Today morning I have got surprise email from BackTrack team asking for consent to include our tools on BackTrack.They have also expressed interest to include some of our upcoming Linux versions such as FireMasterLinux.  All these will be part of BackTrack repository and will be shipped in the next major release of BackTrack.

BackTrack is most popular and loved Linux security distribution around the world. BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. It is intended for all audiences from the most savvy security professionals to early newcomers to the information security field. BackTrack promotes a quick and easy way to find and update the largest database of security tools collection to-date.

Update [30th July 2010]:

Today I have received email from BackTrack team confirming that they have already added all of the password recovery tools from SecurityXploded to their repository.  Here are the list of password recovery tools which are added to the repository under package name ‘windows-password-recovery-tools’

  • ChromePasswordDecryptor
  • Firemaster
  • FirePassword
  • FirePasswordViewer
  • GooglePasswordDecryptor
  • IEPasswordDecryptor
  • OperaPasswordDecryptor
  • OutlookPasswordDecryptor
  • ThunderbirdPasswordDecryptor
  • NetworkPasswordDecryptor

Update [6th Aug 2010]:

I have just received information from BackTrack team that all the password recovery tools have now been put into BackTrack 4 R1 Release.

All existing users of BackTrack can now access all of these password recovery tools from SecurityXploded directly from the BackTrack repository.  All of these tools will be integrated into next major release of BackTrack.  Great thanks to the BackTrack team for making this happen, its great moment for us.

It is great privilege for us to have our tools on BackTrack and for our users its great to have their favorite tools at one place where ever they go on the earth.

.