
Kali Linux | Penetration Testing and Ethical Hacking Linux …
Kali Linux is an open-source, Debian-based Linux distribution geared towards various information security tasks, such as Penetration Testing, Security Research, Computer Forensics and …
Kali Tools | Kali Linux Tools
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Get Kali | Kali Linux
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Kali NetHunter | Kali Linux Documentation
Install the Hacker Keyboard from the NetHunter Store using the NetHunter Store app. Install any other apps from the NetHunter Store as required. Configure Kali Services, such as SSH. Set …
USB | Kali Linux Documentation
Portable Kali on a USB drive/key/stick Portable Kali on a USB drive/key/stick Making a Kali Bootable USB Drive (Linux) Making a Kali Bootable USB Drive (macOS/OS X) Making a Kali …
Kali Docs | Kali Linux Documentation
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
fern-wifi-cracker | Kali Linux Tools
Dec 9, 2025 · This package contains a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program …
bruteforce-wallet | Kali Linux Tools
Dec 9, 2025 · bruteforce-wallet Try to find the password of an encrypted wallet file bruteforce-wallet try to find the password of an encrypted Peercoin (or Bitcoin, Litecoin, etc…) wallet file. …
kismet - Kali Linux Tools
Dec 9, 2025 · Kismet works with Wi-Fi interfaces, Bluetooth interfaces, some SDR (software defined radio) hardware like the RTLSDR, and other specialized capture hardware. This …
medusa | Kali Linux Tools
Dec 9, 2025 · medusa Fast, parallel, modular, login brute-forcer for network services Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support …