<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Kali Linux 2017.2 Security OS Released With New Hacking Tools</title>
	<atom:link href="http://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Thu, 09 Apr 2026 15:47:07 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1870453</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 08 Feb 2026 21:37:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1870453</guid>
		<description><![CDATA[AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems
https://cybersecuritynews.com/autopentestx-penetration-testing-toolkit/#google_vignette

AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single command.

Developed by Gowtham Darkseid and released in November 2025, it generates professional PDF reports while emphasizing safe, non-destructive testing.

AutoPentestX targets Kali Linux, Ubuntu, and Debian-based distributions, automating OS detection, port scanning, service enumeration, and vulnerability checks.

It integrates Nmap for network scans, Nikto and SQLMap for web testing, and CVE lookups for risk scoring based on CVSS metrics. The toolkit stores results in an SQLite database and supports Metasploit RC scripts for manual exploitation review without actual harm.]]></description>
		<content:encoded><![CDATA[<p>AutoPentestX – Automated Penetration Testing Toolkit Designed for Linux systems<br />
<a href="https://cybersecuritynews.com/autopentestx-penetration-testing-toolkit/#google_vignette" rel="nofollow">https://cybersecuritynews.com/autopentestx-penetration-testing-toolkit/#google_vignette</a></p>
<p>AutoPentestX, an open-source automated penetration testing toolkit for Linux systems, enables comprehensive security assessments from a single command.</p>
<p>Developed by Gowtham Darkseid and released in November 2025, it generates professional PDF reports while emphasizing safe, non-destructive testing.</p>
<p>AutoPentestX targets Kali Linux, Ubuntu, and Debian-based distributions, automating OS detection, port scanning, service enumeration, and vulnerability checks.</p>
<p>It integrates Nmap for network scans, Nikto and SQLMap for web testing, and CVE lookups for risk scoring based on CVSS metrics. The toolkit stores results in an SQLite database and supports Metasploit RC scripts for manual exploitation review without actual harm.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1861739</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 11:12:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1861739</guid>
		<description><![CDATA[https://telefonicatech.com/en/blog/kali-gpt-the-ai-assistant-for-automation-and-analysis-in-cyber-security]]></description>
		<content:encoded><![CDATA[<p><a href="https://telefonicatech.com/en/blog/kali-gpt-the-ai-assistant-for-automation-and-analysis-in-cyber-security" rel="nofollow">https://telefonicatech.com/en/blog/kali-gpt-the-ai-assistant-for-automation-and-analysis-in-cyber-security</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1861731</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 07:37:19 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1861731</guid>
		<description><![CDATA[https://infrasos.com/top-25-best-kali-linux-penetration-testing-tools/]]></description>
		<content:encoded><![CDATA[<p><a href="https://infrasos.com/top-25-best-kali-linux-penetration-testing-tools/" rel="nofollow">https://infrasos.com/top-25-best-kali-linux-penetration-testing-tools/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1861730</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 07:36:55 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1861730</guid>
		<description><![CDATA[https://www.kali.org/tools/openocd/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.kali.org/tools/openocd/" rel="nofollow">https://www.kali.org/tools/openocd/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1861729</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 07:33:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1861729</guid>
		<description><![CDATA[https://www.infosecinstitute.com/resources/penetration-testing/top-19-kali-linux-tools-for-vulnerability-assessments/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.infosecinstitute.com/resources/penetration-testing/top-19-kali-linux-tools-for-vulnerability-assessments/" rel="nofollow">https://www.infosecinstitute.com/resources/penetration-testing/top-19-kali-linux-tools-for-vulnerability-assessments/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1841844</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Dec 2024 19:47:11 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1841844</guid>
		<description><![CDATA[https://www.bleepingcomputer.com/news/security/kali-linux-20244-released-with-14-new-tools-deprecates-some-features/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.bleepingcomputer.com/news/security/kali-linux-20244-released-with-14-new-tools-deprecates-some-features/" rel="nofollow">https://www.bleepingcomputer.com/news/security/kali-linux-20244-released-with-14-new-tools-deprecates-some-features/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1840227</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 17:01:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1840227</guid>
		<description><![CDATA[https://www.blackhatethicalhacking.com/articles/top-10-things-to-do-after-installing-kali-linux/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.blackhatethicalhacking.com/articles/top-10-things-to-do-after-installing-kali-linux/" rel="nofollow">https://www.blackhatethicalhacking.com/articles/top-10-things-to-do-after-installing-kali-linux/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1840188</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 01 Dec 2024 12:44:58 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1840188</guid>
		<description><![CDATA[Deploy a SOC using Kali Linux in AWS
The Kali SOC in AWS project is a Terraform-based implementation that enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment is ideal for honing skills in security operations, threat detection, incident response, and training scenarios. The project is inspired by the original CloudFormation-based deployment by ZoccoCss.
https://www.helpnetsecurity.com/2024/11/25/kali-soc-aws/]]></description>
		<content:encoded><![CDATA[<p>Deploy a SOC using Kali Linux in AWS<br />
The Kali SOC in AWS project is a Terraform-based implementation that enables the deployment of a Security Operations Center (SOC) in AWS, utilizing the Kali Linux toolset for purple team activities. This environment is ideal for honing skills in security operations, threat detection, incident response, and training scenarios. The project is inspired by the original CloudFormation-based deployment by ZoccoCss.<br />
<a href="https://www.helpnetsecurity.com/2024/11/25/kali-soc-aws/" rel="nofollow">https://www.helpnetsecurity.com/2024/11/25/kali-soc-aws/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1834296</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 16 Aug 2024 16:47:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1834296</guid>
		<description><![CDATA[Top 19 tools for hardware hacking with Kali Linux
https://www.infosecinstitute.com/resources/hacking/top-19-tools-for-hardware-hacking-with-kali-linux/]]></description>
		<content:encoded><![CDATA[<p>Top 19 tools for hardware hacking with Kali Linux<br />
<a href="https://www.infosecinstitute.com/resources/hacking/top-19-tools-for-hardware-hacking-with-kali-linux/" rel="nofollow">https://www.infosecinstitute.com/resources/hacking/top-19-tools-for-hardware-hacking-with-kali-linux/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Geek Guy</title>
		<link>https://www.epanorama.net/blog/2017/09/23/kali-linux-2017-2-security-os-released-with-new-hacking-tools/comment-page-2/#comment-1833768</link>
		<dc:creator><![CDATA[Geek Guy]]></dc:creator>
		<pubDate>Thu, 08 Aug 2024 17:46:40 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/newepa/?p=59553#comment-1833768</guid>
		<description><![CDATA[Thanks For Sharing]]></description>
		<content:encoded><![CDATA[<p>Thanks For Sharing</p>
]]></content:encoded>
	</item>
</channel>
</rss>
