Desktop & Laptop

Your Journey Starts Here






“Whether you’re new to the fight, or a seasoned pro, don’t stop training…”

This statement, like the video that introduced it, has real punch. We did this on purpose to get you fired up, excited about your training, ...
Cybersecurity

Kali on the Windows Subsystem for Linux

Update : This post is outdated. For a better way of getting Kali Linux on Windows 10, install Kali Linux from the App store.
We’re always on the prowl for novel environments to run Kali on, and with the introduction of the Windows Subsystem for L...
Cybersecurity

Kali Linux 2017.3 Release

We are pleased to announce the immediate availability of Kali Linux 2017.3, which includes all patches, fixes, updates, and improvements since our last release. In this release, the kernel has been updated to 4.13.10 and it includes some notable improv...
Cybersecurity

Kali on KRACK

WPA2 Key Reinstallation AttaCK or KRACK attack
Recently, Mathy Vanhoef of imec-DistriNet, KU Leuven, discovered a serious weakness in WPA2 known as the Key Reinstallation AttaCK (or KRACK) attack. Their overview, Key Reinstallation Attacks: Breaking WP...
Cybersecurity

Advanced Package Management in Kali Linux

The Advanced Package Tool (APT) is how programs, libraries, documentation, and even the kernel itself are installed and managed on Kali and other Debian-based derivatives. APT often works so well that many users don’t pay any particular attention...
Cybersecurity

Kali Linux 2017.2 Release

We are happy to announce the release of Kali Linux 2017.2, available now for your downloading pleasure. This release is a roll-up of all updates and fixes since our 2017.1 release in April. In tangible terms, if you were to install Kali from your 2017....
Cybersecurity

VMware Fusion Kali USB Boot

VMware Fusion Kali USB Boot
One of the fun, and often necessary, features of Kali Linux is the ability to create really killer, completely customized live-boot installations. Normally stored on a USB drive, these installations put the power of Kali Lin...
Cybersecurity

Kali Linux 2017.1 Release

Finally, it’s here! We’re happy to announce the availability of the Kali Linux 2017.1 rolling release, which brings with it a bunch of exciting updates and features. As with all new releases, you have the common denominator of updated packa...
Cybersecurity

Kali Linux Repository HTTPS Support

A couple of weeks back we added more HTTPS support to our Kali infrastructure, and wanted to give our users some guidance and point out what’s new. While our Kali Linux download page (and shasums) has always been served via HTTPS, our mirror redi...
Cybersecurity

Cracking in the Cloud with CUDA GPUs

Due to increasing popularity of cloud-based instances for password cracking, we decided to focus our efforts into streamlining Kali’s approach. We’ve noticed that Amazon’s AWS P2-Series and Microsoft’s Azure NC-Series are focuse...
Cybersecurity

The Kali Linux Certified Professional

Introducing the KLCP Certification
After almost two years in the making, it is with great pride that we announce today our new Kali Linux Professional certification - the first and only official certification program that validates one’s proficie...
Cybersecurity

Kali Linux in the AWS cloud, again

We’re happy to announce that we’ve once again listed our Kali Linux images on the Amazon AWS marketplace. You can now spin up an updated Kali machine easily through your EC2 panel. Our current image is a “full” image, which cont...
Cybersecurity

Azure Marketplace, Weekly ISO Builds

Kali Linux in the Azure Marketplace
Over the past couple of weeks we’ve been working on building and implementing Kali 2016.2 in the Azure Marketplace. We’re happy to announce that from today on, you can spin up a Kali machine from the Azur...
Cybersecurity

Kali Linux 2016.2 Release

We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re launching our second Kali Rolling ISO release aka Kali 2016.2. This release brings a whole bunch of interesting news and updates into the world of ...
Cybersecurity

Hacking with Kali at Black Hat USA 2016

Kali Linux Dojo, BlackHat 2016 - Las Vegas
We have really enjoyed doing the Dojo at Black Hat the last few years. It’s been a great opportunity to show off some of the lesser known (but oh so useful) features of Kali Linux as well as interact wit...
Cybersecurity

