Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

1 AWS reviews
  • 5 star
    0
  • 1
  • 3 star
    0
  • 2 star
    0
  • 1 star
    0

External reviews

15 reviews
from

External reviews are not included in the AWS star rating for the product.


    Gaurav Pratap Singh

Has improved penetration testing efficiency through pre-installed tools and supports faster secure deployments

  • September 30, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for Kali Linux is primarily for testing and cybersecurity, specifically for doing penetration testing on applications and network applications that we utilize for network monitoring.

A specific penetration test I performed using Kali Linux was for the application related to DDI, which encompasses DNS, DHCP infrastructure, and network monitoring as well as authentication for Cisco ISE, during which I used tools such as Hydra, Nmap, Ncat, and Wireshark to capture and analyze network packets.

Kali Linux fits into my team because I mainly work with network tools and focus primarily on DNS; it plays a crucial role in penetration testing and ensuring that my applications are secure against attacks through various cybersecurity criteria.

What is most valuable?

The best features Kali Linux offers include its Debian-based architecture and being open source, which is important for many reasons, such as allowing for live USB boot and custom ISOs, making penetration testing simpler with comprehensive pre-installed toolsets such as Nmap, useful for vulnerability scanning.

The live USB and custom ISO options help me specifically as they allow for quick access to a wide selection of pre-installed security tools, saving me time on installations and configurations through live USB boot functionality, which lets me get up and running quickly.

The integration of cloud and containers within Kali Linux is something I wish more people knew about, as it allows for utilizing containerized versions that provide scalability and eliminate the need for a virtual machine setup.

Kali Linux has positively impacted my organization by improving efficiency in penetration testing; its open-source nature permits extensive customization and inclusion of numerous comprehensive pre-installed tools, contributing to a secure network environment with effective monitoring of network applications.

The outcomes from using Kali Linux in our organization are significant; we experienced reduced cybersecurity attacks and improved application security, leading to decreased attack surfaces and quicker testing cycles that enabled faster launches and installations.

What needs improvement?

There are areas for improvement in Kali Linux, particularly regarding its use of the Linux kernel, which requires external additional patching, and the fact that network services are disabled by default, which complicates usage; enhancing user-friendliness through more GUI-based tools and better integration could be beneficial.

While Kali Linux is open source, it lacks vendor support, and I believe that improving documentation and community engagement is essential, making it more user-friendly and encouraging the use of GUI tools can significantly enhance the overall experience.

For how long have I used the solution?

I have been using Kali Linux for around five years, starting in 2018 or 2019, and I continue to use it until 2024, with plans to keep using Kali Linux starting in January 2025.

Which solution did I use previously and why did I switch?

Before switching to Kali Linux, we used Fedora for penetration testing. The decision to move to Kali Linux was influenced by its open-source nature, which reduced costs while facilitating easier automation with DevOps tools.

What was our ROI?

Integrating Kali Linux with DevOps tools has resulted in reduced operational costs due to automated test cases, making it a worthwhile investment with significant returns by decreasing the attack surface area and the frequency of attack incidents.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup costs, and licensing for Kali Linux has been positive, as it operates under an open-source model with setup costs primarily related to hardware and virtual machines, eliminating the need for vendor-specific licenses.

Which other solutions did I evaluate?

We evaluated alternatives to Kali Linux, including Parrot OS, BlackArch, BackBox, and the Network Security Toolkit (NST), but Kali Linux was chosen for its stability, open-source nature, and strong community support.

What other advice do I have?

Kali Linux's scalability is commendable; it allows for easy expansion through containerized versions and custom ISOs, although support is primarily dependent on the community rather than vendor assistance.

My advice for others looking into using Kali Linux is to ensure they have a strong foundation in Linux knowledge and are familiar with the various toolsets available within Kali Linux so that they can select the right tools for their specific needs.

I believe Kali Linux is a valuable open-source tool with great potential for growth through community involvement, and continuous development can enhance its position as a leading solution for penetration testing.

On a scale of one to ten, I rate Kali Linux an eight out of ten.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    Aditya Pillai

Has helped me learn penetration testing through hands-on tasks and faster workflows

  • September 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

I mainly use Kali Linux for educational purposes, such as learning pen testing and Linux fundamentals.

I have been using Kali Linux for the TryHackMe section and applying that learning into different automated scenarios of pen testing that are available on the TryHackMe website.

I haven't used Kali Linux for my organization, only for my learning purposes.

What is most valuable?

