Skip to content

A complete documentation for transforming yourself from script-kiddie to professional hacker.

License

Notifications You must be signed in to change notification settings

d0cxu/Kali-Linux

 
 

Repository files navigation

Kali Linux

Note:

This book is a complete unofficial documentation of all the tools in Kali Linux. The author(s) are not held liable for any mistakes done by the readers.

To see the official documentation click https://tools.kali.org/tools-listing.

The major sections of the book are:

  • [Introduction](1. Introduction/README.md)
  • [Exploitation Tools](2. Exploitation Tools/README.md)
  • [Forensics Tools](3. Forensics Tools/README.md)
  • [Hardware Hacking](4. Hardware Hacking/README.md)
  • [Information Gathering](5. Information Gathering/README.md)
  • [Maintaining Access](6. Maintaining Access/README.md)
  • [Password Attacks](7. Password Attacks/README.md)
  • [Reporting Tools](8. Reporting Tools/README.md)
  • [Reverse Engineering](9. Reverse Engineering/README.md)
  • [Sniffing & Spoofing](10. Sniffing & Spoofing/README.md)
  • [Stress Testing](11. Stress Testing/README.md)
  • [Web Applications](12. Web Applications/README.md)
  • [Wireless Attacks](13. Wireless Attacks/README.md)
  • [Useful Github Repositories](14. Useful Github Repositories/README.md)
  • [Miscellaneous](15. Conclusion/README.md)

About

A complete documentation for transforming yourself from script-kiddie to professional hacker.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published