The Industry Standard

Kali Linux is not about its tools, nor the operating system. Kali Linux is a platform.

Generic laptop PC Kali Linux desktop

澳洲5开奖直播 All the tools you need

The Kali Linux penetration testing platform contains a vast array of tools and utilities. From information gathering to final reporting, Kali Linux enables security and IT professionals to assess the security of their systems.

Find out all about Kali's Tools

Kali Everywhere

Undercover Mode

Using Kali in an environment where you don't want to draw attention to yourself? Kali Undercover is the perfect way to not stand out in a crowd.

Kali NetHunter

A mobile penetration testing platform for Android devices, based on Kali Linux. Kali NetHunter is made up of an App, App Store, Kali Container and KeX

Win-KeX

Win-KeX provides a full Kali Desktop Experience for Windows WSL. Applications started via Kali's panel will share the desktop with Microsoft Windows applications.

Choose the desktop you prefer

Xfce logoXfce

Xfce is a lightweight desktop environment for UNIX-like operating systems. It aims to be fast and low on system resources, while still being visually appealing and user friendly.

Xfce consists of separately packaged parts that together provide all functions of the desktop environment, but can be selected in subsets to suit user needs and preferences. This is Kali's default desktop environment.

Kali Linux with Xfce desktop
Kali Linux with GNOME desktop

GNOME logoGNOME Shell

Every part of GNOME Shell has been designed to make it simple and easy to use. The Activities Overview is an easy way to access all your basic tasks. A press of a button is all it takes to view your open windows, launch applications, or check if you have new messages. Having everything in one place is convenient and means that you don't have to learn your way through a maze of different technologies.

KDE logoKDE Plasma

Plasma is made to stay out of the way as it helps you get things done. But under its light and intuitive surface, it's a powerhouse. So you're free to choose ways of usage right as you need them and when you need them.

With Plasma the user is king. Not happy with the color scheme? Change it! Want to have your panel on the left edge of the screen? Move it! Don't like the font? Use a different one! Download custom widgets in one click and add them to your desktop or panel.

Kali Linux with KDE Plasma desktop

Latest news from our blog

Kali Linux 2024.3 Release (Multiple transitions)

With summer coming to an end, so are package migrations, and Kali 2024.3 can now be released. You can now start downloading or upgrading if you have an existing Kali installation. The summary of the changelog since the 2024.2 release from June is: Qualcomm NetHunter Pro Devices - Qualcomm Snapdragon SDM845 SoC now supported New Tools - 11x new tools in your arsenal Our focus has been on a lot of behind the scenes updates and optimizations since the last release.

Kali Linux 2024.2 Release (t64, GNOME 46 & Community Packages)

A little later than usual, but Kali 2024.2 is here! The delay has been due to changes under the hood to make this happen, which is where a lot of focus has been. The community has helped out a huge amount, and this time they’ve not only been adding new packages, but updating and fixing bugs too!

xz-utils backdoor: how to get started

Following the recent disclosure of a backdoor in upstream xz/liblzma, we are writing this “get started” kind of blog post. We will explain how to setup an environment with the backdoored version of liblzma, and then the first commands to run to validate that the backdoor is installed. All in all, it should just take a few minutes, and there’s no learning curve, it’s all very simple.

All about the xz-utils backdoor

As of 5:00 pm ET on March 29, 2024 the following information is accurate. Should there be updates to this situation, they will be edited onto this blog post. The xz-utils package, starting from versions 5.6.0 to 5.6.1, was found to contain a backdoor (CVE-2024-3094). This backdoor could potentially allow a malicious actor to compromise sshd authentication, granting unauthorized access to the entire system remotely.

友情链接:百度一下 2023澳洲幸运5开奖官网 澳洲5官网开奖结果体彩 澳洲幸运5开奖结果号码查询 官方开奖结果最新版 下载历史记录 幸运飞行艇官网开奖结果查询 飞艇168官方开奖结果记录 最新历史记录 幸运飞行艇最新开奖记录查询结果 幸运飞飞官方网站 168澳洲幸运5历史查询开奖记录 幸运澳洲5官方连线直播开实时开奖号码 澳洲幸运10开奖官网开奖记录手机版 官网查询历史开奖记录 幸运飞艇168体彩开奖官网 幸运飞行艇最新开奖结果 幸运飞行艇官方开奖历史记录 幸运168飞艇开奖记录官网直播 幸运体彩飞艇168开奖官网直播 幸运飞行艇168官方开奖历史记录查询 168幸运飞行艇官方开奖查询结果 幸运飞飞艇168体彩网2023 直播开奖视频 2024幸运飞行艇开奖图 官方号码历史结果查询 幸运飞行艇官方开奖历史记录 168开奖官网历史记录查询 168开奖官方网站 幸运168飞艇开奖结果查询 飞艇168幸运号码查询结果网