We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the links to download Kali Linux in it’s latest release. For a release history, check our Kali Linux Releases page.
|Kali Linux 64 bit||ISO||Torrent||2.6G|
|Kali Linux 32 bit||ISO||Torrent||2.6G|
|Kali Linux 64 bit Light||ISO||Torrent||0.8G|
|Kali Linux 32 bit Light||ISO||Torrent||0.8G|
|Kali Linux 64 bit mini||ISO||Torrent||30M|
|Kali Linux 32 bit mini||ISO||Torrent||30M|
|Kali Linux armel||Image||Torrent||0.7G|
|Kali Linux armhf||Image||Torrent||0.7G|
Are you looking for Kali Linux VMWare, VirtualBox or ARM images? The good folks at Offensive Security (who are also the funders, founders, and developers of Kali Linux) have generated alternate flavours of Kali using the same build infrastructure as the official Kali releases. VMWare, VirtualBox and ARM architecture Kali images produced by Offensive Security can be found on the Official Offensive Security Kali Linux Virtual Images and Offensive Security Kali Linux ARM Images pages respectively.
When you download an image, be sure to download the SHA1SUMS and SHA1SUMS.gpg files that are next to the downloaded image (i.e. in the same directory on the Kali Linux Download Server). Before verifying the checksums of the image, you must ensure that the SHA1SUMS file is the one generated by Kali. That’s why the file is signed by Kali’s official key with a detached signature in SHA1SUMS.gpg. Kali’s official key can be downloaded like so:
Once you have downloaded both SHA1SUMS and SHA1SUMS.gpg, you can verify the signature as follows:
If you don’t get that “Good signature” message or if the key ID doesn’t match, then you should stop the process and review whether you downloaded the images from a legitimate Kali mirror.
Feeling a little more adventurous? Want to build the latest version of Kali? Want to customize your ISO? Looking for KDE, LXDE, MATE, XFCE and other customizations? This is the option for you. With everything set up correctly, the basic process is as simple as: