25 Best Kali Linux Tools

August 31, 2023

Introduction

Kali Linux is a security-oriented Linux distribution for penetration testing and digital forensics. Based on the Debian Testing branch, Kali Linux offers a balance between stability and offering the most up-to-date software.

This overview presents the 25 best Kali Linux tools chosen from over 600 tools available in the distribution.

25 best Kali Linux tools.

Nmap

Nmap is a command-line network scanning utility for discovering and mapping networks, hosts, and services. It helps users perform network vulnerability assessments and improve network security.

Nmap works by sending data packets to a specified port and IP address. It waits for a response, analyses it, and provides a report.

Nmap tool running in Kali Linux.

Features

  • Network hosts identification by protocol or port.
  • Ping scan for host testing.
  • Fast scan for quick port scanning.
  • TCP/IP stack fingerprinting determines a network device's OS and hardware elements.  

Pricing

Nmap is a free and open-source application.

Netcat

Netcat is a command-line utility that allows users to read and write data across network connections. It scans and listens to ports and transfers files using TCP and UDP protocols.

The tool facilitates debugging and investigation, but developers can include it as a backend for their programs and scripts. Netcat syntax includes various options for communicating and analyzing external websites and their ports.

Natcat running in Kali Linux.

Features

  • TCP/UDP connections using any port.
  • Port scanning with randomization.
  • Full DNS forward and reverse checking.
  • Usage of locally configured source port or network source address.
  • Loose source-routing.
  • TCP/UDP tunneling mode.

Pricing

Netcat is free of charge and open-source.

Fluxion

Fluxion is a tool for security auditing and researching user responses to social engineering attacks. It can conduct Wi-Fi access point attacks by providing a simple interface for setting up fake wireless networks.

Aside from the social engineering aspect, security professionals also use Fluxion to test the access point security of wireless networks by simulating Man in the Middle (MITM) attacks.

Fluxion intro screen in Kali Linux.

Features

  • Handshake Snopper and Captive Portal for simulating an MITM attack.
  • Evil Twin attacks.
  • Credential harvesting.
  • De-authentication attacks.

Pricing

Fluxion is a free and open-source tool.

Lynis

Lynis is a system hardening and compliance testing tool that performs comprehensive system health scans. Aside from IT security professionals, developers use Lynis to improve web application security, while sysadmins utilize it to discover new weaknesses.

Lynis uses an opportunistic and modular approach to scanning, meaning it can scan for available system tools and then perform a tailor-made system test. This approach allows Lynis to require no dependencies to run.

A section of a Lynis report in Kali Linux.

Features

  • Over 300 built-in tests.
  • Plugin and custom test support.
  • Dynamic operating system detection.
  • Detailed logging.
  • Hardening index.

Pricing

Lynis is a free-of-charge and open-source application. There are also two SaaS offers for Lynis:

  • The Premium includes all the modules and a monthly subscription.
  • The Self-Hosted option allows users to customize the offer to meet their needs.

Nessus

Nessus is a comprehensive vulnerability assessment tool for identifying vulnerabilities, misconfigurations, and potential threats in systems and applications. It offers an extensive database of regularly updated vulnerability checks for up-to-date security assessment.

Nessus logo.

Features

  • Fast asset discovery.
  • Configuration auditing.
  • Discovery of sensitive data.
  • Malware detection.

Pricing

Nessus is a commercial product that offers three versions:

  • Nessus Essentials is a free version that enables users to scan their environment with up to 16 IP addresses per scanner.
  • Nessus Professional is a paid annual subscription option that offers all the essential modules.
  • Nessus Expert annual subscription includes the Nessus Professional features and additional features such as external attack surface scanning, prebuilt scanning policies, and cloud infrastructure scanning.

Tiger

Tiger is a command-line tool written in shell language that performs security auditing and host-side intrusion detection. It can also provide a framework for combining other tools, like intrusion detection systems, integrity checkers, and logcheckers.

The modular nature of the tool allows users to decide which aspect of a UNIX system they want to check. For example, Tiger can check filesystem permissions, dormant users, and system file configuration. It can also scan for available patches not installed on the system.

A security scan with Tiger running in Kali Linux.

Features

  • Easily expandable modular design.
  • Wide range of available checks.
  • Highlights vulnerabilities in password policies, system logs, and network settings.

Pricing

Tiger is a free and open-source tool.

