🐉 Kali Linux Tools - Complete Guide
Every tool in Kali Linux explained - what they do, when to use them, and how they work.
⚖️ LEGAL & ETHICAL USE ONLY
Kali Linux tools are for authorized security testing only. Use only on systems you own or have explicit permission to test.
📋 Tool Categories Overview
Information Gathering
Reconnaissance and intelligence collection
Vulnerability Analysis
Finding and assessing security flaws
Web Application Analysis
Testing websites and web apps
Database Assessment
Database security testing
Password Attacks
Cracking and testing passwords
Wireless Attacks
Wi-Fi and Bluetooth testing
Reverse Engineering
Analyzing binaries and malware
Exploitation Tools
Exploiting found vulnerabilities
Sniffing & Spoofing
Network traffic analysis
Post Exploitation
Maintaining access after compromise
Forensics
Digital investigation
Reporting Tools
Documentation and reporting
🕵️ INFORMATION GATHERING
DNS Enumeration Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| dnsenum | Comprehensive DNS enumeration | Initial recon on a domain | Performs zone transfers, brute forces subdomains, reverse lookups, Google scraping |
| dnsrecon | Advanced DNS reconnaissance | When dnsenum is blocked or you need more stealth | Multi-threaded, checks for zone transfers, cache snooping, SRV records, SPF |
| fierce | DNS brute forcer | Finding non-public subdomains | Uses dictionary attacks, attempts zone transfers, can traverse IP ranges |
| dnswalk | DNS zone checker | Checking DNS zone integrity | Performs diagnostic queries to check for common DNS misconfigurations |
Network Discovery Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| nmap | Network mapper | Always - the Swiss Army knife | Raw packet crafting, OS detection (-O), service version detection (-sV), script engine (-sC) |
| masscan | Ultra-fast port scanner | Scanning large networks quickly | Asynchronous transmission, can scan entire Internet in minutes, uses own TCP stack |
| netdiscover | ARP-based discovery | Local network discovery | Active/passive ARP reconnaissance, finds devices even with firewall, no IP needed |
| autoscan | Network automapper | Automatic network documentation | GUI tool that automatically discovers and maps networks, uses multiple techniques |
🎯 VULNERABILITY ANALYSIS
Vulnerability Scanners
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| OpenVAS | Comprehensive vulnerability scanner | Full enterprise security assessment | 50,000+ NVTs, authenticated/unauthenticated checks, CVE correlation, Greenbone frontend |
| Nikto | Web server scanner | Quick web server checks | 6700+ dangerous files/CGIs, checks for outdated versions, host header injection |
| Lynis | Unix security auditing | Hardening Linux/Unix systems | Checks 300+ security controls, file permissions, kernel parameters, authentication |
| skipfish | Web application scanner | Deep web app security testing | Recursive crawler, differential security checks, heuristic web application checks |
🌐 WEB APPLICATION ANALYSIS
Web Proxies & Interceptors
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Burp Suite | Web penetration testing platform | Professional web app testing | Proxy, scanner, intruder, repeater, decoder, collaborator, extensible with BApps |
| OWASP ZAP | Integrated penetration tester | Open-source alternative to Burp | Automated scanner, REST API, websocket support, traditional/headless modes |
| mitmproxy | Interactive TLS-capable proxy | API testing, mobile app testing | SSL/TLS interception, scriptable with Python, replay attacks, traffic manipulation |
| sqlmap | Automatic SQL injection | Testing for SQLi vulnerabilities | 6 inference techniques, DB fingerprinting, data extraction, OS shell access |
🔓 PASSWORD ATTACKS
Password Cracking Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| John the Ripper | Password cracker | Cracking Unix/Linux passwords | Wordlist, incremental, single crack modes, 400+ hash types, rule-based attacks |
| Hashcat | Advanced password recovery | GPU-accelerated cracking | 300+ hash types, OpenCL/CUDA, hybrid attacks, mask attacks, rule engine |
| hydra | Network login cracker | Brute forcing network services | 50+ protocols, parallel attacks, flexible login/pass attempts, restore sessions |
| crunch | Wordlist generator | Creating custom wordlists | Pattern-based generation, character sets, permutations, statistical patterns |
📶 WIRELESS ATTACKS
Wi-Fi Security Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Aircrack-ng | Wi-Fi security suite | Complete wireless testing | Monitor mode, packet injection, WEP/WPA cracking, deauthentication attacks |
| Kismet | Wireless detector/sniffer | Wireless reconnaissance | Passive detection, hidden SSID discovery, client probing, GPS mapping |
| fern-wifi-cracker | GUI wireless cracker | Beginner-friendly Wi-Fi testing | Automated WEP/WPA attacks, session management, wordlist integration |
| wifite | Automated wireless auditor | Automated penetration testing | Automates Aircrack-ng, Reaver, Pyrit, attacks all networks or targets |
💣 EXPLOITATION TOOLS
Exploitation Frameworks
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Metasploit | Exploitation framework | After finding vulnerabilities | 2000+ exploits, 500+ payloads, auxiliary modules, post-exploitation, evasion |
| Armitage | Metasploit GUI | Visual attack management | Visual network graph, automated attacks, team collaboration, Cortana scripting |
| BeEF | Browser exploitation | Client-side attacks | Hooks browsers via XSS, command module, social engineering, network recon |
| searchsploit | Exploit-DB search | Finding exploits for specific vulns | Offline Exploit-DB mirror, filters by platform/type, copy to working directory |
📡 SNIFFING & SPOOFING
Network Analysis Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Wireshark | Network protocol analyzer | Deep packet inspection | 3000+ protocols, live capture, offline analysis, decryption, VoIP analysis |
| ettercap | MITM attacks | Network interception | ARP poisoning, DNS spoofing, SSL stripping, packet filtering, credential sniffing |
| driftnet | Image capturer | Visual network monitoring | Extracts images from TCP streams, displays in real-time, HTTP/email images |
| macchanger | MAC address changer | MAC spoofing/obfuscation | Changes MAC addresses, random/vendor-specific, maintains original if needed |
🔍 FORENSICS TOOLS
Digital Forensics
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Autopsy | Digital forensics platform | Complete forensic investigation | File system analysis, timeline, hash filtering, keyword search, web artifacts |
| volatility | Memory forensics | RAM analysis | Process listing, network connections, DLLs, registry, malicious code detection |
| binwalk | Firmware analysis | Embedded device forensics | File extraction, entropy analysis, signature scanning, compression detection |
| foremost | File carver | Recovering deleted files | Header/footer carving, file type detection, raw recovery from disk images |
🛠️ REVERSE ENGINEERING
Binary Analysis Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Ghidra | Reverse engineering suite | NSA-grade RE | Decompiler, disassembler, scripting, collaborative analysis, processor modules |
| radare2 | Binary analysis framework | Command-line RE | Disassembler, debugger, hex editor, scripting, esoteric architectures |
| ollydbg | Windows debugger | Windows executable analysis | Assembler-level analysis, breakpoints, tracing, plugin architecture |
| edb-debugger | Cross-platform debugger | Linux binary analysis | GDB-like features with GUI, memory/register views, binary patching |
💾 POST EXPLOITATION
Post-Compromise Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Meterpreter | Advanced payload | After successful exploitation | Memory-resident, encrypted communication, file system access, keylogging |
| Empire | Post-exploitation framework | Lateral movement and persistence | PowerShell agents, credential harvesting, privilege escalation modules |
| p0f | OS fingerprinting | Identifying compromised systems | Passive fingerprinting, TCP/IP stack analysis, NAT detection, uptime |
| weevely | Web shell | Maintaining web access | PHP backdoor, file management, SQL console, reverse shells |
📊 REPORTING TOOLS
Documentation & Reporting
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| Dradis | Collaboration/reporting | Team penetration tests | Centralized repository, note-taking, evidence collection, report generation |
| MagicTree | Data consolidation | Organizing test results | XML-based data storage, query language, reporting templates, graphing |
| Metagoofil | Metadata collector | Information gathering phase | Extracts metadata from documents, identifies users, software versions |
| faraday | Integrated pentest environment | Enterprise penetration testing | Multi-user, vulnerability management, real-time collaboration, plugins |
🔧 DATABASE ASSESSMENT
Database Security Tools
| Tool | Purpose | When to Use | Technical Details |
|---|---|---|---|
| sqlninja | SQL Server exploitation | MSSQL-specific attacks | Remote command execution, privilege escalation, backdoor installation |
| sqlsus | MySQL injection | MySQL database testing | Automatic injection, database cloning, file reading/writing |
| BBQSQL | Blind SQL injection | When errors are not displayed | Time-based and boolean blind SQLi, automatic detection, customizable |
| jsql-injection | Java SQL injection | Cross-platform SQL testing | Java-based, multi-threaded, database fingerprinting, data extraction |
🎓 LEARNING RESOURCES
Official Kali Documentation: https://www.kali.org/docs/
Kali Tools
Listing: https://www.kali.org/tools/
Offensive Security Courses:
https://www.offensive-security.com/
Practice Labs: Hack The Box, TryHackMe, VulnHub
Kali Linux Tools Guide