kali-tools

Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "kali-tools" with this command: npx skills add tzf1003/chatkali/tzf1003-chatkali-kali-tools

Kali Linux Tools

This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository.

Routing

Lookup order (strict):

  1. Open this SKILL.md and locate a category.
  2. Open the category index in references/uncategorized.md.
  3. From the category, open a tool page in references/tools/nmap.md.

Notes:

  • A tool can belong to multiple categories.
  • Tool pages always list their categories and link back.

Categories

CategoryDescriptionAliasesTools CountLink
cryptography-steganographyTools for encryption, decryption, and hiding data within other files (steganography).cryptography-steganography11View
database-assessmentTools for testing and exploiting database systems, including SQL injection and data extraction utilities.database-assessment3View
defensive-toolsTools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots.defensive-tools28View
exploitation-toolsTools for executing exploits against target systems, including social engineering toolkits and payload generators.exploitation-tools61View
forensicsTools for digital forensics, including disk imaging, file carving, and anti-forensics analysis.forensics61View
hardwarehardware1View
hardware-hackingTools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android.hardware-hacking3View
information-gatheringTools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning.information-gathering265View
malware-analysisTools for analyzing malicious software, including sandboxes and signature matching utilities.malware-analysis7View
password-attacksTools for cracking passwords via brute-force, dictionary attacks, or rainbow tables.password-attacks77View
post-exploitationTools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts.post-exploitation47View
reporting-toolsTools for documenting findings, managing evidence, and generating penetration test reports.reporting-tools9View
reverse-engineeringTools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers.reverse-engineering32View
sniffing-spoofingTools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers.sniffing-spoofing45View
social-engineering-toolsTools for performing social engineering attacks, such as phishing campaigns and malicious payload creation.social-engineering-tools11View
system-servicesTools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files.system-services14View
tunneling-exfiltrationTools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls.tunneling-exfiltration22View
utilitiesGeneral-purpose utilities for file manipulation, downloading, version control, and other essential tasks.utilities373View
vulnerability-analysisTools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks.vulnerability-analysis83View
web-application-analysisTools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools.web-application-analysis68View
wireless-attacksTools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR.wireless-attacks60View

Build Info

  • Generated at: 2026-01-03T15:46:07.212606
  • Generated by: chatkali-skills-builder/0.2
  • Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git
  • Source dir: kali-tools
  • Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d
  • Source branch: main
  • Tools total: 792
  • Categories total: 21
  • Multi-category tools: 383
  • Uncategorized tools: 0

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

Open Code Review

Scan AI-generated code for hallucinated packages, stale APIs, security anti-patterns, and over-engineering. Use when: (1) reviewing PRs with AI-generated cod...

Registry SourceRecently Updated
90Profile unavailable
Security

Nginx Config

Nginx配置生成。服务器配置、反向代理、SSL、缓存、安全加固、性能优化。Nginx config generator with reverse proxy, SSL, caching, security, optimization. Nginx、服务器、运维。

Registry SourceRecently Updated
1860Profile unavailable
Security

Credential Tester

A little tool to play with Windows security credential-tester, c. Use when you need credential-tester capabilities. Triggers on: credential-tester.

Registry SourceRecently Updated
960Profile unavailable
Security

test

Automated pre-audit checklist for Solidity smart contracts. Runs SWC registry scan, OpenZeppelin pattern validation, gas optimization suggestions, and common...

Registry SourceRecently Updated
210Profile unavailable