You are on page 1of 2

11/12/2020 Introduction | Kali Linux Documentation

Blog
Downloads
Training 
Advanced Web Attacks and Exploitation Penetration Testing with Kali Linux The Open Kali Linux Dojo
Kali Linux Revealed
Documentation 
Kali Linux Documentation Special Kali Linux Features Kali Linux Tools Website
Community 
Community Support Kali Linux Forums Kali Git Repository Report Kali Linux Bugs
About Us 
All About Kali Linux Kali Press Release Cookie Policy

Introduction
What is Kali Linux?
Should I Use Kali Linux?
Which Image Should I Download?
Downloading Kali Linux
Kali's Default Credentials
Kali Undercover
Kali Linux History
Kali's ARM History
Kali's NetHunter History

LIGHT
DARK

What is Kali Linux & Kali's features

Introduction
What is Kali Linux?
Should I Use Kali Linux?
Which Image Should I Download?
Downloading Kali Linux
Kali's Default Credentials
Kali Undercover
Kali Linux History
Kali's ARM History
Kali's NetHunter History

 Edit this page Kali Linux - Documentation What is Kali Linux? 


Downloads

Kali Linux Kali NetHunter Kali Linux Revealed Book

Links

Home Blog Documentation Tools Support Forum Bug Tracker System Status

https://www.kali.org/docs/introduction/ 1/2
11/12/2020 Introduction | Kali Linux Documentation

Courses

Penetration Testing with Kali Linux (PWK) Advanced Web Attacks and Exploitation (AWAE) Advanced
Windows Exploitation (AWE) Offensive Security Wireless Attacks (WiFu) [Free] Kali Linux Training [Free]
Metasploit Unleashed (MSFU)

Follow Us

Twitter Facebook GitLab Docker Vagrant Amazon AWS Microsoft Azure


Microsoft Store RSS GitHub

© OffSec Services Limited 2020. All rights reserved.

https://www.kali.org/docs/introduction/ 2/2

You might also like