Since Kali Linux is a security-focused Linux distro, that would be its main advantage compared to Ubuntu or Arch Linux.

The overall focus on security in Kali Linux is what I find most useful.

TryHackMe has an inbuilt Linux distro for doing the assigned tasks, but sometimes network issues may arise or lag may occur. I use Kali Linux because it is fast and there are no hindrances. It provides quick results and helps me gain a deeper understanding of how something works.

What needs improvement?

It would be helpful if Kali Linux could be involved in more systems or laptops. Windows is a standard for many laptops and comes pre-installed on many devices available in the market. If Kali Linux could do the same and increase their reach to better areas, it would be beneficial.

They could improve Kali Linux's UI/UX. They have been following a standard UI/UX. They could add more options, similar to how CachyOS distro of Arch Linux has many different UI options to select from. Making Kali Linux more customizable would allow users to personalize it to their style.

Many users utilize Kali Linux through virtual machines. Sometimes Kali Linux has issues detecting hardware such as inbuilt or external Wi-Fi adapters. Improving device detection would be beneficial.

For how long have I used the solution?

I have been using Kali Linux for a couple of years.

What do I think about the stability of the solution?

Kali Linux is pretty stable.

What do I think about the scalability of the solution?

With enough resources, Kali Linux can handle enough tasks.

Which solution did I use previously and why did I switch?

I used Ubuntu before. I wasn't aware of Kali Linux when I first started. I was using Ubuntu for learning about cybersecurity and pen testing. Then I discovered Kali Linux.

I compared Ubuntu and Kali Linux, as there weren't many security-focused Linux distros available.

How was the initial setup?

Kali Linux is free software, an operating system that's available to download without any cost or licensing fees.

What was our ROI?

Kali Linux has helped me learn faster and understand concepts better. You get a sense of appreciation when completing tasks on your own machine without help or hints from available tools or operating systems, with minimal guidance.

I have saved time by avoiding the lag I sometimes face on the TryHackMe in-built machine, and I have learned more efficiently.

What's my experience with pricing, setup cost, and licensing?

Kali Linux is free software, an operating system that's available to download without any cost or licensing fees.

What other advice do I have?

Other than increasing my knowledge of the Linux distro, Kali Linux has helped me in automated scenarios and increased my knowledge in cybersecurity pen testing. I am still learning.

I would recommend starting with Ubuntu, learning basic Linux commands and Linux-related knowledge, including Debian. Then make the switch to Kali Linux when ready, starting with small tasks before moving on to bigger things.

On a scale of 1-10, I rate Kali Linux an 8.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other


    NilutpalDutta

Provides valuable real-time data scanning for vulnerability assessment

  • August 29, 2025
  • Review from a verified AWS customer

What is our primary use case?

We have some entirely backend services that function as an integration layer, where multiple applications exchange data through it. For any frontend and API control such as Acunetix or Qualys, they are not supported for those kinds of backend services. For that purpose, we are using Kali Linux. Kali Linux has the capability of real-time data scanning for vulnerability assessment for backend services. That is actually very far more valuable.

For backend service, Kali Linux is a very good tool, so I can recommend it for that.

What is most valuable?

Kali Linux has the capability of real-time data scanning for vulnerability assessment for backend services. That is actually very far more valuable.

The toolset on the security framework in Kali Linux is fulfilling our purpose of doing the assessment. We are good with that.

Kali Linux has the capability to expand more.

What needs improvement?

We don't know if Kali Linux has the port scanning capability yet, but that is an area of improvement because we are working with DMZ zones and customized ports. If we can add featured customized port scanning and DMZ zone capability, then it will be a very great tool. It might be there, but we are not exploring it yet.

We are not exploring 100% of Kali Linux capabilities. If real-time customized port scanning can be added, for example, instead of a default port such as 8080 or 443, if we can use a customized port such as 9876, that capability would be great.

The only point that I didn't find on Kali Linux for now is the ability to customize port scanning.

For how long have I used the solution?

It has been only five to six months, and the team is getting used to it now.

What do I think about the stability of the solution?

I should rate the stability of the product as average, good. I would rate it eight, minus two because I don't know about other capabilities.

What do I think about the scalability of the solution?

Kali Linux has the capability to expand more, so I would rate it nine.

Which solution did I use previously and why did I switch?

I won't compare Kali Linux with Linux from other vendors because we are installing it on top of Red Hat.

How was the initial setup?

The initial setup of Kali Linux is okay—not pretty complex or very simple.

It could be simplified from Kali's side for a GUI user, but if we are doing it as command mode, it is okay. We don't find it very hard to install or pretty complex.

For a regular user, they might find it complex. For the technical staff, it's not very complex.

What about the implementation team?

Our DevOps team is doing it, so it is somewhat customized.

Which other solutions did I evaluate?

I won't compare Kali Linux with Linux from other vendors because we are installing it on top of Red Hat. We can say the competitors of Acunetix, such as Burp Suite and Qualys Guard, those are the real competitors. Kali Linux is good because Sysbench is one kind of tool that has the capability of port scanning, but we don't know much about Sysbench as of now.

What other advice do I have?

We are not working with the multi-language support function as of now because we are very new to it, so we are exploring the stuff entirely.

We are not working with the resource constrainer system function. We just use scanning for incoming and outgoing data services as of now.

We are not exploring 100% of Kali Linux capabilities. If real-time customized port scanning can be added, for example, instead of a default port such as 8080 or 443, if we are able to use a customized port such as 9876, that capability would be great.

I prefer not to comment further because we are very new to the tool. We don't explore 100%, so I can't comment on it with my capacity right now.

I'm not sure about the pricing model because we got a community version of Kali Linux. The customer has purchased it, so I'm not sure about the pricing.

On a scale of one to ten, I rate Kali Linux an eight.

Which deployment model are you using for this solution?

On-premises

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    GurpreetSingh4

Has small footprint and low maintenance cycles

  • June 03, 2024
  • Review provided by PeerSpot

What is our primary use case?

In general, Kali Linux is used for hosting applications, developing new applications, and operating systems. It's also used in containers and nodes. The tool offers a smaller footprint than Windows because it lacks the functionality of graphical user interfaces. One advantage of Kali Linux is its lower maintenance requirements than Windows, with slower update cycles and easier maintenance procedures.

What is most valuable?

The tool's most valuable features are low maintenance and stability. 

What needs improvement?

The tool is already stable and well-developed, so there's minimal feedback for enhancement or change. However, it should improve security, which is crucial, especially with the increasing use of Kali Linux in cloud environments.

For how long have I used the solution?

I have been using the product for a few months. 

What do I think about the stability of the solution?

I rate the tool's stability a ten out of ten.

What do I think about the scalability of the solution?

Kali Linux is scalable and has a smaller footprint. It can be run on multiple instances of your applications.

How are customer service and support?

We have community support. I haven't faced any problems with support. 

How was the initial setup?

The tool's deployment is quick and straightforward compared to Windows. It takes about five to ten minutes to complete. 

What's my experience with pricing, setup cost, and licensing?

Kali Linux offers a perpetual license, meaning you pay for it once and can use it. While free versions of Linux are available, Kali Linux, being an enterprise edition, usually comes with a perpetual license. I rate its pricing a five out of ten. 

What other advice do I have?

Pre-installed tools can provide basic training and security measures, which is helpful. However, these tools may not be sufficient to secure your workload fully. That's why it's important to complement them with other specialized security tools to enhance your overall security.

Before using Kali Linux, make sure you know its pros and cons. It's a good system to learn because it's the best choice for some situations. It has default firewall settings that block everything by default. It's up to the user to decide how much they want to open up.       

Learning Kali Linux takes time because it relies on command-line tasks instead of graphical interfaces. Practice is key to becoming comfortable with it.


    VishalSingh

A stable and reliable solution for penetration and session testing

  • May 28, 2024
  • Review provided by PeerSpot

What is our primary use case?

Kali Linux's use cases are quite diverse. It can be used as an operating system for learning Linux, penetration testing, ethical hacking, and much more.

What is most valuable?

The most effective features of Kali Linux include its stability as a Linux operating system, its flexibility in configuring resources such as partitions, its powerful and stable file system, and its multi-user capability, which allows for setting user privileges and rights. Additionally, Kali Linux provides access to a wide range of free and open-source applications for testing and development purposes.

The tool's most valuable features for security tasks include its resistance to viruses, ability to configure and filter incoming connections, and security measures that make it difficult for hackers to break into the system. Linux systems are known for their strong security measures, including numerous checkpoints and gates that make hacking attempts difficult. As a result, many financial and scientific institutions prefer to use Linux for its enhanced security compared to Windows.

With access to a vast repository of tools, users can install third-party tools and perform various tasks related to network testing, penetration testing, and session testing.

What needs improvement?

The tool is slightly difficult to learn. 