John the Ripper

John the Ripper (also known as John) is a password-hacking tool with a simple command-line interface. Cyber-security professionals use it for password security auditing and password recovery.

John the Ripper version output in Kali Linux.

Features

John the Ripper supports many different hash and cipher types, such as:

  • User passwords for Linux, BSD, macOS, and Windows users.
  • User passwords for web apps and database servers.
  • Network traffic captures.
  • Encrypted private keys.
  • Filesystems, documents, and archives.

Pricing

While the application is free, there are paid John the Ripper Pro versions tailored for many operating systems. The licensing and prices depend on the OS and the type of package.

Hydra

Hydra is a password-cracking tool that supports parallelized connects and attacks on multiple protocols. It combines various types of brute-force attacks for guessing the username/password pair.

Penetration testing experts often use Hydra with wordlist generators such as cupp and crunch.

Hydra running in Kali Linux.

Features

  • Support for multiple protocols such as FTP, SSH, POP3, and IMAP.
  • Support for website forms.
  • Modular architecture.
  • Dictionary-based and brute-force attacks.
  • Parallel attacks.
  • Support for custom scripts.

Pricing

Hydra is a free-to-use open-source tool.

Social-Engineer Toolkit (SET)

Social-Engineer Toolkit (SET) is a penetration testing kit for social engineering research written in Python. It allows security professionals to create a believable social engineering attack using custom attack vectors.

SET helps security professionals evaluate how susceptible organizations and individuals are to phishing, credential harvesting, and manipulation.

Social Engineering Toolkit main menu in Kali Linux.

Features

  • Support for various attack vectors (e.g., spear phishing, credential harvesting, etc.).
  • Infectious media generation.
  • Phishing website creation.
  • Email-based attacks.
  • Malicious USB device creation.

Pricing

Social-Engineer Toolkit is open source and free of charge.

WPScan

WPScan is a tool for detecting vulnerabilities, misconfigurations, and security issues in WordPress websites. It checks a manually updated database of WordPress vulnerabilities and reports on the state of a website.

WPScan can be integrated into a WordPress installation or used as a CLI tool. The CLI tool has a simple interface featuring the wpscan command:

WPScan version output in Kali Linux.

Features

  • Scanning outdated plugins, themes, and core files.
  • Security checks for weak passwords, exposed sensitive information, and potential entry points.
  • Version checks for the WordPress installation and plugins.
  • Brute-force attacks for login credentials testing.

Pricing

The CLI version of WPScan is free of charge but limited to 25 API requests per day. The Enterprise edition is a paid option with custom solutions for enterprises.

Metasploit Framework

Metasploit Framework is a penetration testing system and a platform for creating security tools and exploits. It allows the user to perform all the necessary steps to create and deploy an exploit inside a single environment.

Metasploit facilitates writing, testing, and executing the exploit code. It supports actions such as exploit module configuration, pairing the module with the payload, and launching the exploit towards the target system.

Metasploit logo and version in Kali Linux.

Features

  • Extensive database of exploits, payloads, and auxiliary modules.
  • Supports various exploits, from remote code execution (RCE) to privilege escalation.
  • Numerous security assessment options.
  • Simple creation of custom exploits and payloads.
  • Post-exploitation modules for reconnaissance, data extraction, and lateral movement in the exploited system.

Pricing

Metasploit Framework is open source and free to download but provides only the essential features. The company also offers a paid option called Metasploit Pro with additional advanced features.

Burp Suite

Burp Suite is a platform for discovering vulnerabilities and security testing of web applications. The suite automates repetitive tasks in every test and allows users to dive deeper with manual and semi-automated testing tools.

Burp Suite aims to provide an all-in-one solution for testing web application security. It provides the basic functionality through acting as a proxy server, scanner, and intruder, but can also work as a repeater, a decoder, a sequencer, and a comparer. The paid versions offer additional roles, such as an extender and a spider.

Burp Suite main page in Kali Linux.

Features

  • Smart automation.
  • Support for HTTP/2-based testing.
  • Out-of-band application security testing (OAST) that minimizes false positives.
  • Scanning single-page applications (SPAs) and APIs.
  • Prerecording of complex authentication sequences.

Pricing

Burp Suite Community Edition is free of charge but has a severely limited feature set. The Professional and Enterprise editions can be purchased after a trial period. 

Aircrack-ng

Aircrack-ng is a Wi-Fi security tool for wireless network security assessment that helps the user discover, capture, and analyze Wi-Fi network traffic. It contains a detector, a packet sniffer, a password cracker, and a wireless LAN analysis tool.

aircrack-ng help output in Kali Linux.

