get-kali page is up

Choose your Platform|

LIGHTDARK

Bare Metal

  • Direct access to hardware
  • Customized Kali kernel
  • No overhead

Single or multiple boot Kali, giving you complete control over the hardware access (perfect for in-built Wi-Fi and GPU), enabling the best performance.

Virtual Machines

  • Snapshots functionary
  • Isolated environment
  • Customized Kali kernel
  • Limited direct access to hardware
  • Higher system requirements

VMware & VirtualBox pre-built images. Allowing for a Kali install without altering the host OS with additional features such as snapshots. Vagrant images for quick spin-up also available.

ARM

  • Range of hardware from the leave-behind devices end to high-end modern servers
  • System architecture limits certain packages
  • Not always customized kernel

Works on relatively inexpensive & low powered Single Board Computers (SBCs) as well as modern ARM based laptops, which combine high speed with long battery life.

Mobile

  • Kali layered on Android
  • Kali in your pocket, on the go
  • Mobile interface (compact view)

A mobile penetration testing platform for Android devices, based on Kali Linux. Kali NetHunter consists of an NetHunter App, App Store, Kali Container, and KeX.

Cloud

  • Fast deployment
  • Can leverage provider's resources
  • Provider may become costly
  • Not always customized kernel

Hosting providers which have Kali Linux pre-installed, ready to go, without worrying about infrastructure maintenance.

Containers

  • Low overhead to access Kali toolset
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Using Docker or LXD, allows for extremely quick and easy access to Kali's tool set without the overhead of an isolated virtual machine.

Live Boot

  • Un-altered host system
  • Direct access to hardware
  • Customized Kali kernel
  • Performance decrease when heavy I/O

Quick and easy access to a full Kali install. Your Kali, always with you, without altering the host OS, plus allows you to benefit from hardware access.

WSL

  • Access to the Kali toolset through the WSL framework
  • Userland actions only
  • Not Kali customized kernel
  • No direct access to hardware

Windows Subsystem for Linux (WSL) is included out of the box with modern Windows. Use Kali (and Win-KeX) without installing additional software.


Build Scripts

Bare Metal VMs ARM Mobile Cloud Containers Live Boot WSL

Bare Metal

Kali is a rolling Linux distribution, meaning as soon as we have an update, we ship it. Would-be users have a variety of images to choose from. For more information, please see Which Image Should I Download? and Kali Branches. For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.

We generate fresh Kali Linux image files every quarter. These become the official "point" releases. These images are tested and subsequently announced with a blog post.

Installation Documentation

Our previous Kali Linux's releases.


SHA256sum

73be0d5be1c379e7a7149d650e4913cd8d23e6e3be4534d5e391550197f1e1f9

Weekly

Untested images with the latest updates

SHA256sum

cf672207806649fb60449e22935ab010bf973f8ef5cc9273dd2524c8d4e61066

NetInstaller

All packages are downloaded during installation

SHA256sum

5e991f01866996f255e592d5b44b8c709c36e7304d7f71535b2a5b5539843282

Weekly

Untested images with the latest updates

SHA256sum

41732f9dfbef2276d2836d76838a3a998eae35642d4094ade975c427356c1689

NetInstaller

All packages are downloaded during installation

SHA256sum

74424ad8b39c120dba7c12c552340926b804fbef8f5c7dcd846502b3cff2ca56

Weekly

Untested images with the latest updates

SHA256sum

72d75e87ac7c2be4c62e7ba434cc15ceadfb065ada2b396f3412576b28f4186d

NetInstaller

All packages are downloaded during installation



Q.) What’s the differences between: Installer? NetInstaller? Weekly? Live?
Q.) How to download Kali Linux images securely?


Want an Updated or Custom Kali Image?

Feeling a little more adventurous? Want to build the latest version of Kali? Want to customize your ISO by adding more tools or change the default settings? Looking for something other than Xfce, GNOME or KDE like Enlightenment, i3mw, LXDE or MATE? Then this is the option for you.

Read More On Custom Images

Virtual Machines

Kali Linux VMware & VirtualBox images are available for users who prefer, or whose specific needs require a virtual machine installation.

These images have the default credentials "kali/kali".

