get-kali page is up

Choose your Platform|

LIGHTDARK

Bare Metal

  • Direct access to hardware
  • Customized Kali kernel
  • No overhead

Single or multiple boot Kali, giving you complete control over the hardware access (perfect for in-built Wi-Fi and GPU), enabling the best performance.

Virtual Machines

  • Snapshots functionary
  • Isolated environment
  • Customized Kali kernel
  • Limited direct access to hardware
  • Higher system requirements

VMware & VirtualBox pre-built images. Allowing for a Kali install without altering the host OS with additional features such as snapshots. Vagrant images for quick spin-up also available.

ARM

  • Range of hardware from the leave-behind devices end to high-end modern servers
  • System architecture limits certain packages
  • Not always customized kernel

Works on relatively inexpensive & low powered Single Board Computers (SBCs) as well as modern ARM based laptops, which combine high speed with long battery life.

Mobile

  • Kali layered on Android
  • Kali in your pocket, on the go
  • Mobile interface (compact view)

A mobile penetration testing platform for Android devices, based on Kali Linux. Kali NetHunter consists of an NetHunter App, App Store, Kali Container, and KeX.

Cloud

  • Fast deployment
  • Can leverage provider's resources
  • Provider may become costly
  • Not always customized kernel

Hosting providers which have Kali Linux pre-installed, ready to go, without worrying about infrastructure maintenance.

Containers

  • Low overhead to access Kali toolset
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Using Docker or LXD, allows for extremely quick and easy access to Kali's tool set without the overhead of an isolated virtual machine.

Live Boot

  • Un-altered host system
  • Direct access to hardware
  • Customized Kali kernel
  • Performance decrease when heavy I/O

Quick and easy access to a full Kali install. Your Kali, always with you, without altering the host OS, plus allows you to benefit from hardware access.

WSL

  • Access to the Kali toolset through the WSL framework
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Windows Subsystem for Linux (WSL) is included out of the box with modern Windows. Use Kali (and Win-KeX) without installing additional software.


Build Scripts

Bare Metal VMs ARM Mobile Cloud Containers Live Boot WSL

Bare Metal

Kali is a rolling Linux distribution, meaning as soon as we have an update, we ship it. Would-be users have a variety of images to choose from. For more information, please see Which Image Should I Download? and Kali Branches. For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.

We generate fresh Kali Linux image files every quarter. These become the official "point" releases. These images are tested and subsequently announced with a blog post.

Installation Documentation

Our previous Kali Linux's releases.


SHA256sum

e1b9b683639cf7a3343c727235232fe0e18746c9fd511a3348f4cc57c9f001f9

Weekly

Untested images with the latest updates

SHA256sum

bfe9e2797eff82996dfad8144c4d2c80d1aab2549e7f382ff17159f5018d44aa

NetInstaller

All packages are downloaded during installation

SHA256sum

84df2ee9c0abdfaf70bf4b5bf51836fd0c24a3ea8bf87f199fc2efaf534dd430

Weekly

Untested images with the latest updates

SHA256sum

b5ee578089324f9f488903535b85ebbb33cafec943b72186da00756087001ccd

NetInstaller

All packages are downloaded during installation

SHA256sum

84ec26685331a096237a79a82e06552ab634db2308295833faf85ec6198f8bbe

Weekly

Untested images with the latest updates

SHA256sum

d59155e30231f5c327514d947e9f8d68464edfb9721ad7f2656200114f827191

NetInstaller

All packages are downloaded during installation



Q.) What’s the differences between: Installer? Live? NetInstaller?


Want an Updated or Custom Kali Image?

Feeling a little more adventurous? Want to build the latest version of Kali? Want to customize your ISO by adding more tools or change the default settings? Looking for something other than Xfce, GNOME or KDE like Enlightenment, i3mw, LXDE or MATE? Then this is the option for you.

Read More On Custom Images

Virtual Machines

Kali Linux VMware & VirtualBox images are available for users who prefer, or whose specific needs require a virtual machine installation.

These images have the default credentials "kali/kali".

