilah Link Web Komunikasi OSN 2026 anbk.kemendikdasmen.go.id/osnk ANBK Kemendikdasmen untuk Simulasi
  • Inilah Jadwal Pembagian Deviden BBRI 2026, Siap-siap!
  • Ini Alasan Kenapa Followers IG Berkurang Sendiri Mei 2026?
  • Panduan Download vhd-osnk-2025_fresh versi 29.25.5.0 untuk Uji Coba OSN-K SMA SMP Sederajat 2026
  • Iniloh Syarat dan Komponen Nilai Seleksi Siswa Unggul ITB Jalur Nilai Rapor 2026/2027
  • Inilah Syarat dan Prosedur Ikut Seleksi Siswa Unggul ITB Jalur Tes Tulis 2026/2027
  • Inilah Kronologi & Latar Belakang Kasus Erin Taulany vs ART Hera: Masalah Facebook Pro?
  • Inilah Alasan Kenapa Ending Film Children of Heaven diubah di Indonesia
  • Ini Alasan Hanny Kristianto Cabut Sertifikat Mualaf Richard Lee
  • Inilah Syarat Dokumen SSU ITB 2024-2026 yang Wajib Kalian Siapkan Supaya Nggak Gagal Seleksi Administrasi
  • Inilah Episyrphus Balteatus, Lalat Unik Penyamar yang Sangat Bermanfaat bagi Taman Kalian
  • Inilah Cara Lolos Seleksi Siswa Unggul ITB Lewat Jalur Tes Tulis Biar Jadi Mahasiswa Ganesha
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Use Anthropic’s New AI Agents to Automate Your Financial Workflows Like a Pro
  • How to Secure Brand Deals Easily Using AI-Powered Professional Pitch Estimates in Just a Few Clicks
  • How to Master Google’s NotebookLM and Its Revolutionary AI Features for Smarter Learning
  • How to Use Claude AI in PowerPoint to Create Amazing Presentations Automatically
  • How to Utilize OpenAI’s Advanced Real-time Voice Models for Interactive Applications
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme