/Kali-linux2

Creative Commons Zero v1.0 UniversalCC0-1.0

Kali Linux

Note:

This book is a complete unofficial documentation of all the tools in Kali Linux. The author(s) are not held liable for any mistakes done by the readers.

To see the official documentation click https://tools.kali.org/tools-listing.

The major sections of the book are:

  • [Introduction](1. Introduction/README.md)
  • [Exploitation Tools](2. Exploitation Tools/README.md)
  • [Forensics Tools](3. Forensics Tools/README.md)
  • [Hardware Hacking](4. Hardware Hacking/README.md)
  • [Information Gathering](5. Information Gathering/README.md)
  • [Maintaining Access](6. Maintaining Access/README.md)
  • [Password Attacks](7. Password Attacks/README.md)
  • [Reporting Tools](8. Reporting Tools/README.md)
  • [Reverse Engineering](9. Reverse Engineering/README.md)
  • [Sniffing & Spoofing](10. Sniffing & Spoofing/README.md)
  • [Stress Testing](11. Stress Testing/README.md)
  • [Web Applications](12. Web Applications/README.md)
  • [Wireless Attacks](13. Wireless Attacks/README.md)
  • [Useful Github Repositories](14. Useful Github Repositories/README.md)
  • [Miscellaneous](15. Conclusion/README.md)