Kali Linux 2017.2 Security OS Released With New Hacking Tools


If you are a hacker, pentester, or a security researcher, this news should interest you. The best Linux OS, Kali Linux 2017.2  was released yesterday. Kali Linux is available for both 32-bit and 64-bit versions.
The new Kali Linux distro version comes with more 20 new hacking tools. 

Get the latest Kali 2017.2 from Kali download page.


  1. Tomi Engdahl says:

    Run kali Linux on Windows 10 in Docker

    with Windows 10, Microsoft has introduced a third method for running multiples OSes – by using containers and in this article, we’ll go through the steps required to achieve this

  2. Tomi Engdahl says:

    Build a Portable Hacking Station with a Raspberry Pi and Kali Linux

    Cracking Wi-Fi passwords, spoofing accounts, and testing networks for exploits are all fun enough, but if you want to take the show on the road, you’ll want an easily portable rig. Enter Kali Linux and the Raspberry Pi.

  3. Tomi Engdahl says:

    Kali Linux in the Windows App Store

    Kali Linux introduced into the Microsoft App Store as an official WSL distribution and today we’re happy to announce the availability of the “Kali Linux” Windows application. For Windows 10 users, this means you can simply enable WSL, search for Kali in the Windows store, and install it with a single click. This is especially exciting news for penetration testers and security professionals who have limited toolsets due to enterprise compliance standards.

  4. Tomi Engdahl says:

    Hacker Favourite Kali Linux Swaps Gnome for Xfce, Adds New Tricks

  5. Tomi Engdahl says:

    The Kali Pi dropbox is a good build, I think a 4G connection would be cool too.


  6. Tomi Engdahl says:

    SS7 Telecom Security Vulnerability Kali Linux 2019.4

    SigPloit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use. SigPloit aims to cover all used protocols used in the operators interconnects SS7, GTP (3G), Diameter (4G) or even SIP for IMS and VoLTE infrastructures used in the access layer and SS7 message encapsulation into SIP-T. Recommendations for each vulnerability will be provided to guide the tester and the operator the steps that should be done to enhance their security posture


Leave a Comment

Your email address will not be published. Required fields are marked *