get-kali page is up

Choose your Platform|

LIGHTDARK

Installer Images

  • Direct access to hardware
  • Customized Kali kernel
  • No overhead

Single or multiple boot Kali, giving you complete control over the hardware access (perfect for in-built Wi-Fi and GPU), enabling the best performance.

Virtual Machines

  • Snapshots functionary
  • Isolated environment
  • Customized Kali kernel
  • Limited direct access to hardware
  • Higher system requirements

VMware & VirtualBox pre-built images. Allowing for a Kali install without altering the host OS with additional features such as snapshots. Vagrant images for quick spin-up also available.

ARM

  • Range of hardware from the leave-behind devices end to high-end modern servers
  • System architecture limits certain packages
  • Not always customized kernel

Works on relatively inexpensive & low powered Single Board Computers (SBCs) as well as modern ARM based laptops, which combine high speed with long battery life.

Mobile

  • Kali layered on Android
  • Kali in your pocket, on the go
  • Mobile interface (compact view)

A mobile penetration testing platform for Android devices, based on Kali Linux. Kali NetHunter consists of an NetHunter App, App Store, Kali Container, and KeX.

Cloud

  • Fast deployment
  • Can leverage provider's resources
  • Provider may become costly
  • Not always customized kernel

Hosting providers which have Kali Linux pre-installed, ready to go, without worrying about infrastructure maintenance.

Containers

  • Low overhead to access Kali toolset
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Using Docker or LXD, allows for extremely quick and easy access to Kali's tool set without the overhead of an isolated virtual machine.

Live Boot

  • Un-altered host system
  • Direct access to hardware
  • Customized Kali kernel
  • Performance decrease when heavy I/O

Quick and easy access to a full Kali install. Your Kali, always with you, without altering the host OS, plus allows you to benefit from hardware access.

WSL

  • Access to the Kali toolset through the WSL framework
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Windows Subsystem for Linux (WSL) is included out of the box with modern Windows. Use Kali (and Win-KeX) without installing additional software.


Build Scripts

Installer Pre-built VMs ARM Mobile Cloud Containers Live WSL

Installer Images

Kali is a rolling Linux distribution, meaning as soon as we have an update, we ship it. Would-be users have a variety of images to choose from. For more information, please see Which Image Should I Download? and Kali Branches. For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.

We generate fresh Kali Linux image files every quarter. These become the official "point" releases. These images are tested and subsequently announced with a blog post.

Installation Documentation

Our previous Kali Linux's releases.


SHA256sum

18a40a9b46a71bf20971457dfd11ebeeadc11fcaec79631b4da2eedaa49ef9fe

Weekly

Untested images with the latest updates

SHA256sum

793061c7367d4c3c89d1e8ebf849ee00386297f5ebaeeaf6d9b37ae9857d2e53

NetInstaller

All packages are downloaded during installation

SHA256sum

b741d808acd02b4e94f434ae1374162bb999dbb6988087eebaa02d2262b3a761

Everything

Image for air-gapped networks

SHA256sum

fc36cb670ca0ef9fa22bd19d0816440b09f10057740e6f9ff524400257e19a04

Weekly

Untested images with the latest updates

SHA256sum

a244a409d3b6334570e622aaa1c15c7283e153214a98e2c819b96e3a57b6d5d2

NetInstaller

All packages are downloaded during installation

SHA256sum

bfd210043ec08dd7fa81b335762cf6a75ac89285543e8b57969c1e00c888f7c7

Weekly

Untested images with the latest updates

SHA256sum

d56a1615e638567dede59cde71a13a957b41fb7902ca553892186a400297ef8b

NetInstaller

All packages are downloaded during installation



Q.) What’s the differences between: Installer? NetInstaller? Everything? Weekly? Live?
Q.) How to download Kali Linux images securely?
Q.) Can I still download the mini image?


Want an Updated or Custom Kali Image?

Feeling a little more adventurous? Want to build the latest version of Kali? Want to customize your ISO by adding more tools or change the default settings? Looking for something other than Xfce, GNOME or KDE like Enlightenment, i3mw, LXDE or MATE? Then this is the option for you.

Read More On Custom Images




Kali Purple

Feeling red? Feeling blue? Kali Purple: You do You!

A movement to make enterprise grade security accessible to everyone.

Kali Purple Documentation

SHA256sum

b482fbc4eae57fcb6e6b111a0544f6ac0f22d1ed38ed3b389a23bac011175e7e

Weekly

Untested images with the latest updates

Pre-built Virtual Machines

Kali Linux VMware & VirtualBox images are available for users who prefer, or whose specific needs require a virtual machine installation.

These images have the default credentials "kali/kali".