Kali Linux Dojo at Black Hat Vegas 2016

The folks at Black Hat have been kind enough to invite us once again to deliver a Kali Dojo in Las Vegas this year. The event will be held on the 4th of August at the Mandalay Bay hotel, and will be open to all Black Hat pass types. This year our Dojo ...
Cybersecurity

Kali Moto End of Life & Kali Dojo Slides

Kali Sana Release Aftermath
Kali Linux 2.0 has been out for a couple of months and the response has been great, with well over a million unique downloads of Kali 2.0 as a testament. Release day was somewhat hectic for us, as we did not anticipate the s...
Cybersecurity

Kali Linux 2.0 Release – Sana

Our Next Generation Penetration Testing Platform
We’re still buzzing and recovering from the Black Hat and DEF CON conferences where we finished presenting our new [Kali Linux Dojo](](/docs/development/dojo-mastering-live-build/), which was a bla...
Cybersecurity

Kali Linux 2.0 Release Day Scheduled

We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we’ve been working feverishly on our next generation of Kali Linux and we’re really happy with how it’s looking ...
Cybersecurity

Official Kali Linux Docker Images Released

For the latest information, please see our documentation on Docker
Last week we received an email from a fellow penetration tester, requesting official Kali Linux Docker images that he could use for his work. We bootstrapped a minimal Kali Linux 1.1.0a...
Cybersecurity

OpenVAS 8.0 Vulnerability Scanning

Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner in your security toolkit can often make a real difference by helping you discover overlooked vulnerable items. For this reason, we’ve manu...
Cybersecurity

Kali Linux 1.1.0 Release

After almost two years of public development (and another year behind the scenes), we are proud to announce our first point release of Kali Linux - version 1.1.0. This release brings with it a mix of unprecedented hardware support as well as rock solid...
Cybersecurity

Kali & NetHunter Security Release Fixes

Squash the Bugs with Kali 1.0.9a
Over the past couple of weeks, we’ve seen a bunch of nasty bugs hit the scene, from shellshock to Debian apt vulnerabilities. As we prefer not to ship vulnerable ISOs, we’ve rolled up new images for our Kali...
Cybersecurity

Kali Tools Website Launched, 1.0.9 Release

Now that we have caught our breath after the Black Hat and DEF CON conferences, we have put aside some time to fix an annoying bug in our 1.0.8 ISO releases related to outdated firmware as well as regenerate fresh new ARM and VMware images (courtesy of...
Cybersecurity

Kali Linux 1.0.7 Release

Kernel 3.14, Tool Updates, Package Improvements
Kali Linux 1.0.7 has just been released, complete with a whole bunch of tool updates, a new kernel, and some cool new features. Check out our changelog for a full list of these items. As usual, you don&rs...
Cybersecurity

Kali Linux Metapackages

One of our goals when developing Kali Linux was to provide multiple metapackages that would allow us to easily install subsets of tools based on their particular needs. Until recently, we only had a handful of these meta packages but we have since expa...
Cybersecurity

Kali Linux Amazon EC2 AMI

Kali Linux in the Amazon EC2 Marketplace
EDIT: For updated Kali Rolling images in the Amazon AWS, check this post.
After several weeks of “back and forth” with the Amazon EC2 team, Kali Linux has finally been approved into the Amazon EC2 ma...
Cybersecurity

Passing the Hash with Remote Desktop

Kali Linux contains a large number of very useful tools that are beneficial to information security professionals. One set of such tools belongs to the Pass-the-Hash toolkit, which includes favorites such as pth-winexe among others, already packaged in...
Cybersecurity

Kali Linux 1.0.6 Release

Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more!
It’s been a while since our last minor release which makes 1.0.6 a more significant update than usual. With a new 3.12 kernel, a LUKS nuke feature, new Kali ARM build scripts, a...
Cybersecurity

Emergency Self Destruction of LUKS in Kali

Kali Linux Full Disk Encryption
As penetration testers, we often need to travel with sensitive data stored on our laptops. Of course, we use full disk encryption wherever possible, including our Kali Linux machines, which tend to contain the most sensi...
Cybersecurity