Bleeding Edge Kali Linux | Kali Linux Blog
We’ve been busy this week, still behind on our emails, but going strong with Kali development….
We’ve been busy this week, still behind on our emails, but going strong with Kali development….
A couple of weeks ago, we were approached (independently) by two blind security enthusiasts who both…
We’ve just pushed a bunch of packages, tools, and utilities to the main Kali repositories. These…
In keeping with our tradition of publishing new releases during the annual Black Hat and DEF…
Whenever we are given the opportunity to describe Kali Linux, we use the word “powerful”. Have…
A little while back, a bug with the LVM encrypted install in Kali Linux 1.0.4 was…
Kali Linux on any Android Phone or Tablet Getting Kali Linux to run on ARM hardware…
Today we are pleased to announce the immediate availability of Kali Linux 1.0.5 with a rollup…
We’re always on the lookout for and interesting ARM hardware for Kali Linux. Whether it’s a…
Kali Linux Full Disk Encryption As penetration testers, we often need to travel with sensitive data…
Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more! It’s been a while…
There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added…
Kali Linux contains a large number of very useful tools that are beneficial to information security…
Kali Linux in the Amazon EC2 Marketplace EDIT: For updated Kali Rolling images in the Amazon…
One of our goals when developing Kali Linux was to provide multiple metapackages that would allow…
Kernel 3.14, Tool Updates, Package Improvements Kali Linux 1.0.7 has just been released, complete with a…
The long awaited Kali Linux USB EFI boot support feature has been added to our binary…
Now that we have caught our breath after the Black Hat and DEF CON conferences, we…
Squash the Bugs with Kali 1.0.9a Over the past couple of weeks, we’ve seen a bunch…
After almost two years of public development (and another year behind the scenes), we are proud…
Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner…