kali-tools

Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "kali-tools" with this command: npx skills add tzf1003/chatkali/tzf1003-chatkali-kali-tools

Kali Linux Tools

This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository.

Routing

Lookup order (strict):

  1. Open this SKILL.md and locate a category.
  2. Open the category index in references/uncategorized.md.
  3. From the category, open a tool page in references/tools/nmap.md.

Notes:

  • A tool can belong to multiple categories.
  • Tool pages always list their categories and link back.

Categories

CategoryDescriptionAliasesTools CountLink
cryptography-steganographyTools for encryption, decryption, and hiding data within other files (steganography).cryptography-steganography11View
database-assessmentTools for testing and exploiting database systems, including SQL injection and data extraction utilities.database-assessment3View
defensive-toolsTools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots.defensive-tools28View
exploitation-toolsTools for executing exploits against target systems, including social engineering toolkits and payload generators.exploitation-tools61View
forensicsTools for digital forensics, including disk imaging, file carving, and anti-forensics analysis.forensics61View
hardwarehardware1View
hardware-hackingTools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android.hardware-hacking3View
information-gatheringTools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning.information-gathering265View
malware-analysisTools for analyzing malicious software, including sandboxes and signature matching utilities.malware-analysis7View
password-attacksTools for cracking passwords via brute-force, dictionary attacks, or rainbow tables.password-attacks77View
post-exploitationTools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts.post-exploitation47View
reporting-toolsTools for documenting findings, managing evidence, and generating penetration test reports.reporting-tools9View
reverse-engineeringTools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers.reverse-engineering32View
sniffing-spoofingTools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers.sniffing-spoofing45View
social-engineering-toolsTools for performing social engineering attacks, such as phishing campaigns and malicious payload creation.social-engineering-tools11View
system-servicesTools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files.system-services14View
tunneling-exfiltrationTools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls.tunneling-exfiltration22View
utilitiesGeneral-purpose utilities for file manipulation, downloading, version control, and other essential tasks.utilities373View
vulnerability-analysisTools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks.vulnerability-analysis83View
web-application-analysisTools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools.web-application-analysis68View
wireless-attacksTools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR.wireless-attacks60View

Build Info

  • Generated at: 2026-01-03T15:46:07.212606
  • Generated by: chatkali-skills-builder/0.2
  • Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git
  • Source dir: kali-tools
  • Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d
  • Source branch: main
  • Tools total: 792
  • Categories total: 21
  • Multi-category tools: 383
  • Uncategorized tools: 0

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

compliance-evidence-assembler

把审计所需证据整理成目录、清单和缺失项,便于后续评审。;use for compliance, evidence, audit workflows;do not use for 伪造证据, 替代正式审计结论.

Archived SourceRecently Updated
Security

skillguard-hardened

Security guard for OpenClaw skills, developed and maintained by rose北港(小红帽 / 猫猫帽帽). Audits installed or incoming skills with local rules plus Zenmux AI intent review, then recommends pass, warn, block, or quarantine.

Archived SourceRecently Updated
Security

api-contract-auditor

审查 API 文档、示例和字段定义是否一致,输出 breaking change 风险。;use for api, contract, audit workflows;do not use for 直接改线上接口, 替代契约测试平台.

Archived SourceRecently Updated