Kali Linux

Kali Linux Reviews

Do you work for this company? Learn how we help vendors

Ratings and Reviews
(1-4 of 12)

Companies can't remove reviews or game the system. Here's why
Fahad Khalil | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
The Kali [Linux] is being used in our organization mainly by IT department for assuring the best in management, monitoring and auditing the security of information and network. The developers are also using it for reverse engineering of APK files to learn more about advanced development techniques. It is bundled with several hundred very powerful tools which helps us a lot in different purposes.
  • Security auditing
  • Information security
  • Penetration testing
  • Reverse engineering
  • Live version
  • Bulk of bundled very powerful tools
  • Not suitable for personal computer
  • Requires high configuration machine
  • Unavailability of drivers even for many popular tech products
The Kali [Linux] is not a cup of tea for everyone and not well suited for personal computer hence I recommend only relevant people in my organization and other contacts to prefer it for management and monitoring of information security, network security and penetration testing. I also recommend the mobile developers of organization to use it for reverse engineering of APK files to learn advance development methodologies.
Om Khard | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Review Source
Kali Linux is a Debian-based Linux OS, and it has a variety of tools and utilities for a Network Engineer and Pentester to perform a real-life Network scan and analyze the traffic through my organization's Network. It checks if any malicious traffic doesn't pass through using the Linux firewall "iptables", where iptables is a daemon process consists of a set of security rules to analyze the traffic protocols in the application layer or even in lower layers. It provides a range of tools for Security purposes to scan a network like Nmap, OWASP's ZAP, BURP, and many more.
  • Port analyses
  • Hosting any website
  • Using system as a proxy server
  • More secure than Windows
  • To make the Graphical interface more interactive, because Linux distros are more tend to be used in CLI.
Well Suited for:
  1. Penetration Testing
  2. System Admin
  3. Syslog analyses
  4. Network Admin.
  5. Web Hosting
Less Appropriate here:
  1. GUI is not so interactive.
Score 9 out of 10
Vetted Review
Verified User
Review Source
As a consultant working for a consulting company, this flavour of Linux called Kali Linux is being used across by several customers of ours. We also use for Kali Linux in few of our in house off shore development centers within the organization. The main goals for using Kali Linux is for high security and penetration testing with in and across various departments.
  • Provides high security.
  • Does great job with penetration testing.
  • Has good number of testing tools with in.
  • Usage wise, it is tough for use by beginners. Can be improved.
  • With Kali Linux have noticed driver related issues especially with Nvidia graphics cards.
  • Kali Linux can be improved for use as a day to day OS.
Kali Linux is especially well suited in environments where high security is needed for your custom developed applications. This is well suited for offensive testing your high security in house developed applications. It is also very good for doing penetration testing on in house developed applications and safe guarding them from external attackers. Kali Linux is tough for use as a day to day Linux operating system as this was never intended to be used by beginners and occasional Linux users.
Score 10 out of 10
Vetted Review
Verified User
Review Source
Kali Linux is used by my organization's security consultants and specialists to perform and verify applications vulnerabilities, perform random testing, and simulating trainings for new hires to be familiarised with company security policies, process and practices.
  • Open source
  • Suite of tools for PT
  • NEtHunter
  • Support for forensic
  • Network vulnerabilities
  • Windows support
The tools are useful to guide security specialists to perform PT and scanning of the applications. Users do not need much training to start using the tools and explanations in place to guide the users when they are using the tools. Most of the time results are valid and be repeated again and again to demonstrate the vulnerabilities.

Kali Linux Scorecard Summary

What is Kali Linux?

Kali Linux is an open source, advanced penetration testing platform supported by Offensive Security headquartered in New York.

Kali Linux Pricing

Kali Linux Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

What is Kali Linux?

Kali Linux is an open source, advanced penetration testing platform supported by Offensive Security headquartered in New York.

Who uses Kali Linux?

The most common users of Kali Linux are from Mid-size Companies and the Information Technology & Services industry.