- Kali On ARM
- Gem PDA
- Raspberry Pi - Full Disk Encryption
- Raspberry Pi
- Acer Tegra Chromebook 13"
- ASUS Chromebook Flip
- BeagleBone Black
- Cubieboard 2
- HP Chromebook
- ODROID U2
- Raspberry Pi - Disk Encryption
- Raspberry Pi 2
- Samsung ChromeBook
- Samsung Chromebook 2
- USB Armory
- Utilite Pro
- Kali NetHunter Documentation
- NetHunter Rootless
- Installing NetHunter
- Installing NetHunter On the Gemini PDA
- NetHunter Components
- NetHunter Home Screen
- NetHunter Chroot Manager
- NetHunter KeX Manager
- NetHunter USB-Arsenal
- NetHunter BadUSB Attack
- NetHunter Application - Terminal
- NetHunter Custom Commands
- NetHunter DuckHunter Attacks
- NetHunter HID Keyboard Attacks
- NetHunter Kali Services
- NetHunter MAC Changer
- NetHunter MANA Evil Access Point
- NetHunter Man In The Middle Framework
- NetHunter Metasploit Payload Generator
- NetHunter Nmap Scan
- NetHunter Exploit Database SearchSploit
- Wireless Cards and NetHunter
- Building a New Device File
- Building NetHunter
- Porting NetHunter to New Devices
- Testing Checklist
- Patching the Kernel
- Configuring the Kernel - General
- Configuring the Kernel - Network
- Configuring the Kernel - Wifi
- Configuring the Kernel - SDR
- Configuring the Kernel - USB
- General Use
- Kali Network Repositories (/etc/apt/sources.list)
- HiDPI (High Dots Per Inch) Display
- Install NVIDIA GPU Drivers
- Fixing DPI (Dots Per Inch) / Large Fonts
- Kali Linux XFCE FAQ
- Kali Linux Forensics Mode
- Kali Linux Metapackages
- Configuring Yubikeys for SSH Authentication
- Updating Kali
- Packages That Behave Differently With Non-root
- Setting up RDP with Xfce
- Kali In The Browser (Guacamole)
- Kali In The Browser (noVNC)
- All about sudo
- Kali's Domains
- Kali Development
- Building Custom Kali ISOs
- Generate an Updated Kali ISO
- Live Build a Custom Kali ISO
- Public Packaging
- Setting Up A System For Packaging
- ARM Cross-Compilation
- Custom Beaglebone Black Image
- Custom Chromebook Image
- Custom CuBox Image
- Custom EfikaMX Image
- Custom MK/SS808 Image
- Custom ODROID X2 U2 Image
- Custom Raspberry Pi Image
- Preparing a Kali Linux ARM chroot
- Rebuilding a Source Package
- Recompiling the Kali Linux Kernel
- Contributing run-time tests with autopkgtest
Kali NetHunter Documentation
Kali NetHunter is a free & open-source Mobile Penetration Testing Platform for Android devices, based on Kali Linux.
- NetHunter Editons
- NetHunter Supported Devices and ROMs
- Downloading NetHunter
- Building NetHunter
- Installing NetHunter
- Post Installation Setup
- Kali NetHunter Attacks and Features
- Porting NetHunter to New Devices
- Known Working Hardware
- NetHunter App
Kali NetHunter is available for un-rooted devices (NetHunter Rootless), for rooted devices that have a custom recovery (NetHunter Lite), and for rooted devices with custom recovery for which a NetHunter specific kernel is available (NetHunter).
The core of Kali NetHunter, which is included in all three editions, comprises of:
Kali Linux container that includes all the tools and applications that Kali Linux provides
Kali NetHunter App Store with dozens of purpose-built security apps
Android client to access the Kali NetHunter App Store
Kali NetHunter Desktop Experience (KeX) to run full Kali Linux desktop sessions with support for screen mirroring via HDMI or wireless screen casting
Figure 2: Kali NetHunter Desktop Experience (KeX) outputting to an HDMI monitor
The Kali NetHunter App Store can be accessed through the dedicated client app or via the web interface.
Figure 3: Kali NetHunter App Store
Both rooted editions provide additional tools & services.
A custom kernel can extend that functionality by adding additional network and USB gadget drivers as well as wifi injection support for selected wifi chips.
Figure 3: The Kali NetHunter App is available in both rooted editions (NetHunter Lite & NetHunter).
Beyond the penetration testing tools included in Kali Linux, NetHunter also supports several additional classes, such as HID Keyboard Attacks, BadUSB attacks, Evil AP MANA attacks, and many more.
