Peppermint OS
Debian-based
eznixOS
Download eznixOS for free. eznixOS - Customize Debian Bullseye. The eznixOS is a respin of Debian GNU/Linux, currently based on the Debian Stable release. The Debian live-build tool is used to build the ISO and the complete build files are located in /usr/share/eznixOS113X1 and /usr/share/eznixOS113K2 for the Xfce and Plasma builds.
SpiralLinux
SpiralLinux is a user-friendly preconfigured Debian system with live installation
DebianDog
Planet Debian
SolydXK
SolydX and SolydK are open source operating systems for small and medium-sized businesses, non-profit organizations and home users.
Devuan GNU+Linux
Free GNU+Linux base OS. Devuan is a fork of Debian without systemd. Devuan Bewoulf provides a safe upgrade path from Debian, to ensure the right to Init Freedom and avoid entanglement.
antiX Linux
MX Linux
SparkyLinux
SparkyLinux is a GNU/Linux distribution created on the top of Debian GNU/Linux operating system.
Sparky is fast, lightweight and fully customizable OS which offers a few versions for different users and different tasks. Read more...
Sparky news:
BadWolf
There is a new application available for Sparkers: BadWolf. What is BadWolf? BadWolf is a minimalist and privacy...
April 7, 2022
Your apps suggestions
Dear Sparkers. As a one-man
Raspbian
Nitrux
Nitrux is a Linux desktop distribution directly based on Debian. It uses the Calamares installer and includes NX Desktop and MauiKit Applications.
Linux Mint
Linux Mint is an elegant, easy to use, up to date and comfortable GNU/Linux desktop distribution.
Kali Linux - Tools
Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. This site aims to list them all and provide a quick reference to these tools. In addition, the versions of the tools can be tracked against their upstream sources. If you...
Kali Linux | Penetration Testing Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.