What do I think about the stability of the solution?

I rate the tool's stability a nine out of ten. 

What do I think about the scalability of the solution?

Kali Linux's scalability depends on the available resources. Depending on the resources available, users can install multiple instances of Kali Linux, which can be scaled up to meet the needs of various user sizes.

How are customer service and support?

I've never contacted Kali Linux for technical support. Most issues and their resolutions are readily available on the internet.

How was the initial setup?

The solution's deployment is easy and takes about ten minutes to deploy. 

What other advice do I have?

I rate the overall product a nine out of ten. For aspiring ethical hackers, I highly recommend using Kali Linux. It's stable and reliable. However, remember that while Kali Linux is very reliable, new bugs and issues may arise occasionally, and driver support for new hardware can sometimes be lacking. 

Additionally, it's worth noting that Linux operating systems like Kali Linux are not designed for general entertainment purposes like gaming. They are preferred by developers, engineers, and technical users who want to customize and utilize the full potential of their operating system. If you're looking for a system for general purposes like internet browsing and gaming, Windows or macOS may be more suitable options.


    reviewer1232808

Very user-friendly and offers good performance

  • May 09, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the solution in my company for penetration testing. The product is used to check if there is any vulnerability within a system.

What is most valuable?

The solution's most valuable feature is that it is very easy to use. The tool is very user-friendly, and its performance is very good.

What needs improvement?

From an improvement perspective, it should be made possible for users to learn about the product easily.

For how long have I used the solution?

I have been using Kali Linux for three months.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution a nine out of ten.

How was the initial setup?

The product's initial setup phase was straightforward.

One just needs to create a bootable drive to install the product.

The solution is deployed on an on-premises model.

What about the implementation team?

I can take care of the product's installation myself.

What's my experience with pricing, setup cost, and licensing?

I have used the free version.

What other advice do I have?

I strongly recommend the product to others who plan to use it since it is a reliable tool.

When it comes to the learning curve for new users who plan to use the product, I would say that if someone is not familiar with cybersecurity, then they would need at least six months to a year to learn about the product.

In terms of the value derived from the use of the product, I could see that with the solution, I was able to see the vulnerabilities.

I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises


    Rohit Srivastava

SQLmap for web application testing and good for web application penetration testing, network testing, vulnerability assessment of any devices or domains

  • April 22, 2024
  • Review provided by PeerSpot

What is our primary use case?

In my cybersecurity work, I use Kali Linux for web application penetration testing, network testing, vulnerability assessment of any devices or domains, multiple testing types, and code testing. Those are certain basic use cases.

I used Kali Linux in multiple companies like banks, IT companies, and even smaller companies like music departments or other departments. But mostly, I use it for IT companies and banks.

How has it helped my organization?

The systems that are not completely updated create vulnerabilities on the system or on the domain. So first, we have to upgrade all the systems and apply complete security patches. In Windows, there are security patches; in Linux, there are also security patches. We'll upgrade the system. 

Additionally, Kali Linux is wonderful. If there is a specific requirement for a lower version, then we have to put a specific script over the database or over the code so nobody can directly access that code.

What is most valuable?

I frequently use SQLmap for web application testing, along with other tools like Burp Suite and Vega.

When we execute commands on tools and the few scripts that I have prepared, we will use SQLmap to execute those scripts on the target system. This helps us find loopholes. Like, a report may show TXG is open or that the configuration password is in cleartext. 

Based on this, we suggest vendors make the required changes, or if they are using an older version, they might need a newer upgrade. So there's a lot of capability in it. We suggest upgrading that version, and after completing the vulnerability assessment, we prepare a diagnostic report with suggestions. 

Once we provide complete details, then they take some time to fix those vulnerabilities. After that, we'll again execute the vulnerability assessment as a second phase. If everything goes fine, then we will give them certification that their system and application are now secure.

What needs improvement?

Sometimes, I do face challenges. There's an issue where sometimes during the initial installation, it doesn't install properly. It gives multiple errors like packages not installing, so we have to install those tools separately. For instance, if we want to install a network or other tools, we have to install those complete toolkits manually.

So, the challenge is with the initial setup, where I sometimes get errors. 

Regarding wireless attacks, OS attacks, and social engineering... the tools should be easier to learn because I know everything very well, but some people in my team struggle to understand. If there were GUI interfaces for the tools, it would help me guide my team in using them step-by-step. Command lines are very difficult for other team members who know the tool's purpose but not the Linux commands. GUI interfaces need more improvement.

