Tag

Kali Linux

All articles tagged with #kali linux

Kali Linux 2026.1 Unveils 8 New Tools and a BackTrack-Style Undercover Mode
technology16 days ago

Kali Linux 2026.1 Unveils 8 New Tools and a BackTrack-Style Undercover Mode

Kali Linux 2026.1 arrives with 8 new tools (AdaptixC2, Atomic-Operator, Fluxion, GEF, MetasploitMCP, SSTImap, WPProbe, XSStrike), 25 new packages, 183 updates, and kernel 6.18, plus an annual theme refresh and a BackTrack-style Kali-Undercover mode. NetHunter gains HID permission checks and bug fixes. Upgrade existing installs or download fresh; WSL 2 is recommended for Windows users.

Kali Linux 2025.2 Launches with 13 New Tools and Car Hacking Enhancements
technology9 months ago

Kali Linux 2025.2 Launches with 13 New Tools and Car Hacking Enhancements

Kali Linux 2025.2 has been released, featuring 13 new tools including an expanded car hacking toolkit renamed CARsenal, a refreshed user interface aligned with the MITRE ATT&CK framework, updates to Kali NetHunter, and support for new hardware like the TicWatch Pro 3 smartwatch. The release also includes updates to GNOME and KDE desktops, 23 new testing tools, and improved support for wireless injection and de-authentication. Users can upgrade existing installations or download new ISO images to access these enhancements.

"Efficient Penetration Testing: Harnessing Kali Linux in a Docker Container"
technology2 years ago

"Efficient Penetration Testing: Harnessing Kali Linux in a Docker Container"

Businesses can run penetration testing using Kali Linux as a Docker container, eliminating the need for a full operating system installation. By deploying Kali Linux as a Docker container, security staff or administrators can easily access a headless container and utilize the wide range of pen-testing tools available. The process involves installing Docker, pulling the Kali Linux image, deploying the container, and installing the necessary pen-testing tools. The resulting container can be saved and reused for future testing, making it a flexible and efficient method for conducting penetration testing.