Claude Code Plugins

Community-maintained marketplace

Feedback
10
0

Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools.

Install Skill

1Download skill
2Enable skills in Claude

Open claude.ai/settings/capabilities and find the "Skills" section

3Upload to Claude

Click "Upload skill" and select the downloaded ZIP file

Note: Please verify skill by going through its instructions before using it.

SKILL.md

name kali-tools
description Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools.
license See original documentation
source_repo https://gitlab.com/kalilinux/documentation/kali-tools.git
source_dir kali-tools
source_commit 6a986bc96e156a34ddc47f758a4449202a8e475d
source_branch main
generated_at Sat Jan 03 2026 15:46:07 GMT+0000 (Coordinated Universal Time)
generated_by chatkali-skills-builder/0.2
stats [object Object]

Kali Linux Tools

This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository.

Routing

Lookup order (strict):

  1. Open this SKILL.md and locate a category.
  2. Open the category index in references/uncategorized.md.
  3. From the category, open a tool page in references/tools/nmap.md.

Notes:

  • A tool can belong to multiple categories.
  • Tool pages always list their categories and link back.

Categories

Category Description Aliases Tools Count Link
cryptography-steganography Tools for encryption, decryption, and hiding data within other files (steganography). cryptography-steganography 11 View
database-assessment Tools for testing and exploiting database systems, including SQL injection and data extraction utilities. database-assessment 3 View
defensive-tools Tools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots. defensive-tools 28 View
exploitation-tools Tools for executing exploits against target systems, including social engineering toolkits and payload generators. exploitation-tools 61 View
forensics Tools for digital forensics, including disk imaging, file carving, and anti-forensics analysis. forensics 61 View
hardware hardware 1 View
hardware-hacking Tools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android. hardware-hacking 3 View
information-gathering Tools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning. information-gathering 265 View
malware-analysis Tools for analyzing malicious software, including sandboxes and signature matching utilities. malware-analysis 7 View
password-attacks Tools for cracking passwords via brute-force, dictionary attacks, or rainbow tables. password-attacks 77 View
post-exploitation Tools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts. post-exploitation 47 View
reporting-tools Tools for documenting findings, managing evidence, and generating penetration test reports. reporting-tools 9 View
reverse-engineering Tools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers. reverse-engineering 32 View
sniffing-spoofing Tools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers. sniffing-spoofing 45 View
social-engineering-tools Tools for performing social engineering attacks, such as phishing campaigns and malicious payload creation. social-engineering-tools 11 View
system-services Tools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files. system-services 14 View
tunneling-exfiltration Tools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls. tunneling-exfiltration 22 View
utilities General-purpose utilities for file manipulation, downloading, version control, and other essential tasks. utilities 373 View
vulnerability-analysis Tools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks. vulnerability-analysis 83 View
web-application-analysis Tools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools. web-application-analysis 68 View
wireless-attacks Tools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR. wireless-attacks 60 View

Build Info

  • Generated at: 2026-01-03T15:46:07.212606
  • Generated by: chatkali-skills-builder/0.2
  • Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git
  • Source dir: kali-tools
  • Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d
  • Source branch: main
  • Tools total: 792
  • Categories total: 21
  • Multi-category tools: 383
  • Uncategorized tools: 0