Virtual Machines Documentation

SHA256sum

02a868bd5a702dd51df4c50bb59b00ff75135bf2acedfa7450ef7eccacaf063c

VMware Weekly

SHA256sum

7bb5e23fedeef0b30dfee6a27befbc6ee18839b1657267d689ba8e9def944c78

VirtualBox Weekly

SHA256sum

591abfd5e3204172705f0275f26bfbf31b3b6a1c4f79d2485cc9ccbe4404bd61

Hyper-V Weekly

SHA256sum

b4aeb46582aee1c4e29e55a340fe6cff698ed9ae015b3f904cd2972ca7e29128

QEMU Weekly

SHA256sum

f43f3ab3ed661f50b5aa0ed8b9eb72fec48511ac23f783e5bf6dbc10392aa560

VMware

SHA256sum

5a4cb0e28ba6e552050a8eb9c2a722ce7db776ffdadd579b8f83e54589d5603f

VirtualBox

SHA256sum

4a9b6b76d12cc0e854987fc16ad5caec328d4f07d1fea2f998da3c92041bca08

QEMU


Vagrant

Vagrant is a tool for building and managing virtual machine environments. With a single configuration file, you can download a base “box” and apply additional configurations like adding an additional network interface, setting the number of CPU cores and memory, or running a script on first boot.

Kali-Vagrant Boxes

Want an Updated or Custom Kali Image?

Feeling a little more adventurous? Want to build the latest version of Kali? Want to customize your VM by selecting a different desktop environment, add more tools, change the default settings? Then this is the option for you.

Kali-VM Build Script

ARM

Are you looking for Kali Linux ARM images? We have generated flavours of Kali using the same build infrastructure as the official Kali releases for ARM architecture.

These images have a default credentials of "kali/kali".


Kali-ARM Documentation

raspberrypi

SHA256sum

92a01aac99b721b61264f7a774286a0fd3e729af705f3bf05ee0272fcae3ffd3

Raspberry Pi 2 (v1.2), 3, 4 and 400 (64-bit)

SHA256sum

93dedd7944ac3b080f7c83245f118f02aec4f136f38a387dca50d44c3bcbefc4

Raspberry Pi 5 (64-bit)

SHA256sum

5a57ff64c76194508448911b8134e3a5f4420f7202160eb9ff96c61c6b404c7c

Raspberry Pi 1 (Original)

SHA256sum

25baaa97338c463af1d4f063503d25f7cc7f4586e701f495d8e4d289eb9010e3

Raspberry Pi Zero 2 W (Pi-Tail)

SHA256sum

1ed009f3f73387710ffd160f10cbe36cd74897ce0a71bd008d360b6a49372487

Raspberry Pi Zero W (Pi-Tail)

pine64

SHA256sum

529493dba73e0807e33062552cf8c73fb139113e5057f42aea2225063f51305f

Pinebook

SHA256sum

c13e275e007bc36f10b6a1de54b36f760cf273238e5783752100ea144bde2665

Pinebook Pro

gateworks

SHA256sum

14211abd5f7f69f2ff84365952623050ddeea92d54ca69980a5812d2e55bf48d

Gateworks Newport

withsecure

SHA256sum

d08cb3f8a7aa0b5c7d1a2fada19fcd5d1c32905b2eb1971303e536504e8362e0

USBArmory MKII



I.) SHA256SUMS are for the compressed file (*.img.xz)

NetHunter Pro



Kali NetHunter Pro is the official Kali Linux build for mobile devices such as the Pine64 PinePhone and PinePhone Pro.

Installation:

  1. Install Tow-Boot bootloader on your device
  2. Write the image to your MicroSD card, e.g.
    sudo dd if=IMAGE.img of=/dev/[DEVICE] bs=1M status=progress conv=fsync
  3. Insert the MicroSD card into your device
  4. Boot your device from MicroSD card (hold Volume down key until the LED turns blue)
  5. Login with user "kali" and password "1234"

Kali NetHunter Pro Documentation

AMD64

SHA256sum

eb7b374002b6fa90cb1159c63ab46d9658c4dba9286397370a0df1ab13872294

Kali NetHunterPro image with Phosh for AMD64

PinePhone

SHA256sum

b78c1f8d8c566fc08560de766542739ad91bcdb85fedb5e92be9cef41ab4cbcd

Kali NetHunterPro image with Phosh for PinePhone

PinePhonePro

SHA256sum

2e3a11325a03e0ac22d2469db8f4431cba2480bf0583dd0d5f16b6a6bfedbbc7

Kali NetHunterPro image with Phosh for PinePhone Pro

SDM845

SHA256sum

ced1e119f92d508cf3fafd3c1272f70faae743c6caf6d6edd56f25dc68d71660

Kali NetHunterPro image with Phosh for Qualcomm SDM845

SM7225

SHA256sum

91cab1fbe7427e553ce2b1ad01116ba0659d3be9beaa74aa70920182969819f5

Kali NetHunterPro image with Phosh for Qualcomm SM7225






NetHunter

The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the Kali toolset from various supported Android devices. There are multiple unique features not possible on other hardware platforms.

