Kali Linux 2020.4 : Penetration Testing and Ethical Hacking Linux Distribution

We generate fresh Kali Linux image files every few months, which we make available for download. This page provides the links to download Kali Linux in its latest official release. For a release history, check our Kali Linux Releases page. Please note: You can find unofficial, untested weekly releases at http://cdimage.kali.org/kali-weekly/. Downloads are rate limited to 5 concurrent connections.

Time for another Kali Linux release! – Kali Linux 2020.4. This release has various impressive updates:

  • ZSH is the new default shell – We said it was happening last time, Now it has. ZSH. Is. Now. Default.
  • Bash shell makeover – It may not function like ZSH, but now Bash looks like ZSH.
  • Partnership with tools authors – We are teaming up with byt3bl33d3r.
  • Message at login – Proactively pointing users to resources.
  • AWS image refresh – Now on GovCloud. Includes Kali’s default (command line) tools again. And there is a new URL.
  • Packaging Guides – Want to start getting your tool inside of Kali? This should help.
  • New Tools & Updates – New Kernel and various new tools and updates for existing ones, as well as setting Proxychains 4 as default.
  • NetHunter Updates – New NetHunter settings menu, select from different boot animations, and persistent Magisk.
  • Win-KeX 2.5 – New “Enhanced Session Mode” brings Win-KeX to ARM devices
  • Vagrant & VMware – We now support VMware users who use Vagrant.
AddThis Website Tools
R K

Recent Posts

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…

1 day ago

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…

1 day ago

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…

1 day ago

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…

1 day ago

AdaptixC2 : Enhancing Penetration Testing With Advanced Framework Capabilities

AdaptixC2 is an advanced post-exploitation and adversarial emulation framework designed specifically for penetration testers. It…

1 day ago

Bincrypter : Enhancing Linux Binary Security through Runtime Encryption And Obfuscation

Bincrypter is a powerful Linux binary runtime crypter written in BASH. It is designed to…

1 day ago