Tagged articles
22 articles
Page 1 of 1
Black & White Path
Black & White Path
May 12, 2026 · Information Security

Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali

This guide shows how to install the open‑source OpenOcta AI Skill on Kali Linux, then use it to automate the four‑stage Chinese graded‑protection (等保) assessment—including information gathering, vulnerability scanning, exploit verification, and full compliance report generation—without manual configuration.

Kali LinuxOpenOctacompliance report
0 likes · 4 min read
Automate Chinese Graded Protection Assessment with OpenOcta AI Skill on Kali
Black & White Path
Black & White Path
May 2, 2026 · Information Security

Phalanx: An Open‑Source Autonomous Pentesting Assistant for Kali Linux

Phalanx is an open‑source, polyglot‑based automation framework for Kali Linux that coordinates Python, Bash and other scripts, provides a planner, engine and reporting modules, integrates with tools like Nmap and Metasploit, and generates traceable logs for efficient and flexible penetration testing.

AutomationKali Linuxopen source
0 likes · 4 min read
Phalanx: An Open‑Source Autonomous Pentesting Assistant for Kali Linux
Raymond Ops
Raymond Ops
Mar 5, 2025 · Information Security

Essential Kali Linux Penetration Testing Tools and How to Use Them

Explore the most common Kali Linux penetration testing utilities—including Nmap, Metasploit, Hydra, Wireshark, and more—organized by categories such as information gathering, vulnerability exploitation, password cracking, and network monitoring, with brief usage commands and guidance for each tool.

Kali LinuxNetwork Scanningmalware analysis
0 likes · 11 min read
Essential Kali Linux Penetration Testing Tools and How to Use Them
DevOps Operations Practice
DevOps Operations Practice
Jul 11, 2024 · Information Security

Top 7 Penetration Testing Tools and Their Key Features

This article introduces seven leading penetration testing tools—including Kali Linux, Metasploit, Wireshark, Nmap, Burp Suite, Acunetix, and Nessus—detailing their primary features and how they help security professionals identify and mitigate vulnerabilities effectively.

Burp SuiteKali LinuxMetasploit
0 likes · 9 min read
Top 7 Penetration Testing Tools and Their Key Features
DevOps Operations Practice
DevOps Operations Practice
Apr 21, 2024 · Information Security

Overview of Kali Linux: Features, Tools, and Use Cases

Kali Linux, a Debian‑based distribution maintained by Offensive Security, bundles over 600 penetration‑testing and digital‑forensics tools such as Metasploit, Nmap, Wireshark, Aircrack‑ng and John the Ripper, making it a preferred platform for security professionals in testing, forensics, and network defense.

Kali Linuxdigital forensicsinformation security
0 likes · 4 min read
Overview of Kali Linux: Features, Tools, and Use Cases
Liangxu Linux
Liangxu Linux
May 2, 2023 · Information Security

Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?

An in‑depth comparison of Kali Linux and Parrot OS examines their origins, pre‑installed security tools, customization options, hardware requirements, user interfaces, and performance, helping security professionals and enthusiasts choose the most suitable Linux distribution for penetration testing and privacy‑focused work.

Kali LinuxLinux DistributionParrot OS
0 likes · 10 min read
Kali Linux vs Parrot OS: Which Penetration Testing Distro Is Right for You?
MaGe Linux Operations
MaGe Linux Operations
Dec 2, 2022 · Information Security

Cracking Wi‑Fi Passwords with Aircrack‑ng on Kali Linux

This step‑by‑step guide shows how to enable monitor mode, capture WPA2 handshakes, and perform a dictionary attack using Aircrack‑ng on a Kali Linux system, covering device detection, network scanning, packet capture, and password cracking commands.

Aircrack-ngKali LinuxWi-Fi cracking
0 likes · 5 min read
Cracking Wi‑Fi Passwords with Aircrack‑ng on Kali Linux
Programmer DD
Programmer DD
Dec 10, 2021 · Operations

Which Linux Distribution Is Best for Developers, Ops, and Security Experts?

Based on ZDNet’s survey of professional developers, operations engineers, and security specialists, this article ranks the top five Linux distributions—Fedora, Arch Linux, Gentoo, Kali Linux, and SystemRescue—detailing each distro’s strengths, target audience, and unique features to help you choose the right platform.

Arch LinuxFedoraGentoo
0 likes · 6 min read
Which Linux Distribution Is Best for Developers, Ops, and Security Experts?
MaGe Linux Operations
MaGe Linux Operations
Sep 25, 2021 · Information Security

How to Build a Docker‑Based Kali Linux Lab with Web Target for Pen‑Testing

This guide walks you through creating a Docker‑powered environment that includes a graphical Kali Linux workstation and a web target machine with MySQL and Tomcat, covering Docker installation, image preparation, container configuration, remote desktop setup, and database integration for hands‑on information‑security practice.

DockerKali LinuxWeb Security
0 likes · 8 min read
How to Build a Docker‑Based Kali Linux Lab with Web Target for Pen‑Testing
Liangxu Linux
Liangxu Linux
Sep 19, 2020 · Information Security

Step-by-Step Guide: Installing Kali Linux on VirtualBox

This article explains what Kali Linux is, provides the official download link, and walks you through creating a VirtualBox VM, configuring settings, performing a graphical installation, and highlights important security warnings for using this penetration‑testing distribution.

Kali LinuxLinux InstallationVirtualBox
0 likes · 5 min read
Step-by-Step Guide: Installing Kali Linux on VirtualBox
ITPUB
ITPUB
Mar 13, 2018 · Fundamentals

Run Linux Distributions Directly on Windows 10 with the Subsystem for Linux

Windows 10’s Subsystem for Linux lets users install and run popular Linux distributions such as Ubuntu, Debian, Kali, SLES and openSUSE directly from the Microsoft Store, providing near‑full command‑line compatibility and enabling administrators to execute almost any Linux command on a Windows machine.

DebianKali LinuxLinux on Windows
0 likes · 3 min read
Run Linux Distributions Directly on Windows 10 with the Subsystem for Linux
ITPUB
ITPUB
Dec 17, 2015 · Information Security

Build an Android Pentesting Lab on Kali Linux – Full Step‑by‑Step Guide

This tutorial walks you through setting up a secure virtual Android environment on Kali Linux, installing required libraries, the Android SDK, creating AVDs, configuring the Smartphone‑Pentest‑Framework, and launching the framework to demonstrate mobile phone hacking techniques.

AVDAndroidKali Linux
0 likes · 8 min read
Build an Android Pentesting Lab on Kali Linux – Full Step‑by‑Step Guide
ITPUB
ITPUB
Dec 17, 2015 · Information Security

Build a Secure Android Pentesting Lab on Kali Linux

This guide walks you through creating a safe Android pentesting environment on Kali Linux, covering library installation, Android SDK setup, virtual device creation, framework deployment, and necessary service configuration to safely test smartphone vulnerabilities.

AVDAndroidFramework
0 likes · 7 min read
Build a Secure Android Pentesting Lab on Kali Linux