So, the UI interface needs improvement to make it more visible and easier for users. Expert users can do everything without any issues, but new users will struggle.

For how long have I used the solution?

I've been working with Kali Linux for the last 10 to 12 years. I use the latest version. 

What do I think about the stability of the solution?

The stability is good because I've been using it for the last ten years. I've completed many successful projects, providing good vulnerability assessments to my clients and vendors.

What do I think about the scalability of the solution?

It is a scalable solution. I would rate the scalability an eight out of ten.  

We have about four to five users using Kali Linux. Two or three are basic users; they need to learn first before they can execute the scripts.

We do not plan to increase the further usage because we do not have the need. I and some other partners have good experience with it, and we are managing those parts.

How are customer service and support?

I tried to connect to customer support through email, but I received responses very slowly. In those situations, I do my own research and development to fix those particular errors.

For their understanding of the errors and providing solutions, I'd give them a ten out of ten. But about response time, I'll give it a five because it's very slow.

How would you rate customer service and support?

Neutral

How was the initial setup?

From my perspective, I can set up Kali Linux with information gathering, vulnerability analysis tools, and application analysis tools. I'm able to configure those. 

However, now many people are interested in cybersecurity. So, I suggest that Kali Linux should improve things like the GUI interface, make it easier to use, and include a training portal that's easier for basic users to understand.

I use it sometimes on-premises and sometimes on the cloud.

Sometimes the setup takes only one hour, no more than that. But if we start getting errors, then it can take four to five hours to complete the setup of Kali Linux.

What's my experience with pricing, setup cost, and licensing?

The price is good because Kali Linux already provides a good bundle of tools. The price is sufficient if you want a good operating system with the necessary tools. So, the cost is not an issue.

What other advice do I have?

Kali Linux is much better than others because it gives you a good set of tools. It is preferred for vulnerability assessments and cybersecurity. You don't have to spend a lot of money on different tools like Tenable. We don't need those because everything is already there in Kali. You just need to explore, configure it properly, and it will provide you with good results.

Overall, I would rate it an eight out of ten because any new user or someone without deep expertise won't be able to understand how to scale or manage it, but an experienced person can. 


    AntoSebastin

Helps to perform penetration testing for networks, web applications, and Android mobile apps

  • April 17, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the tool with Nmap to perform network audits. We use it to find vulnerabilities in our network through attacks. It's for those who want to launch or create viruses or perform attacks on systems. With Kali Linux, you can conduct penetration testing for networks, web applications, and Android mobile apps.

What needs improvement?

The product should improve its security features.

For how long have I used the solution?

I have been using the product for five years. 

What do I think about the stability of the solution?

I rate Kali Linux's stability a nine out of ten. 

What do I think about the scalability of the solution?

I rate the tool's scalability a seven to eight out of ten. I use it for my personal purposes. 

How are customer service and support?

Kali Linux is open-source and doesn't have support. 

How was the initial setup?

Setting up Kali Linux is straightforward. Deploying and installing it on our machines typically takes 25 minutes. The basic steps involve providing your name and selecting the location and time settings during installation. Once completed, you can use the default credentials to log into the Kali Linux operating system and gain permissions.

What's my experience with pricing, setup cost, and licensing?

The tool is open-source. 

What other advice do I have?

Kali Linux is a beginner tool. You can use it for testing and practicing. However, using it for real-time attacks can pose legal issues. Users can perform penetration testing but should refrain from attacking real company websites.

The tool is useful for personal use, such as for hackers or for conducting penetration testing and gathering information for review purposes. However, using it for unauthorized or suspicious activities could lead to legal repercussions.

I rate the overall product an eight out of ten. Hackers could potentially use it as a weapon to attack any company or website. 


    Aqeel Junaid

Offers good UI and is useful for vulnerability assessment

  • March 14, 2024
  • Review provided by PeerSpot

What is our primary use case?

I use the solution in my company for vulnerability assessment, to run penetration testing, and to do automated scans of the websites for malware. In general, the tool is useful to check for vulnerabilities in websites and applications.

What is most valuable?

The interface is good and straightforward to use.

What needs improvement?

In the older versions of the solution, there were problems with the UI. Improvements are only required in the UI of the product's older version. In the latest version of the product, the UI is good. If you know how to use the product, the UI part is okay.

There can be some lagging issues because the product gets stuck at times, making it an area of concern where improvements are required.

For how long have I used the solution?

I have experience with Kali Linux since 2017.

