--- name: kali-tools description: Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools. license: See original documentation source_repo: https://gitlab.com/kalilinux/documentation/kali-tools.git source_dir: kali-tools source_commit: 6a986bc96e156a34ddc47f758a4449202a8e475d source_branch: main generated_at: 2026-01-03T15:46:07.212606 generated_by: chatkali-skills-builder/0.2 stats: tools_total: 792 categories_total: 21 multi_category_tools: 383 uncategorized_tools: 0 --- # Kali Linux Tools This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository. ## Routing **Lookup order (strict):** 1. Open this `SKILL.md` and locate a category. 2. Open the category index in `references/uncategorized.md`. 3. From the category, open a tool page in `references/tools/nmap.md`. Notes: - A tool can belong to **multiple categories**. - Tool pages always list their categories and link back. ## Categories | Category | Description | Aliases | Tools Count | Link | | --- | --- | --- | ---: | --- | | cryptography-steganography | Tools for encryption, decryption, and hiding data within other files (steganography). | cryptography-steganography | 11 | [View](references/cryptography-steganography.md) | | database-assessment | Tools for testing and exploiting database systems, including SQL injection and data extraction utilities. | database-assessment | 3 | [View](references/database-assessment.md) | | defensive-tools | Tools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots. | defensive-tools | 28 | [View](references/defensive-tools.md) | | exploitation-tools | Tools for executing exploits against target systems, including social engineering toolkits and payload generators. | exploitation-tools | 61 | [View](references/exploitation-tools.md) | | forensics | Tools for digital forensics, including disk imaging, file carving, and anti-forensics analysis. | forensics | 61 | [View](references/forensics.md) | | hardware | | hardware | 1 | [View](references/hardware.md) | | hardware-hacking | Tools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android. | hardware-hacking | 3 | [View](references/hardware-hacking.md) | | information-gathering | Tools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning. | information-gathering | 265 | [View](references/information-gathering.md) | | malware-analysis | Tools for analyzing malicious software, including sandboxes and signature matching utilities. | malware-analysis | 7 | [View](references/malware-analysis.md) | | password-attacks | Tools for cracking passwords via brute-force, dictionary attacks, or rainbow tables. | password-attacks | 77 | [View](references/password-attacks.md) | | post-exploitation | Tools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts. | post-exploitation | 47 | [View](references/post-exploitation.md) | | reporting-tools | Tools for documenting findings, managing evidence, and generating penetration test reports. | reporting-tools | 9 | [View](references/reporting-tools.md) | | reverse-engineering | Tools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers. | reverse-engineering | 32 | [View](references/reverse-engineering.md) | | sniffing-spoofing | Tools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers. | sniffing-spoofing | 45 | [View](references/sniffing-spoofing.md) | | social-engineering-tools | Tools for performing social engineering attacks, such as phishing campaigns and malicious payload creation. | social-engineering-tools | 11 | [View](references/social-engineering-tools.md) | | system-services | Tools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files. | system-services | 14 | [View](references/system-services.md) | | tunneling-exfiltration | Tools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls. | tunneling-exfiltration | 22 | [View](references/tunneling-exfiltration.md) | | utilities | General-purpose utilities for file manipulation, downloading, version control, and other essential tasks. | utilities | 373 | [View](references/utilities.md) | | vulnerability-analysis | Tools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks. | vulnerability-analysis | 83 | [View](references/vulnerability-analysis.md) | | web-application-analysis | Tools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools. | web-application-analysis | 68 | [View](references/web-application-analysis.md) | | wireless-attacks | Tools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR. | wireless-attacks | 60 | [View](references/wireless-attacks.md) | ## Build Info - Generated at: 2026-01-03T15:46:07.212606 - Generated by: chatkali-skills-builder/0.2 - Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git - Source dir: kali-tools - Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d - Source branch: main - Tools total: 792 - Categories total: 21 - Multi-category tools: 383 - Uncategorized tools: 0