๐ŸŒ
Kali Linux
kali.org
Kali Linux | Penetration Testing and Ethical Hacking Linux Distribution
We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not relying on any 3rd party services/SaaS. 10 March 2026 ยท This post will focus on an alternative method of using Kali Linux, moving beyond direct terminal command execution.
Kali Docs
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Kali Tools
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Get Kali
Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
Downloading Kali Linux
IMPORTANT! Never download Kali Linux images from anywhere other than the official sources. Always be sure to verify the SHA256 checksums of the file youโ€™ve downloaded against our official values. It would be easy for a malicious entity to modify a Kali installation to contain exploits or ...
Debian-derived Linux distribution
VirtualBox_Kali_Linux_29_03_2022_11_10_35.png
Kali Linux desktop
Kali Linux with GNOME desktop
Kali Linux is a Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security. The software is based on the testing branch of the Debian โ€ฆ Wikipedia
Factsheet
OS family Linux (Unix-like)
Working state Active
Factsheet
OS family Linux (Unix-like)
Working state Active
๐ŸŒ
GitHub
github.com โ€บ Elinpf โ€บ OSCP-survival-guide
GitHub - Elinpf/OSCP-survival-guide: Kali Linux Offensive Security Certified Professional Survival Exam Guide ยท GitHub
Precompiled Linux Kernel Exploits - Super handy if GCC is not installed on the target machine! ... Find and display the proof.txt or flag.txt - LOOT! ... Metasploit Meterpreter Privilege Escalation Guide https://www.offensive-security.com/metasploit-unleashed/privilege-escalation/ Try the obvious - Maybe the user is SYSTEM or is already part of the Administrator group: ... Try the getsystem command using meterpreter - rarely works but is worth a try.
Starred by 312 users
Forked by 129 users
๐ŸŒ
GitHub
github.com โ€บ Shiva108 โ€บ CTF-notes โ€บ blob โ€บ master โ€บ Kali Linux Offensive Security Certified Professional Playbook.html
CTF-notes/Kali Linux Offensive Security Certified Professional Playbook.html at master ยท Shiva108/CTF-notes
Windows Run As - Switching users in linux is trival with the SU command. However, an equivalent command does not exist in Windows. Here are 3 ways to run a command as a different user in Windows. ... Sysinternals psexec is a handy tool for running a command on a remote or local server as a specific user, given you have thier username and password. The following example creates a reverse shell from a windows server to our Kali box using netcat for Windows and Psexec (on a 64 bit system).
Author ย  Shiva108
๐ŸŒ
Boise State University
scholarworks.boisestate.edu โ€บ mds495_proj โ€บ 281
"Offensive Security Techniques Using Kali Linux" by Kurtis Brent Kenady
It includes complete instructions for getting started in offensive security and includes other valuable cybersecurity information, such as secure coding practices and Security+ certification insights. It shows complete instructions for start-to-finish of downloading the necessary operating system for performing attacks, Kali Linux...
๐ŸŒ
Anarcho-Copy
edu.anarcho-copy.org โ€บ Against Security - Self Security โ€บ Offensive Security - Pentesting with Kali (PWK).pdf pdf
Penetration Testing with Kali Linux
edu.anarcho-copy.org | Open Directory Data Archive - about - archive ยท We support the free software ยท EDU of anarcho-copy.org <edu-anarchocopy{at}riseup{dot}net> subscribe newsletter
๐ŸŒ
OffSec
offsec.com โ€บ home โ€บ kali linux
Kali Linux | OffSec
Tristram shows you how to host a PHP web page on Kali Linux and how you can use it to stage payloads that are hidden behind a wall of conditional access requirements.
๐ŸŒ
OffSec
offsec.com โ€บ app โ€บ uploads โ€บ 2023 โ€บ 03 โ€บ PEN-200-Module-General-Course-Info.pdf pdf
Penetration Testing with Kali Linux
SSH command with a couple of extra options as follows: ssh -o "UserKnownHostsFile=/dev/null" -o "StrictHostKeyChecking=no" ... Module Exercises are currently supported on the x86-64 Kali Linux version exclusively.
Find elsewhere
๐ŸŒ
Securedebug
securedebug.com โ€บ kali-linux-tool
Mastering Kali Linux Tools: An Ultra-Extensive Guide to Offensive Security - Secure Debug: Cyber Security Services
February 17, 2025 - Unlike typical Linux distros, Kali is optimized for security tasks: it includes custom kernels with packet injection patches, specialized repos for up-to-date hacking tools, and convenient scripts for automation.
