About 125 results
Open links in new tab
  1. Kali Linux | Penetration Testing and Ethical Hacking Linux …

    Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

  2. Kali Tools - Kali Linux Tools

    Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

  3. Get Kali | Kali Linux

    Home of Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.

  4. hydra | Kali Linux Tools

    PW-Inspector reads passwords in and prints those which meet the requirements. The return code is the number of valid passwords found, 0 if none was found. Use for security: check …

  5. medusa | Kali Linux Tools

    Aug 26, 2025 · medusa Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as …

  6. USB | Kali Linux Documentation

    Portable Kali on a USB drive/key/stickPortable Kali on a USB drive/key/stick Making a Kali Bootable USB Drive (Linux) Making a Kali Bootable USB Drive (macOS/OS X) Making a Kali …

  7. bruteforce-wallet | Kali Linux Tools

    May 23, 2024 · In the exhaustive mode the program tries to decrypt one of the encrypted addresses in the wallet by trying all the possible passwords. It is especially useful if you know …

  8. fern-wifi-cracker | Kali Linux Tools

    Nov 17, 2024 · This package contains a Wireless security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program …

  9. aircrack-ng | Kali Linux Tools

    aircrack-ng is an 802.11a/b/g WEP/WPA cracking program that can recover a 40-bit, 104-bit, 256-bit or 512-bit WEP key once enough encrypted packets have been gathered.

  10. armitage | Kali Linux Tools

    armitage Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post- exploitation features in the framework. …