We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.
If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”
Customize cookie preferences
We use cookies and similar tools (collectively, "cookies") for the following purposes.
Essential
Essential cookies are necessary to provide our site and services and cannot be deactivated. They are usually set in response to your actions on the site, such as setting your privacy preferences, signing in, or filling in forms.
Performance
Performance cookies provide anonymous statistics about how customers navigate our site so we can improve site experience and performance. Approved third parties may perform analytics on our behalf, but they cannot use the data for their own purposes.
Allowed
Functional
Functional cookies help us provide useful site features, remember your preferences, and display relevant content. Approved third parties may set these cookies to provide certain site features. If you do not allow these cookies, then some or all of these services may not function properly.
Allowed
Advertising
Advertising cookies may be set through our site by us or our advertising partners and help us deliver relevant marketing content. If you do not allow these cookies, you will experience less relevant advertising.
Allowed
Blocking some types of cookies may impact your experience of our sites. You may review and change your choices at any time by selecting Cookie preferences in the footer of this site. We and selected third-parties use cookies or similar technologies as specified in the AWS Cookie Notice.
Your privacy choices
We display ads relevant to your interests on AWS sites and on other properties, including cross-context behavioral advertising. Cross-context behavioral advertising uses data from one site or app to advertise to you on a different company’s site or app.
To not allow AWS cross-context behavioral advertising based on cookies or similar technologies, select “Don't allow” and “Save privacy choices” below, or visit an AWS site with a legally-recognized decline signal enabled, such as the Global Privacy Control. If you delete your cookies or visit this site from a different browser or device, you will need to make your selection again. For more information about cookies and how we use them, please read our AWS Cookie Notice.
Kali Linux is a specialized Linux distribution designed primarily for cybersecurity and penetration testing purposes. It is a powerful and widely-used operating system by security professionals, ethical hackers, and cybersecurity enthusiasts. Kali Linux comes pre-loaded with a vast array of tools and utilities for assessing and testing the security of computer systems and networks. These tools include vulnerability scanners, password cracking tools, network analysis tools, and more. Kali Linux is known for its flexibility, open-source nature, and frequent updates, making it a valuable resource for those involved in securing and testing the security of computer systems and networks. However, it's important to note that the use of Kali Linux should always be within legal and ethical boundaries, with proper authorization and consent for security testing activities.
Kali Linux is a Debian-based Linux distribution specifically designed for digital forensics, penetration testing, and security auditing. It is maintained and funded by Offensive Security. Kali contains over 600 preinstalled tools aimed at various information security tasks such as forensics, scanning, reconnaissance, exploitation, privilege escalation, and exfiltration.
Some key features and tools include:
Forensics tools like Autopsy, DC3DD, and Guymager for forensic analysis and data recovery.
Network scanning and vulnerability assessment tools like Nmap, Wireshark, and OpenVAS to uncover weaknesses.
Exploitation tools such as Metasploit Framework, sqlmap, and John the Ripper to test and exploit vulnerabilities.
Password cracking and reverse engineering tools like Hashcat and IDA Pro.
Wireless and Bluetooth tools like Aircrack-ng, Kismet, and Ubertooth to assess wireless networks.
Social engineering tools like SET and Social Engineer Toolkit for simulating phishing and other social engineering attacks.
Web app analysis tools like Burp Suite, Nikto, and OWASP ZAP for testing web application security.
Post-exploitation and privilege escalation tools to get deeper access and admin controls.
Kali Linux is widely used by ethical hackers and security professionals to legally identify weaknesses in systems and applications to proactively improve security. It should only be used for lawful purposes. The distribution is frequently updated with the latest tool versions and security patches.
Highlights
Comprehensive penetration testing toolkit - Kali contains over 600 preinstalled tools for information security tasks like penetration testing, forensics, scanning, and exploitation. This saves infosec professionals time by having an integrated toolkit ready to go.
Wireless and Bluetooth auditing - It includes extensive tools for auditing wireless networks and devices such as 802.11 and Bluetooth. Tools like Aircrack-ng, Kismet, and Ubertooth enable full wireless penetration testing.
Advanced exploitation and privilege escalation - Kali has cutting-edge exploitation tools like Metasploit Framework as well as tools to help escalate privileges and pivot through systems. This helps pen testers thoroughly assess vulnerabilities and improve security.
This estimate is based on use of the seller's recommended configuration (t3a.medium) in the US East (N. Virginia) Region. View pricing details
$3.038/hour
Features and programs
Financing for AWS Marketplace purchases
AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
Pricing is based on a fixed monthly subscription cost and actual usage of the product. You pay the same amount each month for access, plus an additional monthly amount for usage. Usage charges vary according to how much you consume. The fixed subscription cost is prorated, so you're only charged for the number of days you've been subscribed. Subscriptions have no end date and may be canceled any time.
Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator to estimate your infrastructure costs.
We'd like to hear your feedback and ideas on how to improve this page.
Legal
Vendor terms and conditions
Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA).
Content disclaimer
Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.
An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.
Version release notes
Kali Linux 2022.4 Release Notes
We are pleased to announce the release of Kali Linux 2022.4, the latest version of the world's leading open source penetration testing platform. This release incorporates updated versions of many key security tools as well as the usual fixes and performance enhancements.
Key Tool Upgrades:
Nmap 8.10 - This latest version of the network scanner includes hundreds of new NSE scripts, improvements to Npcap for Windows networking, and better coverage of new operating systems.
Burp Suite 2022.9.3 - The web app scanner includes over 40 fixes, additions to the HTTP message editor, and improved handling of non-standard HTTP responses.
Metasploit 6.2.9 - Metasploit framework enhancements include improved evasion modules, updated SSH modules, and fixes for over 10 issues.
Aircrack-ng 1.7 - The Wi-Fi security auditing suite has several improvements for WPA3 cracking as well as new attack vectors for capturing handshakes.
General Changes:
Kernel updated to 5.15 for improved hardware support.
Transition from OpenJDK 11 to OpenJDK 17.
Updated desktop environments and window managers including Xfce 4.16.
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
The BIG-IP Virtual Edition (VE) is the industry's most trusted and comprehensive app delivery and security solution. Providing everything from intelligent traffic management and visibility, to app security, access, and optimization, BIG-IP VE ensures all of your apps are fast, available, and secure.
This product has charges associated with it for seller support and maintenance. Ready to use minimal RHEL 8 AMI within a default 20 GiB LVM managed instance volume. Login using 'ec2-user' and ssh public key authentication. Cloud-init included. ENA enabled. RedHat 8 packages and updates available from AWS RHUI. RHEL8 security updates available at the release date are included.
ClimateTracker provides intelligent AI Climate Disclosure reporting tools that guide organisations through changing climate standards, help make impactful climate decisions and reduce compliance costs
Quagos sensor data and ML-based technology offers real-time analysis to uncover critical patterns such as cheating, churn, UA fraud, player skill level, and more. Unlike traditional tools that rely on demographics and event-based data, Quago provides precise identification of these patterns, helping gaming companies prevent revenue loss.