Virtual Machines Documentation

SHA256sum

097bbc9b669be12a8bfa5bfa0bbd32a3c314016980f99826f05f219c26ab2116

VMware

SHA256sum

ac5d1c2c124ed0974c13a5619b6a8d65064586e5a44961ff00a6e1a2e717abdc

VirtualBox

SHA256sum

0131eb97ca30f456c0444bd2d610a90efc8ef8b5fe6a447efad4183d97671710

VMware

SHA256sum

6c54703c7bb6a21efd6cfc6bdc6393f46675f82665ba46d7a2647af3ef755b2f

VirtualBox




Vagrant

Vagrant is a tool for building and managing virtual machine environments. With a single configuration file, you can download a base “box” and apply additional configurations like adding an additional network interface, setting the number of CPU cores and memory, or running a script on first boot.

Kali-Vagrant Boxes

ARM

Are you looking for Kali Linux ARM images? We have generated flavours of Kali using the same build infrastructure as the official Kali releases for ARM architecture.

These images have a default credentials of "kali/kali".


Kali-ARM Documentation

Raspberry Pi Foundation

SHA256sum

1774f06c3f38354ef986707b82a658728fc39cf8108c8e18aca69b64840a7d3b

Raspberry Pi 1 (Original)

SHA256sum

9da12eb9899c7b9a6860ba421bb9f45ce023593b58869ff2ab8db69ce8aa2630

Raspberry Pi 2, 3, 4 and 400 (32-bit)

SHA256sum

97549d9e24dbd73add004b9521874dff6351a6275428356e804b98eb9e842c99

Raspberry Pi 2 (v1.2), 3, 4 and 400 (64-Bit)

SHA256sum

92a99c0890600c3555897c7462740cb01be3a1d208952cceba212dce6004a3ad

Raspberry Pi Zero/Zero W

Pine64

SHA256sum

d1350ffc082eb459179e654251515b13da2e9ea1f0a11dcb4ac8b6b8de4315bf

Pinebook

SHA256sum

6bc537937adf31fc0cdb8d3ffd365d7d338952d998e0a41ce17f44dcc6a3367d

Pinebook Pro

HardKernel

SHA256sum

881f51d6e6b0042aed7ae237e5ecb737d319c7d0fee659a532d227a590fc0380

ODROID-C2

SHA256sum

e93b21c64827057e1e3d1714486ba7170c256d9c83d58a9e850189a4900e6770

ODROID-XU3

FriendlyARM

SHA256sum

512795147f083c92ffe212a7be717c5df3eeaf46ead6712eed792b9ba554994a

NanoPi3

SHA256sum

2f577100f56ceb503b67b8f2ae837a3a61be7505d5554d4e0ea782f94217102d

NanoPi NEO Plus2

Banana Pi

SHA256sum

b459e01a01e0ddf48b5190b368a434e8a4cb36113de528ca2bfd195e786612dc

Banana Pi

SHA256sum

d6e79584cecf12ba2d100efda802b764daa8f4e2b9b901cf87265377620a7040

Banana Pro

Gateworks

SHA256sum

172ed80cecda1c3c65db846e4bc26689367245ba23017f2c8458857bf5e540a8

Ventana



I.) SHA256SUMS are for the compressed file (*.img.xz)

Mobile

The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the Kali toolset from various supported Android devices. There are multiple unique features not possible on other hardware platforms.

The Kali NetHunter interface allows you to easily work with complex configuration files through a local web interface. This feature, together with a custom kernel that supports 802.11 wireless injection and preconfigured connect back VPN services, make the Kali NetHunter a formidable network security tool or discrete drop box - with Kali Linux at the tip of your fingers wherever you are!

Statistics

Want to see Kali NetHunter progress? Look at the stats page, to see if your device is supported yet.

Kali NetHunter supports:

  • 802.11 Wireless Injection and AP mode with multiple supported USB Wi-Fi cards.
  • One-click MANA Evil Access Point setups.
  • USB HID Keyboard attacks, much like the Teensy device is able to do.
  • BadUSB MITM attacks. Plug in your Kali NetHunter to a victim PC, and have your traffic relayed though it.
  • Bluetooth attacks.
  • Full Kali Linux toolset, with many tools available via a simple menu system.
  • Command line interface to the Kali Linux container.
  • Kali desktop EXperience (KeX)
  • HDMI output of Kali desktop to external display for supported devices.
  • USB Y-cable with the Kali NetHunter kernel - use your OTG cable while still charging your device!
  • Software Defined Radio support (SDR). Use Kali NetHunter with your HackRF to explore the wireless radio space.
  • NetHunter app store allowing you to grow the potential of Kali NetHunter.