Features

  • Cracking WEP, WPA/WPA2 and WPA2 keys.
  • An injector and frame replay tool that supports de-authentication attacks.
  • Packet sniffer.
  • Wireless card server.
  • Virtual tunnel interface creator.
  • Automated WEP cracking WPA handshake logging.

Pricing

Aircrack-ng is a free-of-charge, open-source application.

Nikto

Nikto is a vulnerability scanner for assessing the security of web servers and applications. It scans web environments for potential vulnerabilities, misconfigurations, and security risks.

As a command-line tool, Nikto features the nikto command, which takes IP addresses and domain names as arguments. After analyzing the server behind the address, the tool returns a detailed report featuring basic information about the target and a list of potential vulnerabilities.

Nikto help output in Kali Linux.

Features

  • Identifies outdated software, misconfigured servers, and security issues.
  • Scans and identifies over 6700 dangerous files and CGIs.
  • Full SSL support.
  • Full HTTP proxy support.
  • Scans a port by using an Nmap file as input.

Pricing

Nikto is free of charge and open source.

Autopsy

Autopsy Forensic Browser is a comprehensive digital forensics tool for extracting and analyzing information from digital devices and data sources. Widely used by forensic professionals and law enforcement agencies, Autopsy provides a way to examine and recover evidence from various file systems.

Autopsy is installed via the CLI and accessed through a web interface.

Autopsy Forensic Browser main page in Kali Linux.

Features

  • Uncovering hidden or deleted information.
  • Powerful keyword search capabilities.
  • Timeline analysis provides insights into user activity.
  • Integrated hash databases for file integrity verification.
  • Hash filtering for flagging known bad files.
  • Support for various data types.

Pricing

Autopsy is open-source and free to use.

King Phisher

King Phisher is a tool for simulating and executing phishing campaigns designed to test and promote security awareness. It helps organizations evaluate how susceptible they are to phishing attacks.

King Phisher can be used for anything from simple awareness training to a complex campaign that illustrates the dangers of credential harvesting. Its flexible architecture gives the user control over emails and the content on the server.

King Phisher logo.

Features

Pricing

King Phisher is free of charge and open-source.

Skipfish

Skipfish is a tool for web application security assessment. It helps conduct security reconnaissance by carrying out a recursive crawl and dictionary-based probes and creating an interactive map of the target website.

The user initiates a Skipfish scan by providing a target website through its command-line interface.

Skipfish website analysis in Kali Linux.

Features

  • Modular design and customizable options.
  • Range requests, content compression, and keep-alive connections.
  • Forced response size limiting.
  • Enumeration tracking.
  • Identifying potential vulnerabilities, such as SQL injection and cross-site scripting (XSS).

Pricing

Skipfish is an open-source application, and it is free to use.

BeEF

Browser Exploitation Framework (BeEF) is a platform for testing security and assessing the vulnerability of web browsers. It identifies exploitable browser weaknesses and helps users to design adequate web application defenses.

BeEF works by hooking a web browser and using it as a beachhead (i.e., an attack point) for executing directed command modules and other related attacks. This action enables the security expert to take limited control over the end user browser tab and conduct a test attack.

BeEF logo.

Features

  • Targeting vulnerabilities such as cross-site scripting (XSS) and HTML injection.
  • Targeting browser-specific weaknesses with custom browser-based attacks.
  • The extension API and restful API.
  • Keystroke logging.
  • Browser proxying.
  • Metasploit integration.
  • Plugin detection.

Pricing

BeEF is a free and open-source tool.

Wireshark

Wireshark is a packet-analyzing tool for network troubleshooting and analysis. The tool can capture and analyze network traffic in real time, or it can analyze previously captured packets. The analysis offers insights into network behavior and facilitates diagnostics and identification of potential security threats.

The main Wireshark application is GUI-based. However, there is a command-line version called TShark.

Wireshark main page in Kali Linux.

Features

  • Real-time data capture.
  • Reading data from Ethernet, IEEE 802.11, PPP, and loopback networks.
  • Display filters.
  • Plugin support.
  • VoIP call detection.
  • Raw USB data capture.

Pricing

Wireshark is free-of-charge and open source.

Yersinia

Yersinia is a network protocol exploitation tool that simulates and tests attacks against network protocols. It performs Layer 2 attacks by spoofing a solid framework for the deployed networks and systems testing and analysis.

Yersinia help output in Kali Linux.

Features

Yersinia supports attacking the following protocols:

  • Cisco Discovery Protocol (CDP).
  • Dynamic Host Configuration Protocol (DHCP).
  • 802.1q and 802.1x.
  • Dynamic Trunking Protocol (DTP).
  • Hot Standby Router Protocol (HSRP).
  • Inter-Switch Link Protocol (ISL).
  • VLAN Trunking Protocol (VTP).
  • Spanning Tree Protocol (STP).

Pricing

Yersinia is a free-of-charge and open-source tool.

Maltego

Maltego is an intelligence and data visualization tool for gathering and analyzing data from different sources and uncovering relationships and patterns. It provides a library of transforms for data discovery and a graph-formatted visualization of the data, which can be used for data mining and link analysis.

Maltego home screen in Kali Linux.

Features

  • Simplified information gathering from dispersed data sources.
  • Up to 1 million entities viewable on the map.
  • Automatic linking and combining of map information.
  • Pattern recognition that includes block, hierarchical, circular, and organic layouts.

Pricing

Maltego Community Edition is free of charge but requires registration. The paid options, Maltego Pro and Maltego Enterprise provide additional features. This includes using the tool on multiple devices, deploying it in virtual machines, accessing additional transforms on commercial Transform Hub, etc.

Apktool

Apktool is an application that allows users to reverse-engineer Android APK files. It disassembles resources and provides a way to make changes or analyze the disassembled application.

Apktool help output in Kali Linux.

Features

  • Extracts resources, assets, and code.
  • Facilitates the examination of layouts, images, and XML files.
  • Recompiles the code back to APK.

Pricing

Apktool is open-source and free to use.

sqlmap

sqlmap is a utility for detecting and exploiting SQL injection vulnerabilities in web apps and databases. The tool automates vulnerability detection and assists in database server takeovers.

Sqlmap starting prompt in Kali Linux.

Features

  • Automatic and manual SQL injection testing.
  • Support for a wide range of database management systems (DMS), such as MySQL, PostgreSQL, MariaDB, SQLite, Microsoft SQL Server, and many more.
  • Support for six SQL injection techniques: error-based, UNION query-based, boolean-based blind, time-based blind, stacked queries, and out-of-band.
  • Automatic password hash format recognition.
  • Support for dumping database tables.

Pricing

sqlmap is open-source and free to use.

Dirb

Dirb is a tool for brute-forcing directories and files on web servers. Dirb launches a dictionary-based attack against a specified web server and analyses the response.

Dirb scanning a server in Kali Linux.

Features

  • Uncovers resources that are hidden or unprotected.
  • Supports multiple HTTP methods and scanning modes.
  • Customizable scanning process.
  • Preconfigured attack wordlists.

Pricing

Dirb is an open-source tool that is free to use.

Reaver

Reaver is a tool for exploiting Wi-Fi Protected Setup (WPS) weaknesses. It works by attempting to crack the WPS PIN and access a Wi-Fi network without authorization, highlighting the weaknesses in the setup.

Reaver help output in Kali Linux.

Features

  • Preconfigured attack wordlists.
  • Custom wordlists.

Pricing

Dirb is a free-of-charge open-source application.

Conclusion

This article presented 25 popular cyber security tools frequently employed on Kali Linux. It offered an overview of each tool's features and versions.

Was this article helpful?
YesNo
Marko Aleksic
Marko Aleksić is a Technical Writer at phoenixNAP. His innate curiosity regarding all things IT, combined with over a decade long background in writing, teaching and working in IT-related fields, led him to technical writing, where he has an opportunity to employ his skills and make technology less daunting to everyone.
Next you should read
Kali Linux vs. Ubuntu
August 24, 2023

Kali Linux and Ubuntu are distros designed for two vastly different use cases. Read more about their differences in this comparison article.
Read more
How to Install Kali Linux on VirtualBox
March 28, 2024

Kali LInux earned a reputation as one of the best OSs used for security testing. As such, it is best to install Kali as a VM on VirtualBox.
Read more
How to Update Kali Linux
July 18, 2024

Kali Linux has a rolling release model with new releases coming out approximately four times a year.
Read more
34 Network Security Tools
August 31, 2023

We have collected the best security tools to combat network threats. These applications should make for a strong starting point for anyone working...
Read more