For more information about the moving parts that make up NetHunter, check out our NetHunter Components page. Kali NetHunter is an open-source project developed by Offensive Security and the community.
1.0 NetHunter Editions
NetHunter can be installed on almost every Android device under the sun using one of the following editions:
|NetHunter Rootless||The core of NetHunter for unrooted, unmodified devices|
|NetHunter Lite||The full NetHunter package for rooted phones without a custom kernel.|
|NetHunter||The full NetHunter package with custom kernel for supported devices|
The following table illustrates the differences in functionality:
|Feature||NetHunter Rootless||NetHunter Lite||NetHunter|
|All Kali packages||Yes||Yes||Yes|
|Metasploit w/o DB||Yes||Yes||Yes|
|Metasploit with DB||No||Yes||Yes|
The installation of NetHunter Rootless is documented here: NetHunter-Rootless
The NetHunter-App specific chapters are only applicable to the NetHunter & NetHunter Lite editions.
The Kernel specific chapters are only applicable to the NetHunter edition.
2.0 NetHunter Supported Devices and ROMs
NetHunter Lite can be installed on all Android devices that are rooted and have a custom recovery.
The full NetHunter experience requires a devices specific kernel that has been purpose built for Kali NetHunter.
The NetHunter gitlab repository contains over 164 kernels for over 65 devices. Offensive Security publishes over 25 images for the most popular devices on the NetHunter download page.
The following live reports are generated automatically by gitlab CI:
3.0 Downloading NetHunter
Official release NetHunter images for your specific supported device can be download from the Offensive Security NetHunter project page located at the following URL:
Once the zip file has downloaded, verify the SHA256 sum of the NetHunter zip image against the values on the Offensive Security NetHunter download page. If the SHA256 sums do not match, do not attempt to continue with the installation procedure.
4.0 Building NetHunter
Those of you who want to build a NetHunter image from our Gitlab repository may do so using our Python build scripts. Check out our Building NetHunter page for more information. You can find additional instructions on using the NetHunter installer builder or adding your own device in the README located in the nethunter-installer git directory.
5.0 Installing NetHunter on top of Android
Now that you’ve either downloaded a NetHunter image or built one yourself, the next steps are to prepare your Android device and then install the image. “Preparing your Android device” includes:
- unlocking your device and updating it to stock AOSP or LineageOS (CM). (Check point 2.0 for supported roms)
- installing Team Win Recovery Project as a custom recovery.
- installing Magisk to root the device
- disabling force encryption may be required if TWRP cannot access the data partition
- Once you have a custom recovery, all that remains is to flash the NetHunter installer zip file onto your Android device.
6.0 Post Installation Setup
- Open the NetHunter App and start the Kali Chroot Manager.
- Install the Hacker Keyboard from the NetHunter Store using the NetHunter Store app.
- Install any other apps from the NetHunter Store as required.
- Configure Kali Services, such as SSH.
- Set up custom commands.
- Initialize the Exploit Database.
7.0 Kali NetHunter Attacks and Features
Kali NetHunter Application
- Home Screen - General information panel, network interfaces and HID device status.
- Kali Chroot Manager - For managing chroot metapackage installations.
- Kali Services - Start / stop various chrooted services. Enable or disable them at boot time.
- Custom Commands - Add your own custom commands and functions to the launcher.
- MAC Changer - Change your Wi-Fi MAC address (only on certain devices)
- KeX Manager - Set up an instant VNC session with your Kali chroot.
- USB Arsenal - Control the USB gadget configurations
- HID [Attacks] - Various HID attacks, Teensy style.
- DuckHunter HID - Rubber Ducky style HID attacks
- BadUSB MITM Attack - Nuff said.
- MANA Wireless Toolkit - Setup a malicious Access Point at the click of a button.
- MITM Framework - Inject binary backdoors into downloaded executables on the fly.
- NMap Scan - Quick Nmap scanner interface.
- Metasploit Payload Generator - Generating Metasploit payloads on the fly.
- Searchsploit - Easy searching for exploits in the Exploit-DB.
3rd Party Android Applications in the NetHunter App Store
8.0 Porting NetHunter to New Devices
If you’re interested in porting NetHunter to other Android devices, check out the following links. If your port works, make sure to tell us about it so we can include these kernels in our releases!
9.0 Known Working Hardware
- Wireless Cards
- SDR - RTL-SDR (based on RTL2832U)
10.0 NetHunter Apps
All apps can be installed through the NetHunter Store client.