Kali NetHunter Documentation

OnePlus

SHA256sum

ba0c2f0026e5dbc5a100ee4022b102818665895c7e5242fc24126192ab216d01

OnePlus One (11)

SHA256sum

d201b8e4c5f3fceb65463e7c8e7c61ea1e5ca1170a81bd95d1078b350c3ebfdc

OnePlus 2 (Nougat 5.x)

SHA256sum

69a5b4e25a0d6ff7db300dc9e87a4a5927f5b3a9175ecb8a8c47652ed599178d

OnePlus 2 (Pie 9.0)

SHA256sum

07fa1d2d1756bbc73adc525ad09c1913334ca3767f0af9853230310bd6430687

OnePlus 3 (AnyKernel Pie 9.0)

SHA256sum

c98d8ed3a173fc7cb6e80887cd86edc40694a410a4726520940704b776ee435a

OnePlus 3 (AnyKernel 10)

SHA256sum

929a034c211751beda8923c3739057a4404483375a9ebaae76323514478f00a1

OnePlus 6 (OxygenOS 10)

SHA256sum

ae0d41006f954a0034157dc45049994ec7ee1779a66438b33117d2a7b6584a5d

OnePlus 7 / OnePlus 7 Pro (OxygenOS 10)

SHA256sum

6b5669772872850b9f0c0f8042f602044708f3f87f1f2040d0af1bc7c6264b5e

OnePlus Nord (11)

Xiaomi

SHA256sum

ff6580744697f5a2791b5f9d88fc018426901218cb1c7c147a5cf3dd6131e8f6

Davinci Miui (10)

SHA256sum

20a712c44eb2e287ff59cb03df6d94e240dde6ca9541a3f66c536bb133bd5ca0

Xiaomi Mi A3 (LineageOS 18.1)

Nexus

SHA256sum

633e960654f97f27136c76e6b0fe25c2c2719dbee3aa0cbe27626821966481ba

Nexus 5 (Marshmallow 6.0)

SHA256sum

174d67c35893eb429702ed50dda229de4de6590a632d595df87c8da7bcfb2254

Nexus 5 (Nougat 5.x)

SHA256sum

9e27ee7aa70532b48069da6e6f50b17a26184c55ba6903d1ce590e50b965a2b9

Nexus 5X (Oreo 8.0)

SHA256sum

e819c861f09539e7325f7626b2aac14241c55dd470f0d820a4e4acc8194a869f

Nexus 6 (LineageOS Pie 9.0)

SHA256sum

35594f997ca0546433cfef86fe46491bf687621e264f9142f47efd15b08aefc1

Nexus 6 (Nougat 5.x)

SHA256sum

236ba6ff92ab7f5bcb4c01801a0b960567aa8bd2875093e27392d5621f318cf1

Nexus 6P (LineageOS 10)

SHA256sum

820ab54b6b6d15bde26e60dba92f63d5441591d5e5a41da024541b7ee5cbd4fc

Nexus 6P (Oreo 8.0)

SHA256sum

522619640a50ea88a420cdfb2c06fdad3a2d9ca571a6de3be6a97ed60ee27c89

Nexus 7 2013 (Marshmallow 6.0)

SHA256sum

66e31177b47c99be581276810138bc11bb626750b74b31a6a8b69a02d1e380c8

Nexus 7 2013 (CyanogenMod Marshmallow 6.0)

SHA256sum

16c40c8deff28f8dae1fd44970d392c8b32d36a1dd180f11ade321ca8f04b10e

Nexus 9 (Nougat 5.x)

SHA256sum

b11290c13e33dab006160349f52c4f85b4ee8f22e81ec566e6940443d6e5beb3

Nexus 10 (Lollipop)

Samsung

SHA256sum

2bcb493f4d6d87f0a31de3389bd63d990678876436968262c0be4d6cbfde3a86

Samsung Galaxy Tab S4 (LTE) (Oreo 8.0)

SHA256sum

0289fc38833bd71fdf7c9984019593b0aedaaf45a704f0e22b0732c2dd6d7cd6

Samsung Galaxy Tab S4 (WiFi) (Oreo 8.0)

