kali-tools

Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools.

$ Installer

git clone https://github.com/tzf1003/ChatKali ~/.claude/skills/ChatKali

// tip: Run this command in your terminal to install the skill


name: kali-tools description: Comprehensive reference for Kali Linux tools. Use this skill to find, understand, and use security tools in Kali Linux. It provides a categorized index of all available tools. license: See original documentation source_repo: https://gitlab.com/kalilinux/documentation/kali-tools.git source_dir: kali-tools source_commit: 6a986bc96e156a34ddc47f758a4449202a8e475d source_branch: main generated_at: 2026-01-03T15:46:07.212606 generated_by: chatkali-skills-builder/0.2 stats: tools_total: 792 categories_total: 21 multi_category_tools: 383 uncategorized_tools: 0

Kali Linux Tools

This skill provides a comprehensive reference for Kali Linux tools, organized by category and backed by the official Kali tools documentation repository.

Routing

Lookup order (strict):

  1. Open this SKILL.md and locate a category.
  2. Open the category index in references/uncategorized.md.
  3. From the category, open a tool page in references/tools/nmap.md.

Notes:

  • A tool can belong to multiple categories.
  • Tool pages always list their categories and link back.

Categories

CategoryDescriptionAliasesTools CountLink
cryptography-steganographyTools for encryption, decryption, and hiding data within other files (steganography).cryptography-steganography11View
database-assessmentTools for testing and exploiting database systems, including SQL injection and data extraction utilities.database-assessment3View
defensive-toolsTools for protecting systems, including firewalls, intrusion detection systems (IDS), and honeypots.defensive-tools28View
exploitation-toolsTools for executing exploits against target systems, including social engineering toolkits and payload generators.exploitation-tools61View
forensicsTools for digital forensics, including disk imaging, file carving, and anti-forensics analysis.forensics61View
hardwarehardware1View
hardware-hackingTools for auditing and attacking hardware interfaces, embedded systems, IoT devices, and Android.hardware-hacking3View
information-gatheringTools for collecting data about a target network or system, including DNS enumeration, OSINT, and port scanning.information-gathering265View
malware-analysisTools for analyzing malicious software, including sandboxes and signature matching utilities.malware-analysis7View
password-attacksTools for cracking passwords via brute-force, dictionary attacks, or rainbow tables.password-attacks77View
post-exploitationTools used after gaining access to a system, including backdoors, rootkits, and privilege escalation scripts.post-exploitation47View
reporting-toolsTools for documenting findings, managing evidence, and generating penetration test reports.reporting-tools9View
reverse-engineeringTools for analyzing compiled binaries, including debuggers, disassemblers, and decompilers.reverse-engineering32View
sniffing-spoofingTools for intercepting network traffic and impersonating devices or users, including MITM and packet sniffers.sniffing-spoofing45View
social-engineering-toolsTools for performing social engineering attacks, such as phishing campaigns and malicious payload creation.social-engineering-tools11View
system-servicesTools related to system services like SSH, HTTP, and TFTP, often used for maintaining access or serving files.system-services14View
tunneling-exfiltrationTools for establishing covert channels, proxying traffic, and exfiltrating data through firewalls.tunneling-exfiltration22View
utilitiesGeneral-purpose utilities for file manipulation, downloading, version control, and other essential tasks.utilities373View
vulnerability-analysisTools for identifying security flaws, including fuzzers, scanners, and vulnerability assessment frameworks.vulnerability-analysis83View
web-application-analysisTools specifically designed to attack and analyze web applications, including proxies, crawlers, and SQL injection tools.web-application-analysis68View
wireless-attacksTools for auditing and attacking wireless protocols, including 802.11 Wi-Fi, Bluetooth, RFID, and SDR.wireless-attacks60View

Build Info

  • Generated at: 2026-01-03T15:46:07.212606
  • Generated by: chatkali-skills-builder/0.2
  • Source repo: https://gitlab.com/kalilinux/documentation/kali-tools.git
  • Source dir: kali-tools
  • Source commit: 6a986bc96e156a34ddc47f758a4449202a8e475d
  • Source branch: main
  • Tools total: 792
  • Categories total: 21
  • Multi-category tools: 383
  • Uncategorized tools: 0