What do I think about the stability of the solution?

It is a stable solution. Stability-wise, I rate the solution an eight out of ten.

At times, the product gets stuck, and there are some lagging-related issues, but it is something that depends on the system you are running the product on, so you can change the system if required.

What do I think about the scalability of the solution?

It is a scalable solution.

Only I use the product in my company.

How was the initial setup?

The tool is not hard to deploy. You just need to download Kali Linux Images and decide on how you want to deploy it. You can deploy the tool directly on a laptop, or you can deploy it through VirtualBox from VMware. For deployment, I just need to open Kali Linux Image on VirtualBox.

What's my experience with pricing, setup cost, and licensing?

It is an open-source tool.

What other advice do I have?

I have found the tool to be the most effective when we want to run the vulnerability assessment provided by the solution in our company for certain websites and applications so that we can find or detect issues. In our company, Kali Linux is used for most of the use case scenarios where vulnerability assessment is required.

The areas I found to be the most effective from the perspective of security tasks are Zed Attack Proxy (ZAP), Metasploit, Wireshark, Nikto, and SQLMAP.

There have been a lot of benefits from the pre-installed tools in the product, in terms of security auditing part in our company. There are also other operating systems on which you can run Kali Linux, where users are provided with a massive range of tools like BlackArch Linux and ParrotOS, which are useful for certain use cases.

The product is good to start with, and it is good for penetration testing and vulnerability assessment. It is good for those who want to go into the line of website security. New users of the product should know the basics of Linux to be able to use the solution because it is an area that could be hard for many.

The value derived from the use of the product in our company stems from the results it provides us. The reason to use the product is to get answers when you run a vulnerability assessment from a security perspective. The product provides an outcome that can be used to access the security posture of an application, and it can also help you find loopholes. In general, it can be used to test applications.

I rate the tool a ten out of ten.


    FA9

Ensures a robust suite of penetration testing tools, extensive community support and customizable features for cybersecurity professionals

  • March 11, 2024
  • Review provided by PeerSpot

What is our primary use case?

I utilize Kali Linux for my penetration testing projects, where I leverage various tools like Austin Tools to gather additional information and for ethical hacking purposes. Since my primary operating system is Windows 11, I run Kali Linux in a virtualized environment using tools like VirtualBox.

How has it helped my organization?

The pre-installed tools on Kali Linux are incredibly useful, particularly for gathering information. When we first open the manual or explore the resources, we find a plethora of tools available for information gathering. These tools are indispensable for anyone using Kali Linux, as they provide essential functionality right from the beginning, especially in the realm of information gathering.


Linux offers customizable features that significantly enhance our workflow and testing processes. Its extensive customizability makes it easy to tailor to our specific needs.

What is most valuable?

Kali Linux provides me with a wide array of tools such as SQLMap, Nmap, and Hydra, which I explore to enhance my understanding of security concepts. Overall, Kali Linux offers a diverse toolkit for various security tasks.

The tools available in Kali Linux are incredibly effective for conducting security assessments. One tool I particularly favor is the Managed Tool, which I've been using for information gathering for about two years, especially for extracting hidden information from WhatsApp. Additionally, for SQL injection, I rely on SQLMap, and for conducting scans and reviews, I rely on VWNX.

What needs improvement?

The installation process of Kali Linux can be slow, particularly when installing and upgrading packages within virtualized environments. This sluggishness may be due to various factors, including the source of the download and any potential issues with the operating system.

For how long have I used the solution?

I have been using it for two years.

What do I think about the stability of the solution?

It's generally stable, especially when used for virtualization, which is how I primarily utilize it. I would rate it eight out of ten.

What do I think about the scalability of the solution?

It provides good scalability capabilities. I would rate it nine out of ten.

How are customer service and support?

The technical support for Kali Linux is quite reliable, primarily due to the active community engagement on forums. Additionally, the documentation available on the website is accurate and well-structured, providing clear guidance and support.

How was the initial setup?

The initial setup can be challenging sometimes. I would rate it eight out of ten.

What about the implementation team?

Deployment typically takes around ten minutes.

What's my experience with pricing, setup cost, and licensing?

I use it free of charge.

What other advice do I have?

I would recommend delving deeper into the functionality of the installation tools, particularly focusing on the favorite tools available on Linux. This includes tools beneficial for networking testing and other functionalities I've observed to be valuable. It seems worthwhile to invest time in studying the various tools offered by Kali Linux. Overall, I would rate it nine out of ten.