| name | kali-tools |
| description | Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools. |
| license | See original documentation |
| source_repo | https://gitlab.com/kalilinux/documentation/kali-tools.git |
| source_dir | kali-tools |
| source_commit | 6a986bc96e156a34ddc47f758a4449202a8e475d |
| source_branch | main |
| generated_at | Sat Jan 03 2026 15:46:07 GMT+0000 (Coordinated Universal Time) |
| generated_by | chatkali-skills-builder/0.2 |
| stats | [object Object] |
Kali Linux Tools
This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository.
Routing
Lookup order (strict):
- Open this
SKILL.mdand locate a category. - Open the category index in
references/uncategorized.md. - From the category, open a tool page in
references/tools/nmap.md.
Notes:
- A tool can belong to multiple categories.
- Tool pages always list their categories and link back.
Categories
| Category | Description | Aliases | Tools Count | Link |
|---|---|---|---|---|
| cryptography-steganography | Tools for encryption, decryption, and hiding data within other files (steganography). | cryptography-steganography | 11 | View |
| database-assessment | Tools for testing and exploiting database systems, including SQL injection and data extraction utilities. | database-assessment | 3 | View |
| defensive-tools | Tools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots. | defensive-tools | 28 | View |
| exploitation-tools | Tools for executing exploits against target systems, including social engineering toolkits and payload generators. | exploitation-tools | 61 | View |
| forensics | Tools for digital forensics, including disk imaging, file carving, and anti-forensics analysis. | forensics | 61 | View |
| hardware | hardware | 1 | View | |
| hardware-hacking | Tools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android. | hardware-hacking | 3 | View |
| information-gathering | Tools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning. | information-gathering | 265 | View |
| malware-analysis | Tools for analyzing malicious software, including sandboxes and signature matching utilities. | malware-analysis | 7 | View |
| password-attacks | Tools for cracking passwords via brute-force, dictionary attacks, or rainbow tables. | password-attacks | 77 | View |
| post-exploitation | Tools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts. | post-exploitation | 47 | View |
| reporting-tools | Tools for documenting findings, managing evidence, and generating penetration test reports. | reporting-tools | 9 | View |
| reverse-engineering | Tools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers. | reverse-engineering | 32 | View |
| sniffing-spoofing | Tools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers. | sniffing-spoofing | 45 | View |
| social-engineering-tools | Tools for performing social engineering attacks, such as phishing campaigns and malicious payload creation. | social-engineering-tools | 11 | View |
| system-services | Tools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files. | system-services | 14 | View |
| tunneling-exfiltration | Tools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls. | tunneling-exfiltration | 22 | View |
| utilities | General-purpose utilities for file manipulation, downloading, version control, and other essential tasks. | utilities | 373 | View |
| vulnerability-analysis | Tools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks. | vulnerability-analysis | 83 | View |
| web-application-analysis | Tools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools. | web-application-analysis | 68 | View |
| wireless-attacks | Tools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR. | wireless-attacks | 60 | View |
Build Info
- Generated at: 2026-01-03T15:46:07.212606
- Generated by: chatkali-skills-builder/0.2
- Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git
- Source dir: kali-tools
- Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d
- Source branch: main
- Tools total: 792
- Categories total: 21
- Multi-category tools: 383
- Uncategorized tools: 0