Gemini

SHA256sum

02a3996e30f5249253fa5787b3f245ed79848f61485bf96e9eb3b5d65dc311a9

Gemini PDA (Nougat 5.x)

LG

SHA256sum

7e7fab55485169b14e90cf087a9ed4e15dcc3357782ff9f517ef303bc476fa2b

LG V20 Int (Nougat 5.x)

Nokia

SHA256sum

d7c84e47268b3f3ed609e8b476108aecdaf99850ab87dd3a512a0d0c80e6058a

Nokia 3.1 (Pie 9.0)

SHA256sum

85effcdfce1c60d7b50bc7691e1824b2c7090bfa001deae31606567b1c48e832

Nokia 6.1 (11)

Sony XPeria

SHA256sum

b7944bc660f5fb6c11d2ea2e5e04537e8cc5a6a2187f73aa018c2e730e65b5b8

Sony XPeria Z1 (Marshmallow 6.0)

SHA256sum

237bca8d4c7ddc55457b48d03e1287c3dfd4c38de94e62ca3297ddd58c55f24f

Sony XPeria Z1 (Pie 9.0)

Zerolte

SHA256sum

7fa76d91e2c83c1a5db279adc61b846ad6f498f8f9293578d70c49ebb11bdfe2

Zerolte (Nougat 5.x)

ZTE

SHA256sum

82077bb11b1f60467a617f8d5c39186a322f3738c4708a3ca4838f0212eefab2

ZTE Axon 7 (Marshmallow 6.0)

Generic

SHA256sum

bfadbb281ff2cd1ce9c34b9827a30cd17d51edaa890cf2cb25076cabb9a18d52

Generic ARM64

SHA256sum

e6bb7067942e7e47e8d388b58d3a72ff993565cd33fccdc436e779225bdb6e97

Generic ARMhf

Cloud

Kali Cloud images can quickly be deployed in multiple different cloud provider’s infrastructures. This allows easy access to a Kali install in a modern environment with strong hardware resources. These are often used for short term Kali installs that are quick to deploy and quick to tear down.


Kali-Cloud Documentation

Containers

Using Container technology such as Docker and LXC/LXD, our Kali containers allow you access to the Kali toolset on your host operating system without the overhead of running an additional full operating system. This does come with limitations, as you won’t have direct hardware access and dealing with inbound connections to tools running in the Kali container can be complicated.


Kali-Containers Documentation

Live Boot

A Kali Linux Live image on a CD/DVD/USB/PXE can allow you to have access to a full bare metal Kali install without needing to alter an already-installed operating system. This allows for quick easy access to the Kali toolset with all the advantages of a bare metal install. There are some drawbacks, as disk operations may slow due to the utilized storage media.

For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.


Kali-USB Documentation

SHA256sum

a6e11071179f5c3a8c5195123b505f0d991a5c845d22bcba0f4355be69c6d9e8

Intel/AMD 64-bit

SHA256sum

13eb6d9fa8ff3cf39ddcaaab3e1b6d89f10835cc7af19ff15e15fce1112ad27d

Intel/AMD 32-bit

SHA256sum

63624345ebda89ac675c6aa950de8b8822f0261d5d9138ff371731ea1fd45be8

Apple M1

SHA256sum

1a4acd307ff98cb1e94a11631b583fdc56960337d5e1aa63ccd5b83f563c40df

Intel/AMD 64-bit

SHA256sum

f2a7716e3dba22c3869b4535aacacc36ac66044153dd465b8a0967df0edcc157

Intel/AMD 32-bit

SHA256sum

0b4009778ef28106eb143bd8526f9d7105c6c71a6540fa9ff268e83e2f586eb8

Apple M1

WSL

Windows Subsystem for Linux (WSL) is a software package on modern Windows installs that allow you to run Linux alongside your Windows system in an optimized container. The Kali WSL package allows easy access to the Kali toolset. This comes with the same drawbacks of a standard VM, but allows for less overhead and tighter integration with your Windows systems.

WSL Documentation

Microsoft Store

Build Scripts

Experienced penetration testers and security professionals use and trust Kali Linux because we provide full transparency into the build scripts. Feel free to read, investigate, and change build scripts for any images below.


Build Scripts Repository