The Kali NetHunter interface allows you to easily work with complex configuration files through a local web interface. This feature, together with a custom kernel that supports 802.11 wireless injection and preconfigured connect back VPN services, make the Kali NetHunter a formidable network security tool or discrete drop box - with Kali Linux at the tip of your fingers wherever you are!

Statistics

Want to see Kali NetHunter progress? Look at the stats page, to see if your device is supported yet.

Kali NetHunter provides:

    • A dedicated NetHunter App, providing a touch screen optimized GUI for common attack categories, such as:
    • One-click MANA Evil Access Point setups.
    • USB HID Keyboard attacks, much like the Teensy device is able to do.
    • BadUSB MITM attacks. Plug in your Kali NetHunter to a victim PC, and have your traffic relayed though it.
    • Bluetooth attacks.

  • Full Kali Linux toolset, with many tools available via a simple menu system.
  • Command line interface to the Kali Linux container.
  • Kali desktop EXperience (KeX)
  • Custom, device specific kernel with wireless injection support.
  • HDMI output of Kali desktop to external display for supported devices.
  • USB Y-cable with the Kali NetHunter kernel - use your OTG cable while still charging your device!
  • Software Defined Radio support (SDR). Use Kali NetHunter with your HackRF to explore the wireless radio space.
  • NetHunter app store allowing you to grow the potential of Kali NetHunter.

Kali NetHunter Documentation

NetHunter Lite

SHA256sum

d20f57264a952d7305437f760db8d189507993494ad0fe3e0aabd83a03740e2b

NetHunter Lite ARM64 (Full)

SHA256sum

6408c95a77f5241b5e4820b43b7e06ebf766bf954ffc29dec33ca050b2af9baf

NetHunter Lite ARM64 (Minimal)

SHA256sum

84275f3aa9bc6d2677714f7e6776c185984acf236b3d88f0ffd2422e24a8f809

NetHunter Lite ARMhf (Full)

SHA256sum

d1f9460c74767dd0534dfa9e7659e911cff3290071558743263cdbc7922d37a6

NetHunter Lite ARMhf (Minimal)

Nexus

SHA256sum

b2235ac21d774c01c3a52bcad15da411d7ac9c0cff41d77c53a196e4039c7579

Nexus 6P (Oreo)

SHA256sum

2dc19ad70b718692337a4ce7a13e0950a9e661959ee34426feaec00389645f6d

Nexus 6P (LineageOS 17.1)

SHA256sum

081d385737a816208402d71918343250b2adc0c5741993d7717fb4b3cf66396f

Nexus 5X (Oreo)

SHA256sum

773872b39bd3fe469376b7928d6a0d8349fc8fcb431ae929244270158525b745

Nexus 9 (Nougat)

SHA256sum

d9d5677d96cbd231a753b50b6207205169c22b44f335b8064b9dde541294902e

Nexus 5 (Nougat)

SHA256sum

c8bd32e7a49352b8cdfdca1ef35c7ab7ef06ba0016baacf0b0da331cf3f6b2f8

Nexus 6 (LineageOS 16.0)

Xiaomi

SHA256sum

35f63408f7c9b1d9d81d8a5bda1219e444c985d74583f61069d081c544346505

Xiaomi Pocophone F1 (Eleven)

SHA256sum

8b4b56458cf8e16a6df126fe3cf3129a0667ef150c968e76f4bb2cf01074e0b2

Xiaomi Mi 9T MIUI 11 (Ten)

SHA256sum

a6b46d17dcea87383eea14494159d6bf06ac77df2974b2aea867a60feb169f58

Xiaomi Mi A3 (LineageOS 18.1, 19.1, 20)

Nokia

SHA256sum

361b102bd3919cec06517db83e52498f4755eeb8a8d0ce11da8a2550a5d32ebb

Nokia 6.1 Plus (LineageOS 20)

SHA256sum

0546d7d0a9f1983c3a7a52e83caced5cb5e93dd443e14eff5a76bf1f9050ee58

Nokia 3.1 (Pie)

SHA256sum

b0b7cf0ebe2898e192a9398f254d6cb15a015fbaec9d45cad1e26f77b8847a69

Nokia 6.1 (LineageOS 20)

Gemini

SHA256sum

1bf11a64e23be684ac406daf673e1b5e4888138d56cf6f268936c821d98208d7

Gemini PDA (Nougat)

Samsung

SHA256sum

6c2bde1c3607e6b3e02908878c470a0291ff33b92093a871e498bc44c20dd6f8

Samsung Galaxy Tab S4 LTE (Oreo)

SHA256sum

8a55e99011c46100b9792224646f774496cb250f366687561b09a8e678f299c6

Samsung Galaxy Tab S4 WiFi (Oreo)

SHA256sum

5c61f90b354cf579540ea649db98dda10025f111555ab3c745d01016dff45e5b

Samsung Galaxy S6 Edge (Nougat)

LG

SHA256sum

d18126353b3be0c09ee1334065342bbce597951bf955f5ae0612176e7750bc1a

LG V20 International (LineageOS 19.1)

Sony

SHA256sum

69bf5486cfa0848458ea19e30792cb6bc671e7250bb9b4d5ae371b34d02c316d

Sony Xperia Z1 (Pie)

OnePlus

SHA256sum

d074cd9178c0dd2c44ee710c03b991dc99f1c837101bc8a91aa01efaf06926b1

OnePlus One (LineageOS 18.1)

SHA256sum

30dc2d989fee3acb582e9fcabf48daa47f0690d8fcc9290afa8bf52eff0969fa

OnePlus 2 (LineageOS 16.0)

SHA256sum

9d185e90e6e29ab0e471e668bb5b45d4c1e87ed7ca81d992a698d0d491d1ab6f

OnePlus 3 / 3T (Ten)

SHA256sum

4ea26a2d3d43481722d95219a50ab58f2c1c303d93844cf142f8378ac199759b

OnePlus 6 / 6T (OxygenOS Twelve)

SHA256sum

48f577e0924d78180f2155206e1e793ce9e0415040b42935790432a44a149ca2

OnePlus 7 / 7 Pro / 7T / 7T Pro (Eleven)

SHA256sum

eb03c68006273a29f28eb58ed88547085cced8deb3f7823b05a6aaa12ec604db

OnePlus 7 / 7 Pro / 7T / 7T Pro (OxygenOS/Custom A11)

SHA256sum

12531405820bef374e5a7e6e62b45458f13f4ba88cfb308c1e278eba7468b934

OnePlus 8 / 8T / 8 Pro (Twelve)

SHA256sum

15624e4175610e090a102308f7c72f27a9477cb027469b98dcdb503b01fc3cf8

OnePlus Nord AC2003 (Eleven)

Realme

SHA256sum

be0906b40da81350bf80f2bd797cde186c755569357fabd629d1e71e4a77d26b

Realme C15 (ten)

TicWatch

SHA256sum

c6490eac1ffaae855b174e2d1d01619d1b9ae48b4d167a371e66ce4449786077

TicWatch Pro / Pro 4G/LTE / Pro 2020 (Wear OS)

SHA256sum

03d8c0b2276c6192753207a89ed93df774c3a6da49a376f8e5a0b1a6dc308344

TicWatch Pro 3 GPS / Pro 3 LTE / Pro 3 Ultra GPS / Pro 3 Ultra LTE

Cloud

Kali Cloud images can quickly be deployed in multiple different cloud provider’s infrastructures. This allows easy access to a Kali install in a modern environment with strong hardware resources. These are often used for short term Kali installs that are quick to deploy and quick to tear down.


Kali-Cloud Documentation

Containers

Using Container technology such as Docker and LXC/LXD, our Kali containers allow you access to the Kali toolset on your host operating system without the overhead of running an additional full operating system. This does come with limitations, as you won’t have direct hardware access and dealing with inbound connections to tools running in the Kali container can be complicated.


Kali-Containers Documentation

Live Boot

A Kali Linux Live image on a CD/DVD/USB/PXE can allow you to have access to a full bare metal Kali install without needing to alter an already-installed operating system. This allows for quick easy access to the Kali toolset with all the advantages of a bare metal install. There are some drawbacks, as disk operations may slow due to the utilized storage media.

For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.


Kali-USB Documentation

SHA256sum

cf0a187d761b526570174513caae4740fe74aeb01d3b91e761dd1e6e00b5b8e9

Weekly Image

Untested images with the latest updates

SHA256sum

6eabfd96c7677b241ea561503411dcadff47ac8d7fe71c5337434f99bb9940a0

Everything

Image for air-gapped networks

SHA256sum

d4f5bf82664f4cee0d2198bdfdb565d368a05826be54202623be1cf347cecf85

Weekly Image

Untested images with the latest updates

SHA256sum

2d4feacb8056ec7027aa3d5c2d5b83a6d2140b85f64c58ceed233dfa20af6de8

Weekly Image

Untested images with the latest updates

WSL

Windows Subsystem for Linux (WSL) is a software package on modern Windows installs that allow you to run Linux alongside your Windows system in an optimized container. The Kali WSL package allows easy access to the Kali toolset. This comes with the same drawbacks of a standard VM, but allows for less overhead and tighter integration with your Windows systems.

WSL Documentation

Microsoft Store

Build Scripts

Experienced penetration testers and security professionals use and trust Kali Linux because we provide full transparency into the build scripts. Feel free to read, investigate, and change build scripts for any images below.


Build Scripts Repository