How to Nuke your Encrypted Kali Installation | Kali Linux Blog
There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added…
There’s been a fair amount of discussion around the recently introduced LUKS nuke patch we added…
Extra! Extra! Read all about it! Today we are announcing the Kali Linux newsletter. It’s easy…
There was some recent noise around children and their use of Kali, so @Re4son stepped up…
Kali Linux has had support for WSL for some time, but its usefulness has been somewhat…
No, really…this isn’t clickbait. For the past few weeks, we’ve been working with the Microsoft WSL…
Kernel 3.12, LUKS nuke, Amazon AMI / Google Compute images and more! It’s been a while…
Here is a very quick announcement for users of the Kali Linux Docker Images. Until recently…
We find ourselves in the 4th quarter of 2020, and we are ecstatic to announce the…
We are here to kick off our first release of the decade, with Kali Linux 2020.1!…
Welcome to our second release of 2019, Kali Linux 2019.2, which is available for immediate download….
We love it when community members come up with new ideas or interesting builds, and this…
The Advanced Package Tool (APT) is how programs, libraries, documentation, and even the kernel itself are…
We’re well recovered from the Black Hat and DEF CON Vegas conferences and as promised, we’re…
A short while ago, we packaged and pushed out a few important wireless penetration testing tool…
A couple of weeks ago, we were approached (independently) by two blind security enthusiasts who both…
With the end of 2021 just around the corner, we are pushing out the last release…
We have been humbled by the amazing response to our recent launch of Win-KeX. After its…
Another edition of Hacker Summer Camp has come and gone. We had a great time meeting…
We are happy to announce the release of Kali Linux 2017.2, available now for your downloading…
Kali Linux Dojo, BlackHat 2016 – Las Vegas We have really enjoyed doing the Dojo at…
Vulnerability scanning is a crucial phase of a penetration test and having an updated vulnerability scanner…