Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the links to download Kali Linux in its latest official release. For a release history, check our Kali Linux Releases page. Please note: You can find unofficial, untested weekly releases at http://cdimage.kali.org/kali-weekly/. Downloads are rate limited to 5 concurrent connections.

Time for another Kali Linux release! – Kali Linux 2020.4. This release has various impressive updates:

  • ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default.
  • Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH.
  • Partnership with tools authors – We are teaming up with byt3bl33d3r.
  • Message at login – Proactively pointing users to resources.
  • AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL.
  • Packaging Guides – Want to start getting your tool inside of Kali? This should help.
  • New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default.
  • NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk.
  • Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices
  • Vagrant & VMware – We now support VMware users who use Vagrant.
R K

Recent Posts

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

19 hours ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

1 day ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

1 day ago

What is SIEM? Complete Guide to Security Information and Event Management

Introduction As cyber threats grow more sophisticated, organizations need more than just firewalls and antivirus…

2 days ago

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

2 days ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

3 days ago