Virtual Machines Documentation

SHA256sum

de78b3f6e1599987934b04c4c1b002c0bde67822591fef0aaf5191e60eef3025

VMware

SHA256sum

1956ab337923095d4213ade006938ac58e3d67b209b9647410e8d85e6eaac409

VirtualBox

SHA256sum

06142a974f35436575afb02b903ad1ad2a0416d27395014a0bdc95c385566675

VMware

SHA256sum

bf523cd070d47f2b2deff840eba513f5d0bd66d1451163fe65315879423d7590

VirtualBox




Vagrant

Vagrant is a tool for building and managing virtual machine environments. With a single configuration file, you can download a base “box” and apply additional configurations like adding an additional network interface, setting the number of CPU cores and memory, or running a script on first boot.

Kali-Vagrant Boxes

ARM

Are you looking for Kali Linux ARM images? We have generated flavours of Kali using the same build infrastructure as the official Kali releases for ARM architecture.

These images have a default credentials of "kali/kali".


Kali-ARM Documentation

Raspberry Pi Foundation

SHA256sum

b4aa3d3b405d52fbfae93ddebc58c5845e8d0218fd985401b2158305389a2c08

Raspberry Pi 2, 3, 4 and 400 (32-bit)

SHA256sum

5d36fdc4ddf8d27d407ef85a074f6f981c13e0a7abaca859af0c38eea8e8f1f0

Raspberry Pi 2 (v1.2), 3, 4 and 400 (64-Bit)

SHA256sum

07af60921a2d4b03a1f74a6895dde8811a1f0a970348948d30d62bc572043aa9

Raspberry Pi 1 (Original)

SHA256sum

93462d570e9db553e1c2a8728afe4913f153fb933c1134cc5cb585a80d65bde9

Raspberry Pi Zero/Zero W

SHA256sum

01f1aa80be46aac69474041cf4167016383aef740b9a5b1e9c5f164fc5431378

Raspberry Pi Zero/Zero W ('Pi-Tail' Edition)

Pine64

SHA256sum

90cb2961253a880e255d793214c96102dccc49ca79019565ec6498c085f02309

Pinebook

SHA256sum

5810c4e8462b6c9b65fab25832c169633da6859b1fce89313be3c771c4657626

Pinebook Pro

HardKernel

SHA256sum

8d5db7466b47147ebe28cc3ff9cceb98f71a96330d4cf65fbc8be0a1c88ca2f8

ODROID-C2

SHA256sum

1cd94374f4a8b5fb4a00aa1c18830134de6f8396efda4407c7fbcf308770459b

ODROID-XU3

FriendlyARM

SHA256sum

2e935d3cba745a0846e7258bbcc018167d1eb0ddc872b923ab1c9da9dd59d357

NanoPi3

SHA256sum

07e481c586f1bd4f98a36fa7f7e6f15b4e23e4ba38fa8aea412b7939e3c740d5

NanoPi NEO Plus2

Banana Pi

SHA256sum

578661cd264b9666f19bee72d4a94aaf772d09c68dbf8fa2d0e0ae1fd168bb46

Banana Pi

SHA256sum

a4d8cd5c2a40cebfc54f6f30cdbe828c7f328bf4af50cd5b7ea03dba7c54a018

Banana Pro

Gateworks

SHA256sum

338df20b663d81918f3a9ae4104141184f3962b9529256710ab1a85277b083c3

Ventana



I.) SHA256SUMS are for the compressed file (*.img.xz)

Mobile

The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the Kali toolset from various supported Android devices. There are multiple unique features not possible on other hardware platforms.

The Kali NetHunter interface allows you to easily work with complex configuration files through a local web interface. This feature, together with a custom kernel that supports 802.11 wireless injection and preconfigured connect back VPN services, make the Kali NetHunter a formidable network security tool or discrete drop box - with Kali Linux at the tip of your fingers wherever you are!

Statistics

Want to see Kali NetHunter progress? Look at the stats page, to see if your device is supported yet.

Kali NetHunter provides:

    • A dedicated NetHunter App, providing a touch screen optimized GUI for common attack categories, such as:
    • One-click MANA Evil Access Point setups.
    • USB HID Keyboard attacks, much like the Teensy device is able to do.
    • BadUSB MITM attacks. Plug in your Kali NetHunter to a victim PC, and have your traffic relayed though it.
    • Bluetooth attacks.

