Chapter 6. Other Raspberry Pi Projects

The Raspberry Pi was designed to be a system that can be customized for just about anything within the reach of a low budget OS. There are hundreds of documented use cases and many vendors posting ARM images scaled down to be part of the Raspberry Pi community. This includes creators of other penetration arsenals outside of Offensive Security's Kali Linux.

When evaluating other penetration testing ARM images for the Raspberry Pi, we found that most of the distributions were very similar to each other because they are using the same tools, and in many instances, the same builds. This means the upgrade life cycle and path for most applications will also be the same regardless of the ARM image you choose to go ...

Get Penetration Testing with Raspberry Pi now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.