๐ŸŒ
Kali Linux
kali.org โ€บ docs โ€บ introduction โ€บ press-release
Kali Press Release | Kali Linux Documentation
July 17, 2025 - โ€œWhen it comes to security, the best defense is offense; you need to test the effectiveness of your own security practices before a real intruder does it for you,โ€ said HD Moore, Chief Architect for Metasploit at Rapid7. โ€œWe built Metasploit to level the playing field for defenders; arming them with the same tools the attackers have. OffSec takes this even further, bringing hundreds of such tools together in Kali Linux to streamline security auditing.โ€ Additionally, Kali Linux can now run on a wide variety of hardware and is compatible with numerous wireless and USB devices.
๐ŸŒ
LinuxVox
linuxvox.com โ€บ blog โ€บ offensive-security-kali-linux
Offensive Security with Kali Linux: A Comprehensive Guide โ€” linuxvox.com
Let's take Nmap as an example to demonstrate how to use a tool in Kali Linux. Nmap is used for network discovery and security auditing. # Scan a single host nmap 192.168.1.100 # Scan a range of IP addresses nmap 192.168.1.100 - 110 # Scan for open ports on a host nmap -p 1 - 1000 192.168.1.100 ยท Reconnaissance is the first phase of an offensive security assessment.
๐ŸŒ
Stackify
stackify.com โ€บ 15-essential-kali-linux-commands-ethical-hackers-need-to-know
15 Essential Kali Linux Commands Ethical Hackers Need to Know - Stackify
October 2, 2024 - Once youโ€™re comfortable with the basics, itโ€™s time to explore some advanced Kali Linux commands essential for ethical hacking and penetration testing. nmap, short for Network Mapper, is a powerful tool for network discovery and security auditing and is often the first tool used in the information-gathering phase of a penetration test.
๐ŸŒ
Medium
medium.com โ€บ @offensive-hacker โ€บ getting-comfortable-w-kali-linux-d62c84608501
Getting Comfortable w/ Kali Linux | by Offensive Hacker | Medium
September 19, 2024 - You can access the root user by using the sudo command (e.g., sudo whoami) followed by the desired command, or by switching to the root user with sudo -i or sudo su and entering the root password.
๐ŸŒ
OffSec Support
help.offsec.com โ€บ hc โ€บ en-us โ€บ articles โ€บ 360049796792-Kali-Linux-Virtual-Machine
Kali Linux Virtual Machine โ€“ OffSec Support Portal
To compute the SHA256 checksum of the file, open the Terminal application, change to the directory that contains the downloaded archive and run the shasum -a 256 command as follows: Note: The following is an example and does not reflect the current version of Kali or the SHA hash ยท alice@macbook-pro ~ % shasum -a 256 Downloads/kali-linux-202x.x-vmware-amd64.7z
๐ŸŒ
Cyber Press
cyberpress.org โ€บ home โ€บ kali linux integrates claude ai via model context protocol to enhance offensive security
Kali Linux Integrates Claude AI via Model Context Protocol to Enhance Offensive Security
2 weeks ago - The architecture uses three components: ... LLM. Kali must run SSH for secure access, with sudo apt install -y openssh-server and systemctl enable --now ssh if not pre-configured....
๐ŸŒ
Amazon
amazon.com โ€บ Offensive-Security-Linux-Complete-Guide โ€บ dp โ€บ 0655945644
Offensive Security Kali Linux A Complete Guide - 2020 Edition: Gerardus Blokdyk: 9780655945642: Amazon.com: Books
Featuring 946 new and updated case-based questions, organized into seven core areas of process design, this Self-Assessment will help you identify areas in which Offensive Security Kali Linux improvements can be made. In using the questions you will be better able to: - diagnose Offensive Security Kali Linux projects, initiatives, organizations, businesses and processes using accepted diagnostic standards and practices
๐ŸŒ
Boise State University
scholarworks.boisestate.edu โ€บ cgi โ€บ viewcontent.cgi pdf
Boise State University Boise State University ScholarWorks ScholarWorks
Kali Linux offensive security tools and defensive tools, like Wireshark packet analyzer, a ยท references list for researchers, steps for a variety of modern attack types. In addition, is a ยท copy/paste command-line hacking solution with downloadable tool links (Byte).
๐ŸŒ
OffSec
offsec.com โ€บ courses โ€บ pen-103
Get your KLCP certification with PEN-103 | OffSec
โ€‹โ€‹Learn basic Linux usage for beginners, Debian package management and usage, Kali installation, configuration, security, and advanced Kali usage in phases of a security assessment.
๐ŸŒ
Kali Linux
kali.org โ€บ get-kali
Get Kali | Kali Linux
June 20, 2025 - Full Kali Linux toolset, with many tools available via a simple menu system. Command line interface to the Kali Linux container.