  • Full Kali Linux toolset, with many tools available via a simple menu system.
  • Command line interface to the Kali Linux container.
  • Kali desktop EXperience (KeX)
  • Custom, device specific kernel with wireless injection support.
  • HDMI output of Kali desktop to external display for supported devices.
  • USB Y-cable with the Kali NetHunter kernel - use your OTG cable while still charging your device!
  • Software Defined Radio support (SDR). Use Kali NetHunter with your HackRF to explore the wireless radio space.
  • NetHunter app store allowing you to grow the potential of Kali NetHunter.

Kali NetHunter Documentation

OnePlus

SHA256sum

753ef16eb45a3f4b46056ed4576f218a3478d1a4955f8e2354b1b7c076685dc7

OnePlus One (11)

SHA256sum

84d4b1aaeca98a4fc9e983c457f2b23fd51403bd0546a7dc6c3eb44a4505a159

OnePlus 2 (Nougat 5.x)

SHA256sum

157f62048ee8fc9a2e73b5ac993fabc375d168882d2bc8087117e270b5bc2728

OnePlus 2 (Pie 9.0)

SHA256sum

7c32304e2eb67cf5cf2f0cbb6c0d2c5910808db7db2c2a6ddbb09401d39b20df

OnePlus 3 (AnyKernel Pie 9.0)

SHA256sum

b3dd27498c0fdef74a5a902772d81de5f1a841cb9a58fafda74e0acb8bafab15

OnePlus 3 (AnyKernel 10)

SHA256sum

6c3fcea084a13338b6a6936ddbc620aba6fa97bd2e39e0037ce42f00e10f799b

OnePlus 6 (OxygenOS 10)

SHA256sum

c90ae08c24964607fba2aea56e55accbbdf3068dbed8d17c19c6e47acc453b96

OnePlus 7 / OnePlus 7 Pro (OxygenOS 10)

SHA256sum

9f27d045a6f95d313a0063eb0a27d51f47ece588363e7f5ff8a0ea008d64f41d

OnePlus Nord (11)

Xiaomi

SHA256sum

5954d8dfa4b19ea7b5f39946ed83bae2e4f034bbcc1cb8b4cccee244ceb1cb27

Davinci Miui (10)

SHA256sum

75e809978b055c903abc2cb6def3d3f2f868b205ea6cbd23fffa8e6148791b88

Xiaomi Mi A3 (LineageOS 18.1)

Nexus

SHA256sum

ce409137e5a361232530afa65e03149657e18ba2734851d77e7e518ea60f1022

Nexus 5 (Marshmallow 6.0)

SHA256sum

7e8561ed03335580e1ade882c49287d32bb9538a7a4b31af34224ef28d221de3

Nexus 5 (Nougat 5.x)

SHA256sum

3117f601e934ca1432305c13297291e0795199d132ee95a11dd9871c26f4e614

Nexus 5X (Oreo 8.0)

SHA256sum

1bed5813db1e81aad4527324662c3effc4d4723315bf1235aa2822c4664caef9

Nexus 6 (LineageOS Pie 9.0)

SHA256sum

b1a82321c18e89bc083fccb18f5174126f53ea1725bb8cbeff0d9ba22e8ab01d

Nexus 6 (Nougat 5.x)

SHA256sum

e203aae021e95fb535f3bc09afb9643619d4726b8323238cd696c4c65cda2f35

Nexus 6P (LineageOS 10)

SHA256sum

3d92323c9137508ef71e8cb0da59aea6569a993b251bdb7476d0d041148aa2c2f

Nexus 6P (Oreo 8.0)

SHA256sum

4a6e901785684ae0b1b128f4956eb66d36737f348f3b1d44207f0ea8502b43e6

Nexus 7 2013 (Marshmallow 6.0)

SHA256sum

02601dfe24b3e4725650a100f23dc0fa9687f7d7be49e46292d6072d58729f2d

Nexus 7 2013 (CyanogenMod Marshmallow 6.0)

SHA256sum

f639e1bbbc0652dc08d9625b22d6a49449a25e5c02be6e549364834d68e669ad

Nexus 9 (Nougat 5.x)

SHA256sum

9e9db3feaa45db26a5d094cc047e5682983752910f19d09ac07012b8ac0a790a

Nexus 10 (Lollipop)

Samsung

SHA256sum

29da5368ea7d808e86835c90502106b28b15d9faac575d36786d121c501c0f68

Samsung Galaxy Tab S4 (LTE) (Oreo 8.0)

SHA256sum

1d1902c7a37a746d72e1b0b96ce8c790229fe715598f6536894d1b72f5fdfa00

Samsung Galaxy Tab S4 (WiFi) (Oreo 8.0)

Gemini

SHA256sum

0d2cf313668cecc4ec04888b7acce4ae0adc30332f35cae6b444f89c3a9f5987

Gemini PDA (Nougat 5.x)

LG

SHA256sum

87e1909125300248037e6dd9f267122d2eec6c4a0a4151e74c3ed73340f024be

LG V20 Int (Nougat 5.x)

Nokia

SHA256sum

1efe4fc74baf75fd60947e0cd55dc7b2fd8cb7b7a928880e952ea32c54fe0e81

Nokia 3.1 (Pie 9.0)

SHA256sum

8309f2d704d4dbe0a9340032a860abf1a6c08cf4980ba4080d6574e8a34c9282

Nokia 6.1 (11)

Sony XPeria

SHA256sum

9472ef4c373186ca7f0caf3a7f7efb6348c47058e7b3d1cd170174c327a9fb21

Sony XPeria Z1 (Marshmallow 6.0)

SHA256sum

e3b5041347a6281d86b84cb40c666c1415760ab1259bfe36ec9f7dc488475982

Sony XPeria Z1 (Pie 9.0)

Zerolte

SHA256sum

e161d297082fa3469c7cb612344b37f286a7d9e6342aeeefaf5d6e5fb6ce6d7c

Zerolte (Nougat 5.x)

ZTE

SHA256sum

33969bd0099755f9b32546ad3b4821f2f43c80e466188968f1da75525572c58b

ZTE Axon 7 (Marshmallow 6.0)

TicWatch Pro

SHA256sum

16b798bc8c411d912be1eb6f8100855c3237e1ab32d9cfb4b54056714cbe4a2c

TicWatch Pro (WearOS Nano)

Generic

SHA256sum

19fd27ed7274d1e1a277bf88560847b3e960182f034f3b853bf999497a6dba5e

Generic ARM64

SHA256sum

5228c79b09accdc087d12adc7a7123ee5c01007ab520c1ec503acca066517b03

Generic ARMhf

Cloud

Kali Cloud images can quickly be deployed in multiple different cloud provider’s infrastructures. This allows easy access to a Kali install in a modern environment with strong hardware resources. These are often used for short term Kali installs that are quick to deploy and quick to tear down.


Kali-Cloud Documentation

Containers

Using Container technology such as Docker and LXC/LXD, our Kali containers allow you access to the Kali toolset on your host operating system without the overhead of running an additional full operating system. This does come with limitations, as you won’t have direct hardware access and dealing with inbound connections to tools running in the Kali container can be complicated.


Kali-Containers Documentation

Live Boot

A Kali Linux Live image on a CD/DVD/USB/PXE can allow you to have access to a full bare metal Kali install without needing to alter an already-installed operating system. This allows for quick easy access to the Kali toolset with all the advantages of a bare metal install. There are some drawbacks, as disk operations may slow due to the utilized storage media.

For most users, we recommend the latest “point release” image below, except in cases when a user requires a specific bug patch, in which case the weekly build may be best.


Kali-USB Documentation

SHA256sum

8781b0fb88ba2d3819fade743add2c7f77087f389c07dab747bd6f7fc7a91e48

Weekly Image

SHA256sum

4ac7384a43b712956043229ead8b9ebfef652a60e3f38141c07d5a6acbe225e8

Weekly Image

SHA256sum

5ab2418f735a4d050a7afc71804a701c850a9fe6cc779e22ffd46f43fcdb3805

Weekly Image

WSL

Windows Subsystem for Linux (WSL) is a software package on modern Windows installs that allow you to run Linux alongside your Windows system in an optimized container. The Kali WSL package allows easy access to the Kali toolset. This comes with the same drawbacks of a standard VM, but allows for less overhead and tighter integration with your Windows systems.

WSL Documentation

Microsoft Store

Build Scripts

Experienced penetration testers and security professionals use and trust Kali Linux because we provide full transparency into the build scripts. Feel free to read, investigate, and change build scripts for any images below.


Build Scripts Repository